You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: related.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,25 +9,24 @@ permalink: /related/
9
9
> "... is a family of second-generation microkernels, generally used to implement Unix-like operating systems, but also used in a variety of other systems ... L4 is widely deployed. One variant, OKL4 from Open Kernel Labs, shipped in billions of mobile devices"
> "... is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments are based on Fedora."
> "... provides stronger security services which are more resistant to attack and abstractions which are less prone to abuse by attackers. As an example of the former, all networking in Ethos is encrypted, authenticated, and authorized. As an example of the latter, Ethos I/O is typed (as in programming languages) ensuring that I/O conforms to declared typed and thus preventing many attacks based on ill-formed input."
41
40
42
-
+[Research](https://www.ethos-os.org/), *University of Illinois, Chicago, USA*
41
+
+[U of Illinois Research](https://www.ethos-os.org/), *USA*
0 commit comments