move exec spawning to exploit protection section
This commit is contained in:
parent
4ad4a8e90a
commit
503d22220c
@ -243,6 +243,9 @@
|
||||
|
||||
<ul>
|
||||
<li>Hardened app runtime</li>
|
||||
<li><a href="/usage#exec-spawning">Secure application spawning
|
||||
system</a> avoiding sharing address space layout and other secrets
|
||||
across applications</li>
|
||||
<li><a href="https://github.com/GrapheneOS/platform_bionic">Hardened libc</a>
|
||||
providing defenses against the most common classes of vulnerabilities (memory
|
||||
corruption)</li>
|
||||
@ -617,8 +620,6 @@
|
||||
<a href="https://github.com/seedvault-app/seedvault">Seedvault app</a> with
|
||||
support for local backups and any cloud storage provider with a storage provider
|
||||
app</li>
|
||||
<li><a href="/usage#exec-spawning">Secure application spawning system</a> avoiding
|
||||
sharing address space layout and other secrets across applications</li>
|
||||
<li>Authenticated encryption for network time updates via a first party server to
|
||||
prevent attackers from changing the time and enabling attacks based on bypassing
|
||||
certificate / key expiry, etc.</li>
|
||||
|
Loading…
x
Reference in New Issue
Block a user