Comment by SixSigma 10 years ago No not really but I'm for the concept of the user privileges being built into the hardware 0 comments SixSigma Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗