Langer satz.
This commit is contained in:
parent
3a1f94bd4c
commit
53ebc3bc75
1 changed files with 5 additions and 5 deletions
10
Home
10
Home
|
@ -4,7 +4,7 @@ author: someone
|
||||||
---
|
---
|
||||||
At robur, we build performant bespoke minimal operating systems for high-assurance services.
|
At robur, we build performant bespoke minimal operating systems for high-assurance services.
|
||||||
With our approach to systems development we provide the following advantages for you:
|
With our approach to systems development we provide the following advantages for you:
|
||||||
* based on the unikernel pioneer [MirageOS](https://mirage.io)
|
* systems based on the unikernel pioneer [MirageOS](https://mirage.io)
|
||||||
* secure implementation guarded against memory corruption, typelevel problems, leaky abstraction and unforseen state
|
* secure implementation guarded against memory corruption, typelevel problems, leaky abstraction and unforseen state
|
||||||
* ready for the cloud, services run on all major hypervisors
|
* ready for the cloud, services run on all major hypervisors
|
||||||
* instant boot
|
* instant boot
|
||||||
|
@ -14,10 +14,10 @@ With our approach to systems development we provide the following advantages for
|
||||||
* extensive library ecosystem, yet minimal trusted code base at runtime
|
* extensive library ecosystem, yet minimal trusted code base at runtime
|
||||||
* rapid prototyping with a seamless path from prototype to production
|
* rapid prototyping with a seamless path from prototype to production
|
||||||
|
|
||||||
Computers on the Internet get compromised, either to steal data from databases
|
Computers on the Internet get compromised mostly to gain or block access to data.
|
||||||
on the computer or deploy ransomware which blocks access to the data until a fee
|
User data is being downloaded, leaked and sold, or ransomware blocks access to user data until a fee
|
||||||
is paid, or to use the computing resources by participating in denial of service
|
is paid. Other common attacks target compute resources, to use them in denial of service
|
||||||
attacks or manipulate opinion using chatbots.
|
attacks or to manipulate opinion with chatbots.
|
||||||
|
|
||||||
The software stack often includes code which is no longer needed, such as floppy
|
The software stack often includes code which is no longer needed, such as floppy
|
||||||
disk drivers which is around at runtime, which is an unneccessary attack
|
disk drivers which is around at runtime, which is an unneccessary attack
|
||||||
|
|
Loading…
Reference in a new issue