AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The Use and Vulnerabilities of eBPF
The speakers discuss the double-edged sword of eBPF, its capabilities, and potential vulnerabilities. The prominence of eBPF at KubeCon is highlighted, along with its relationship to Waypoint Proxy and L7 policy in Kubernetes.