summaryrefslogtreecommitdiff
path: root/contractor.md
diff options
context:
space:
mode:
authorLars Wirzenius <liw@liw.fi>2020-04-06 14:32:20 +0300
committerLars Wirzenius <liw@liw.fi>2020-04-06 14:32:20 +0300
commit7d3d93a6487df5b4927298b5d775d308066e48be (patch)
tree34afe06cd301bf1a7774fb89ec6a98f11d6d10c8 /contractor.md
parent5195e49215b06eff8eb7cfc997f3e0515d59afba (diff)
downloadick-contractor-7d3d93a6487df5b4927298b5d775d308066e48be.tar.gz
Change: tweak wording
Diffstat (limited to 'contractor.md')
-rw-r--r--contractor.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/contractor.md b/contractor.md
index b0af434..4ee8c13 100644
--- a/contractor.md
+++ b/contractor.md
@@ -81,7 +81,7 @@ This is true for all operating systems that are not mere toys.
The conclusion here is that to build software securely, we can't
assume all code involved in the build to be secure. We need something
-stronger. The Contractor aims to be that something stronger.
+more secure. The Contractor aims to be a possible solution.
## Threat model