Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm a bit skeptical of this. It will work for some BPF use cases, but for others it might be a nightmare to deploy something in production at scale this way. Essentially on the target machine you're no better than signed kernel modules. If someone gets in possession of the key, they can do whatever they want given there is no verification mechanism anymore. It sounds good for programs of rather static nature, but for more complex application it's rather theory imo.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: