Hacker News new | past | comments | ask | show | jobs | submit login

That hasn't stopped Xen from having bugs that have allow an attacker to escape the domU and gain access to dom0 and the hardware.

The key really is: "Don't rely on visualization for security".




Even if you physically separate, you risk being exploited over whatever medium you have to communicate with the untrusted machine. There are no silver bullets, unless you count total isolation.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: