Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I agree with you.

>Any code executing in privileged mode can bypass security, and is therefore inherently part of a system's trusted computing base (TCB). (Linux is a monolithic kernel running in ring 0)

It's way nicer to be able to look at the code running in Ring 0 =)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: