What exactly this should do, to get the job done and be secure, is
       the question that we can answer by trying to really implement this.

    It is already implemented, and has been implemented for the past 10
    years.

Is there an application that really uses a sub-hurd?


Reply via email to