Hacker News new | past | comments | ask | show | jobs | submit login

Well, it doesn't have to be free from vulnerabilities, not any more than any other OS code. The sandboxed code that is running trusted (ie without trampolines and spectre-defenses) would still hold the guarantees given by the sandbox (WASM), which are pretty much on par with what a modern browser can do for JS and WASM. And keep in mind that both WASM and JS now have spectre-defenses, so there is no need for a PL from scratch for this.



> And keep in mind that both WASM and JS now have spectre-defenses, so there is no need for a PL from scratch for this.

As far as I remember they weren't able to defend from side channel attacks within the same process completely and decided to rely on process isolation instead, estimating it would be too much work to address all known spectre class vulnerabilities on their existing compilers and too hard to ensure for defenses not to be broken later by compiler developers.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: