Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

The only real difference seems to be in the kernel. And that one difference is that it's "capability-based", which in practice means that programs are given keys by the kernel, which they can use later to make syscalls. This theoretically makes security easier to reason about.


view as:

There are tons of other differences and I'm not going to bother to list them all out here, but this is just not accurate.

How is this comment helpful if you won't list the differences or explain why it's not accurate?

I find it helpful.

"Warning: don't trust this"


Could you bother linking to a place listing them all out there?

I think this is missing the forest for the trees: most of what would normally be a systemcall to the kernel in Linux is instead a capability-based IPC to other userspace processes with limited privilege. This includes device drivers, the networking stack, filesystems, etc.

Legal | privacy