This commit is contained in:
linse 2017-09-17 11:33:34 -04:00
parent 1bc356216f
commit eee8a7516a

9
Home
View file

@ -19,12 +19,11 @@ User data is being downloaded, leaked and sold, or ransomware blocks access to u
is paid. Other common attacks target compute resources, to use them in denial of service is paid. Other common attacks target compute resources, to use them in denial of service
attacks or to manipulate opinion with chatbots. attacks or to manipulate opinion with chatbots.
The software stack often includes code which is no longer needed, such as floppy Common software stacks often include legacy parts at runtime that provide unnecessary attack surface.
disk drivers which is around at runtime, which is an unneccessary attack Critical security updates are rarely deployed on time, because they result in unforeseen behaviour. Also, lots of embedded
surface. Critical security updates are rarely deployed in time, because such a devices are missing a secure update channel.
change may result in unforeseen behaviour. Additionally, lots of embedded
devices (home router, SmartTV, etc.) do not have a secure update channel.
======
Instead of trying to fix these decades-old operating systems, which were Instead of trying to fix these decades-old operating systems, which were
designed based on demands at that time (e.g. time-multiplexed multi-user designed based on demands at that time (e.g. time-multiplexed multi-user
computers), we build small services from scratch with security in mind. Each computers), we build small services from scratch with security in mind. Each