diff --git a/_config.yml b/_config.yml index 878409c..d0577c1 100644 --- a/_config.yml +++ b/_config.yml @@ -8,7 +8,7 @@ banner: "https://distrust.co/assets/base/distrust-thumbnail.png" header_pages: - index.md - services.md -- roadmap.md +- software.md - company.md - contact.md diff --git a/_includes/footer.html b/_includes/footer.html index 77a9371..a3225b0 100644 --- a/_includes/footer.html +++ b/_includes/footer.html @@ -5,7 +5,7 @@
diff --git a/_includes/head.html b/_includes/head.html index 9eef163..28d3fb5 100644 --- a/_includes/head.html +++ b/_includes/head.html @@ -103,7 +103,7 @@ ServicesWe don’t just advise on security. We build it. We open-source it. And we teach organizations how to think critically about risk—because security isn’t about checking boxes.
- + Learn more → diff --git a/_layouts/landing.html b/_layouts/landing.html index 9bcce22..0bf2191 100644 --- a/_layouts/landing.html +++ b/_layouts/landing.html @@ -76,13 +76,13 @@Security is always evolving—so are we. Distrust is building the next generation of security infrastructure that eliminates reliance on any single computer, person, or system. Using full-source bootstrapping, determinism, and quorum-based security, we ensure verifiable, trustless protection at every layer.
Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.
Modern software systems still rely on trust in individuals—maintainers, IT admins, or third-party providers. But what happens when they are compromised? How do you verify that the software running on your systems hasn’t been tampered with?
We’ve identified critical missing pieces needed to remove single points of failure at every level. Our approach covers the complete lifecycle of software from your toolchains and dependencies to how your code is built, signed, verified and deployed.
-By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable.
+By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable. And as everything we do, all our software is open source.
See what we're building → @@ -46,7 +46,7 @@We are actively working on a number of different projects, and looking to fund others. Here is what's on the way and what's coming next.