Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's precisely zero protection; it behaves a lot more like an embedded system. It might be nice to reuse some of the old tutorials for this, but I'm not sure if that wouldn't be too specific.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: