Hacker News new | past | comments | ask | show | jobs | submit login

Almost any feature you build to protect a system from a compromised kernel is, in effect, DRM. DRM and system protection are two sides of the same coin.

Nothing magical happens when your machine gets owned up by malware or exploits. The machine naturally does the bidding of the user, not the owner. When you get compromised, the user changes. Want to defend an ostensibly single-user system from an unexpected and unwanted new user? Congratulations: you're building DRM.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: