Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> What does a process that does not impersonate the user look like?

A command running inside a virtual machine, maybe?



Or check out how iOS and Android use permissions.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: