Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would also like to see a detailed explanation of how they prepared the box to safely allow people to play (ie logins, permissions, etc). How to restrict privileges yet allow just enough to make it varied and fun.


The big thing is that we are connected into a chroot that has neither /proc nor /sys mounted, and which itself is on a read-only filesystem.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: