Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What’s nice is that you can do it in steps - you may have a hard time proving full specification, but you can prove absence of bad behavior like buffer overruns, etc and go from there.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: