From eee8a7516a01fb68aa65d4e6d9ca94bc2ac5044a Mon Sep 17 00:00:00 2001 From: linse Date: Sun, 17 Sep 2017 11:33:34 -0400 Subject: [PATCH] changes --- Home | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/Home b/Home index 739242a..d2dd5f4 100644 --- a/Home +++ b/Home @@ -19,12 +19,11 @@ User data is being downloaded, leaked and sold, or ransomware blocks access to u is paid. Other common attacks target compute resources, to use them in denial of service attacks or to manipulate opinion with chatbots. -The software stack often includes code which is no longer needed, such as floppy -disk drivers which is around at runtime, which is an unneccessary attack -surface. Critical security updates are rarely deployed in time, because such a -change may result in unforeseen behaviour. Additionally, lots of embedded -devices (home router, SmartTV, etc.) do not have a secure update channel. +Common software stacks often include legacy parts at runtime that provide unnecessary attack surface. +Critical security updates are rarely deployed on time, because they result in unforeseen behaviour. Also, lots of embedded +devices are missing a secure update channel. +====== Instead of trying to fix these decades-old operating systems, which were designed based on demands at that time (e.g. time-multiplexed multi-user computers), we build small services from scratch with security in mind. Each