Hacker News new | past | comments | ask | show | jobs | submit login

Allowing you to have inconsistently valid data, where a file can both exist and not exist depending on who's asking, is the opposite of smart.



A file exists for those who have the access rights, and does not for everyone else.

In that case, the file exists only for the process which has already opened it.


I just imagined the file being part of the mob, and somebody coming to ask if it was there. The body guard just responding with a “who’s asking?”


That's why Dijkstra was against the idea of explaining CS concepts by anthromorphic analogies ig.


With proper capabilities (the correct way to do security), this is just normal. If you don't have the capability, the object does not exist. Capabilities can be revoked at any time too.


it is a trade off




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: