changes
This commit is contained in:
parent
1bc356216f
commit
eee8a7516a
1 changed files with 4 additions and 5 deletions
9
Home
9
Home
|
@ -19,12 +19,11 @@ User data is being downloaded, leaked and sold, or ransomware blocks access to u
|
|||
is paid. Other common attacks target compute resources, to use them in denial of service
|
||||
attacks or to manipulate opinion with chatbots.
|
||||
|
||||
The software stack often includes code which is no longer needed, such as floppy
|
||||
disk drivers which is around at runtime, which is an unneccessary attack
|
||||
surface. Critical security updates are rarely deployed in time, because such a
|
||||
change may result in unforeseen behaviour. Additionally, lots of embedded
|
||||
devices (home router, SmartTV, etc.) do not have a secure update channel.
|
||||
Common software stacks often include legacy parts at runtime that provide unnecessary attack surface.
|
||||
Critical security updates are rarely deployed on time, because they result in unforeseen behaviour. Also, lots of embedded
|
||||
devices are missing a secure update channel.
|
||||
|
||||
======
|
||||
Instead of trying to fix these decades-old operating systems, which were
|
||||
designed based on demands at that time (e.g. time-multiplexed multi-user
|
||||
computers), we build small services from scratch with security in mind. Each
|
||||
|
|
Loading…
Reference in a new issue