Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>so they can do literally anything the OS is capable of doing

Yea, over the years someone thought of something they wanted to do and then did it without a systematic consideration of what that level of power meant, especially as multi-user network connectivity and untrusted data became the norm.



Those weren't a consideration when the NT OS/2 Design Workbook was being written.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: