an end-to-end proof of implementation correctness
Time to take bets on when the first security hole gets discovered.
Took a few years for OpenBSD, and that relied on mere human software engineering skill.
You offering?
Time to take bets on when the first security hole gets discovered.
Took a few years for OpenBSD, and that relied on mere human software engineering skill.
You offering?