diff options
author | Lars Wirzenius <liw@liw.fi> | 2020-04-06 14:32:20 +0300 |
---|---|---|
committer | Lars Wirzenius <liw@liw.fi> | 2020-04-06 14:32:20 +0300 |
commit | 7d3d93a6487df5b4927298b5d775d308066e48be (patch) | |
tree | 34afe06cd301bf1a7774fb89ec6a98f11d6d10c8 /contractor.md | |
parent | 5195e49215b06eff8eb7cfc997f3e0515d59afba (diff) | |
download | ick-contractor-7d3d93a6487df5b4927298b5d775d308066e48be.tar.gz |
Change: tweak wording
Diffstat (limited to 'contractor.md')
-rw-r--r-- | contractor.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/contractor.md b/contractor.md index b0af434..4ee8c13 100644 --- a/contractor.md +++ b/contractor.md @@ -81,7 +81,7 @@ This is true for all operating systems that are not mere toys. The conclusion here is that to build software securely, we can't assume all code involved in the build to be secure. We need something -stronger. The Contractor aims to be that something stronger. +more secure. The Contractor aims to be a possible solution. ## Threat model |