← Back to context Comment by raincole 5 days ago Congrats, you just solved halting problem. 3 comments raincole Reply csmpltn 4 days ago Are you not familiar with sandboxing? eBPF? Audit logs? "Dry Runs"? Static and dynamic scanning? js8 5 days ago That's a common misconception. You can request a proof of harmlessness, and disregard anything without it. csmpltn 4 days ago No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...
csmpltn 4 days ago Are you not familiar with sandboxing? eBPF? Audit logs? "Dry Runs"? Static and dynamic scanning?
js8 5 days ago That's a common misconception. You can request a proof of harmlessness, and disregard anything without it. csmpltn 4 days ago No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...
csmpltn 4 days ago No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...
Are you not familiar with sandboxing? eBPF? Audit logs? "Dry Runs"? Static and dynamic scanning?
That's a common misconception. You can request a proof of harmlessness, and disregard anything without it.
No need to "ask" for "proof". You can monitor the system in real-time and detect malicious or potentially harmful activity and stop it early. The same tools and methodologies used by security tools for decades...