final polish before committing

This commit is contained in:
Ksenia Lesko 2025-10-27 15:04:03 -04:00
parent b5b8455966
commit bc4a54a893
Signed by: xenushka
GPG Key ID: ABAFE7A50A15D386
6 changed files with 34 additions and 47 deletions

View File

@ -15,7 +15,12 @@
<p>
Our team has built and secured some of the worlds highest-risk systems
through our consulting company,
<a href="https://distrust.co/" target="_blank" rel="noopener noreferrer">
<a
href="https://distrust.co/"
title="Visit distrust.co"
target="_blank"
rel="noopener noreferrer"
>
<strong>Distrust</strong></a
>. This includes vaulting infrastructure at BitGo, Unit410, and Turnkey, as
well as security work with electrical grid operators, industrial control

View File

@ -7,17 +7,18 @@
target="_blank"
rel="noopener noreferrer"
aria-label="Forgejo"
title="Access source code and documentation"
>
<img src="/assets/base/social/forgejo-logo.svg" alt="Forgejo logo" />
</a>
<a
<!-- <a
href="#"
target="_blank"
rel="noopener noreferrer"
aria-label="Mastodon"
>
<img src="/assets/base/social/Mastodon-logo.svg" alt="Mastodon logo" />
</a>
</a> -->
</div>
</div>
</footer>

View File

@ -43,8 +43,12 @@
</nav>
<div class="nav-cta">
<a href="/blog.html" class="btn btn-primary" rel="noopener noreferrer"
>Blog →</a
<a
href="/blog.html"
class="btn btn-primary"
aria-label="Read our blog"
title="Read our latest blog posts and updates"
>Blog <span class="arrow"></span></a
>
</div>
</div>

View File

@ -7,49 +7,21 @@
<main>
<section class="hero landing">
<div class="hero-content landing container">
<h1 class="hero-title landing">
Verifiable compute <br />for zero-trust security
</h1>
<p class="subtext">
Cautions verifiable compute platform lets teams run sensitive
workloads with cryptographic proof, full portability, and zero
complexity.
</p>
<div class="hero-cta">
<a href="/blog.html" class="btn">Blog →</a>
</div>
</div>
</section>
<section class="hero landing">
<div class="hero-content landing container">
<h1 class="hero-title landing">
Verifiable compute <br />for zero-trust security
</h1>
<h1 class="hero-title landing">Caution makes compute verifiable</h1>
<p class="subtext">
You deserve to know what runs on your servers. No more black boxes.
Caution gives you cryptographic proof, total portability, and zero
<br />
Caution gives you cryptographic proof, total portability, and no
complexity.
</p>
<div class="hero-cta">
<a href="/blog.html" class="btn">Blog →</a>
</div>
</div>
</section>
<section class="hero landing">
<div class="hero-content landing container">
<h1 class="hero-title landing">
Caution makes <br />
compute verifiable
</h1>
<p class="subtext">
You deserve to know what runs on your servers. No more black boxes.
Caution gives you cryptographic proof, total portability, and zero
complexity.
</p>
<div class="hero-cta">
<a href="/blog.html" class="btn">Blog →</a>
<a
href="/blog.html"
class="btn"
aria-label="Read our blog"
title="Read our latest blog posts and updates"
>Blog <span class="arrow"></span></a
>
</div>
</div>
</section>

View File

@ -18,7 +18,7 @@ Like “zero trust” before it, the term verifiable compute is already being hi
The risks of unverifiable systems are not theoretical; theyve already caused some of the most damaging security incidents of the past decade.
**<a href="https://thehackernews.com/2025/09/solarwinds-releases-hotfix-for-critical.html" target="_blank" rel="noopener noreferrer">SolarWinds (2020)</a>** showed how a compromised software supply chain can cascade globally. Attackers injected malicious code into SolarWinds Orion updates, which were then shipped to thousands of companies and U.S. government agencies. Because customers had no way to verify what software they were actually running, the backdoor spread silently through trusted update channels.
**<a href="https://thehackernews.com/2025/09/solarwinds-releases-hotfix-for-critical.html" target="_blank" rel="noopener noreferrer" title="View article on thehackernews.com">SolarWinds (2020)</a>** showed how a compromised software supply chain can cascade globally. Attackers injected malicious code into SolarWinds Orion updates, which were then shipped to thousands of companies and U.S. government agencies. Because customers had no way to verify what software they were actually running, the backdoor spread silently through trusted update channels.
This is one of the many breaches which demonstrate that without verifiability across the entire stack, organizations have no reliable way to prove the integrity of the systems they depend on.
@ -58,5 +58,5 @@ Our team has chosen a no-compromise approach to solving this problem by building
Caution is the next generation cloud hosting platform launching in 2026. We believe this marks the beginning of a new era of infrastructure: verifiable, open, and resilient by default.
Were building Caution in the open. If youd like to use it, contribute, or partner with us, get in touch at **<a href="mailto:info@caution.co?subject=Website%20Inquiry">
Were building Caution in the open. If youd like to use it, contribute, or partner with us, get in touch at **<a href="mailto:info@caution.co?subject=Website%20Inquiry" title="Contact our team">
info@caution.co</a>**.

View File

@ -5,6 +5,7 @@
--grey: #6f6f6f;
--grey-dark: #232b2b;
--grey-mid: #ccc;
--grey-med: #858585;
--grey-light: #e7e7e7;
--blue-base: #ecf6fd;
--blue-light: #e7f1ff;
@ -196,7 +197,7 @@ em {
}
.hero-title {
max-width: 70rem;
max-width: 45rem;
margin-top: 25rem;
}
@ -346,6 +347,10 @@ img {
opacity: 1;
}
.btn:hover .arrow {
transform: translateX(4px);
}
.nav-logo {
max-width: 50px;
}
@ -458,7 +463,7 @@ img {
.footer-heading,
.copyright {
font-size: 1.1rem;
color: var(--grey-mid);
color: var(--grey-med);
margin: 0;
line-height: 1.7rem;
}