Is restarting a machine enough to ensure isolation between requests? [REPOST]

I want to do something involving untrusted code and I’d prefer if each request was completely isolated. Would it be enough to stop then start the machine or should i completely destroy it?

(reposted from Is restarting a machine enough to ensure isolation between requests? , as I would also very much like to have an answer to this.)

1 Like

Correct, this is all you need to do. When a machine stops, we reset the root filesystem so next time it starts fresh as if it were a brand new machine.

2 Likes

This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.