Comment by martenlienen
16 hours ago
That is exactly what it is. In the docs, it says that they use bubblewrap to run commands in a container that enforces file and network access at the system level.
16 hours ago
That is exactly what it is. In the docs, it says that they use bubblewrap to run commands in a container that enforces file and network access at the system level.
No comments yet
Contribute on Hacker News ↗