diff options
author | Lars Wirzenius <liw@liw.fi> | 2020-04-06 13:49:16 +0300 |
---|---|---|
committer | Lars Wirzenius <liw@liw.fi> | 2020-04-06 13:49:16 +0300 |
commit | dfbff3ac91c5a53fe274664fbef0f19b23310b47 (patch) | |
tree | 671f87509ba4139948acdd0be48f0839aecec4d9 /contractor.md | |
parent | 582e1a1797903bd93b837805660396c93b4ab527 (diff) | |
download | ick-contractor-dfbff3ac91c5a53fe274664fbef0f19b23310b47.tar.gz |
Add: clarifying sentence
Diffstat (limited to 'contractor.md')
-rw-r--r-- | contractor.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/contractor.md b/contractor.md index a6051fb..7afb01e 100644 --- a/contractor.md +++ b/contractor.md @@ -80,7 +80,7 @@ This is true for all operating systems that are not mere toys. The conclusion here is that to build software securely, we can't assume all code involved in the build to be secure. We need something -stronger. +stronger. The Contractor aims to be that something stronger. ## Threat model |