Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's still the hypervisor (Hyper-V in that case) that has to do the work to mitigate the vulnerability, not the browser. The browser just uses whatever APIs the hypervisor exposes to create a virtual machine.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: