Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

HOW are they logically separated? Are there any layers to this security? Any standard established security boundaries like containers? Or is it just your app code doing its best not to have security bugs?
 help



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: