<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>On Feb 24, 2013, at 14:37, Simon Forman <<a href="mailto:forman.simon@gmail.com">forman.simon@gmail.com</a>> wrote:</div><div><br></div><blockquote type="cite"><div><br><span>It seems like I should concentrate on systems and tools that are more</span><br><span>well-documented and supported, as the learning curves and security</span><br><span>provided are roughly the same (for my purposes.)</span><br><span></span><br><span>~Simon</span><br></div></blockquote><div><br></div>A comparison of modern approaches to desktop security, along with a few threat models:<br><div><br></div><div><span style="font-family: '.HelveticaNeueUI'; font-size: 15px; line-height: 19px; white-space: nowrap; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: none; "> <a href="http://theinvisiblethings.blogspot.co.uk/2012/09/how-is-qubes-os-different-from.html">http://theinvisiblethings.blogspot.co.uk/2012/09/how-is-qubes-os-different-from.html</a></span></div></body></html>