.
This commit is contained in:
parent
7f9a5454d1
commit
3a1f94bd4c
1 changed files with 9 additions and 10 deletions
19
Home
19
Home
|
@ -3,7 +3,6 @@ title: Robust Open Bare-metal Ubiquitous Resilient
|
||||||
author: someone
|
author: someone
|
||||||
---
|
---
|
||||||
At robur, we build performant bespoke minimal operating systems for high-assurance services.
|
At robur, we build performant bespoke minimal operating systems for high-assurance services.
|
||||||
|
|
||||||
With our approach to systems development we provide the following advantages for you:
|
With our approach to systems development we provide the following advantages for you:
|
||||||
* based on the unikernel pioneer [MirageOS](https://mirage.io)
|
* based on the unikernel pioneer [MirageOS](https://mirage.io)
|
||||||
* secure implementation guarded against memory corruption, typelevel problems, leaky abstraction and unforseen state
|
* secure implementation guarded against memory corruption, typelevel problems, leaky abstraction and unforseen state
|
||||||
|
@ -15,16 +14,16 @@ With our approach to systems development we provide the following advantages for
|
||||||
* extensive library ecosystem, yet minimal trusted code base at runtime
|
* extensive library ecosystem, yet minimal trusted code base at runtime
|
||||||
* rapid prototyping with a seamless path from prototype to production
|
* rapid prototyping with a seamless path from prototype to production
|
||||||
|
|
||||||
Computers on the Internet get compromised,
|
Computers on the Internet get compromised, either to steal data from databases
|
||||||
- to access data on the computer (databases, passwords, user accounts) or block
|
on the computer or deploy ransomware which blocks access to the data until a fee
|
||||||
access to it (Ransomware),
|
is paid, or to use the computing resources by participating in denial of service
|
||||||
- to participate in DoS of other services (e.g. the Mirai botnet on SmartTVs)
|
attacks or manipulate opinion using chatbots.
|
||||||
and manipulate opinion (chatbots).
|
|
||||||
|
|
||||||
The software stack often includes parts which are no longer needed, such as
|
The software stack often includes code which is no longer needed, such as floppy
|
||||||
floppy disk drivers. Critical security updates are rarely deployed in time,
|
disk drivers which is around at runtime, which is an unneccessary attack
|
||||||
because such a change may result in unforeseen behaviour. Additionally, lots of
|
surface. Critical security updates are rarely deployed in time, because such a
|
||||||
embedded devices (home router, SmartTV, etc.) have no secure update channel.
|
change may result in unforeseen behaviour. Additionally, lots of embedded
|
||||||
|
devices (home router, SmartTV, etc.) do not have a secure update channel.
|
||||||
|
|
||||||
Instead of trying to fix these decades-old operating systems, which were
|
Instead of trying to fix these decades-old operating systems, which were
|
||||||
designed as multi-user time sharing systems of the past, we build small services
|
designed as multi-user time sharing systems of the past, we build small services
|
||||||
|
|
Loading…
Reference in a new issue