| 1. | | The Board Game of the Alpha Nerds (grantland.com) |
| 315 points by swanson on June 18, 2014 | 153 comments |
|
| 2. | | Docker container breakout? (openwall.net) |
| 317 points by eugeneionesco on June 18, 2014 | 89 comments |
|
| |
|
|
| 4. | | Negative SEO Does Exist (webmarketingschool.com) |
| 252 points by searchmartin on June 18, 2014 | 221 comments |
|
| 5. | | Cap'n Proto, FlatBuffers, and SBE (kentonv.github.io) |
| 200 points by willvarfar on June 18, 2014 | 23 comments |
|
| 6. | | Introducing the Web Audio Editor in Firefox Developer Tools (hacks.mozilla.org) |
| 196 points by rnyman on June 18, 2014 | 27 comments |
|
| 7. | | Suicidal Software Developer (pastebin.com) |
| 191 points by yla92 on June 18, 2014 | 244 comments |
|
| 8. | | Debian is switching back to GLIBC (aurel32.net) |
| 179 points by tshepang on June 18, 2014 | 60 comments |
|
| 9. | | Celery – Best Practices (denibertovic.com) |
| 174 points by denibertovic on June 18, 2014 | 103 comments |
|
| 10. | | Poetica (poetica.com) |
| 153 points by Brajeshwar on June 18, 2014 | 40 comments |
|
| 11. | | Yo (techcrunch.com) |
| 171 points by rahij on June 18, 2014 | 99 comments |
|
| 12. | | Help Shut the Government's Surveillance Backdoors (shutthebackdoor.net) |
| 171 points by sinak on June 18, 2014 | 53 comments |
|
| 13. | | Canadian court ruling orders Google to block sites worldwide (theglobeandmail.com) |
| 155 points by tempestn on June 18, 2014 | 103 comments |
|
| 14. | | A Comparison of Popular Ruby Application Servers (engineyard.com) |
| 131 points by jaustinhughey on June 18, 2014 | 41 comments |
|
| 15. | | The Google career path, Part 3: Performance reviews and promotions (matt-welsh.blogspot.com) |
| 127 points by cpeterso on June 18, 2014 | 78 comments |
|
| 16. | | Code Spaces data and backups deleted by hackers (codespaces.com) |
| 119 points by leejacobson on June 18, 2014 | 78 comments |
|
| 17. | | Microsoft Paying Bloggers to Write about Internet Explorer (uncrunched.com) |
| 113 points by scottrblock on June 18, 2014 | 92 comments |
|
| 18. | | TeX Live 2014 (latex-community.org) |
| 109 points by golem12 on June 18, 2014 | 48 comments |
|
| 19. | | Stockholm – it's not a coincidence (visitstockholm.com) |
| 107 points by msvan on June 18, 2014 | 106 comments |
|
| 20. | | TrueCrypt developer says no to license change for forking (pastebin.com) |
| 102 points by chmars on June 18, 2014 | 100 comments |
|
| |
|
|
| 22. | | Programmers’ Build Errors: A Case Study at Google [pdf] (googleusercontent.com) |
| 95 points by Fr3dd1 on June 18, 2014 | 23 comments |
|
| 23. | | What actually happens when you plug in a USB device? (2007) (technovelty.org) |
| 92 points by mafuyu on June 18, 2014 | 19 comments |
|
| 24. | | AT&T claims ‘strong’ net neutrality would ruin the Internet (washingtonpost.com) |
| 89 points by opendais on June 18, 2014 | 92 comments |
|
| 25. | | 500 Million Dogecoins Mined by Unknown Hacker in Malware Attack (coindesk.com) |
| 95 points by bojanbabic on June 18, 2014 | 35 comments |
|
| 26. | | Introducing “Wedge” and “FBOSS,” the next steps toward a disaggregated network (facebook.com) |
| 85 points by hiteshiitk on June 18, 2014 | 26 comments |
|
| 27. | | Unofficial DynASM Documentation (corsix.github.io) |
| 76 points by dang on June 18, 2014 | 11 comments |
|
| 28. | | Grid Style Sheets for Constraint-based Layouts (raygun.io) |
| 75 points by _query on June 18, 2014 | 17 comments |
|
| 29. | | A Criticism of JavaScript Cryptography |
| 78 points by Agrosis on June 18, 2014 | 81 comments |
|
| 30. | | Carlypso (YC S14) could change everything about how we buy and sell used cars (techcrunch.com) |
| 73 points by sama on June 18, 2014 | 40 comments |
|
|
| More |
Please remember that at this time, we don't claim Docker out-of-the-box is suitable for containing untrusted programs with root privileges. So if you're thinking "pfew, good thing we upgraded to 1.0 or we were toast", you need to change your underlying configuration now. Add apparmor or selinux containment, map trust groups to separate machines, or ideally don't grant root access to the application.
Docker will soon support user namespaces, which is a great additional security layer but also not a silver bullet!
When we feel comfortable saying that Docker out-of-the-box can safely contain untrusted uid0 programs, we will say so clearly.