Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Having it be a shell function would work. It could create a copy-on-write file system or override the syscalls for file system access.


not all the destructive actions are on file system




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: