From 31c79c8a18913bbe01a9cb1dc6bbd49e228e16bb Mon Sep 17 00:00:00 2001 From: Anton Livaja Date: Mon, 17 Mar 2025 12:17:29 -0700 Subject: [PATCH] minor copy cleanup --- _layouts/services.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_layouts/services.html b/_layouts/services.html index ce399ab..89f6b73 100644 --- a/_layouts/services.html +++ b/_layouts/services.html @@ -75,14 +75,14 @@

Why choose Distrust? Because security shouldn't be based on blind trust, it should be based on distrust, and verifiability. Most organizations treat cybersecurity like people once treated hygiene—poorly.

-

At Distrust, we've identified fundamental methods to eliminate risks at their source. Similarly to how handwashing revolutionized public health by preventing unseen threats like bacteria, our first-principles security methodology brings new levels of security to our clients by eliminating single points of failure, and providing verifiable, resilient protection for your critical systems. +

At Distrust, we've identified fundamental methods to eliminate risks at their source. Similarly to how handwashing revolutionized public health by preventing unseen threats like bacteria, our first-principles security methodology brings new levels of security to our clients by eliminating single points of failure, and providing verifiable, resilient protection for critical systems.