How and Why We Run Untrusted Java Bytecode in a Secure In-Process Sandbox | Dark Hacker News