diff --git a/Home b/Home index 739242a..d2dd5f4 100644 --- a/Home +++ b/Home @@ -19,12 +19,11 @@ User data is being downloaded, leaked and sold, or ransomware blocks access to u is paid. Other common attacks target compute resources, to use them in denial of service attacks or to manipulate opinion with chatbots. -The software stack often includes code which is no longer needed, such as floppy -disk drivers which is around at runtime, which is an unneccessary attack -surface. Critical security updates are rarely deployed in time, because such a -change may result in unforeseen behaviour. Additionally, lots of embedded -devices (home router, SmartTV, etc.) do not have a secure update channel. +Common software stacks often include legacy parts at runtime that provide unnecessary attack surface. +Critical security updates are rarely deployed on time, because they result in unforeseen behaviour. Also, lots of embedded +devices are missing a secure update channel. +====== Instead of trying to fix these decades-old operating systems, which were designed based on demands at that time (e.g. time-multiplexed multi-user computers), we build small services from scratch with security in mind. Each