Gary said:
> Think data center.  The data center controls the LAN, but the customers
> control what is in the containers.  Or the hacker that used the latest
> Wordpress bug to take over the contrainer.  And breaking out of a container
> to infect the motherboard is not that hard. 

I would assume that critical infrastructure would be run in a less insecure 
environment.


-- 
These are my opinions.  I hate spam.



_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to