This commit is contained in:
linse 2017-09-17 11:33:34 -04:00
parent 1bc356216f
commit eee8a7516a

9
Home
View file

@ -19,12 +19,11 @@ User data is being downloaded, leaked and sold, or ransomware blocks access to u
is paid. Other common attacks target compute resources, to use them in denial of service
attacks or to manipulate opinion with chatbots.
The software stack often includes code which is no longer needed, such as floppy
disk drivers which is around at runtime, which is an unneccessary attack
surface. Critical security updates are rarely deployed in time, because such a
change may result in unforeseen behaviour. Additionally, lots of embedded
devices (home router, SmartTV, etc.) do not have a secure update channel.
Common software stacks often include legacy parts at runtime that provide unnecessary attack surface.
Critical security updates are rarely deployed on time, because they result in unforeseen behaviour. Also, lots of embedded
devices are missing a secure update channel.
======
Instead of trying to fix these decades-old operating systems, which were
designed based on demands at that time (e.g. time-multiplexed multi-user
computers), we build small services from scratch with security in mind. Each