The Good
- Extensive configuration
- Easy separation of critical system parts through use of virtual spaces
- Security dæmon control of file actions
- Forced code execution
- Supports POSIX capabilities
The Bad
- Still in development
- Testing on SMP machines not complete
- Automatic configurator needed
- Must be used as an add-on, i.e., not in kernel