diff --git a/Home b/Home index ded4cd9..d75c2a4 100644 --- a/Home +++ b/Home @@ -1,14 +1,9 @@ --- --- -Computers on the Internet get compromised mostly to gain or block access to data: -User data is being downloaded, leaked and sold, or ransomware blocks access to user data until a fee -is paid. Other common attacks target compute resources, to use them in denial of service -attacks or to manipulate opinion with chatbots. +[//]: # (Computers on the Internet get compromised mostly to gain or block access to data: User data is being downloaded, leaked and sold, or ransomware blocks access to user data until a fee is paid. Other common attacks target compute resources, to use them in denial of service attacks or to manipulate opinion with chatbots.) -Common software stacks often include legacy parts at runtime that provide unnecessary attack surface. -Critical security updates are rarely deployed on time, because they result in unforeseen behaviour. Also, lots of embedded -devices are missing a secure update channel. +[//]: # (Common software stacks often include legacy parts at runtime that provide unnecessary attack surface. Critical security updates are rarely deployed on time, because they result in unforeseen behaviour. Also, lots of embedded devices are missing a secure update channel.) At robur, we build performant bespoke minimal operating systems for high-assurance services. With our approach to systems development we provide the following advantages for you: