summaryrefslogtreecommitdiff
path: root/contractor.md
diff options
context:
space:
mode:
authorLars Wirzenius <liw@liw.fi>2020-04-06 13:49:16 +0300
committerLars Wirzenius <liw@liw.fi>2020-04-06 13:49:16 +0300
commitdfbff3ac91c5a53fe274664fbef0f19b23310b47 (patch)
tree671f87509ba4139948acdd0be48f0839aecec4d9 /contractor.md
parent582e1a1797903bd93b837805660396c93b4ab527 (diff)
downloadick-contractor-dfbff3ac91c5a53fe274664fbef0f19b23310b47.tar.gz
Add: clarifying sentence
Diffstat (limited to 'contractor.md')
-rw-r--r--contractor.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/contractor.md b/contractor.md
index a6051fb..7afb01e 100644
--- a/contractor.md
+++ b/contractor.md
@@ -80,7 +80,7 @@ This is true for all operating systems that are not mere toys.
The conclusion here is that to build software securely, we can't
assume all code involved in the build to be secure. We need something
-stronger.
+stronger. The Contractor aims to be that something stronger.
## Threat model