Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is how you end up with three layers of VMs for browsing the internet. Some gov organizations go a little into the deep end of security in the security-usability continuum.


on disposable VM reached via thin client remote desktop software on an air gapped PC in a windowless room in the basement behind a locked door with a warning sign: beware of the leopard


Somewhere deep under the ice of Antarctica.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: