Index: native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
diff --git a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
index a43d829d7e7ca1a473f043e9d471a08fc6762f2a..1ae40419148da7b3b5b288c2da6ccf378442daf5 100644 |
--- a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
+++ b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
@@ -2,13 +2,13 @@ |
<section id="arm-32-bit-sandbox"> |
<h1 id="arm-32-bit-sandbox">ARM 32-bit Sandbox</h1> |
-<p>Native Client for ARM is a method for running programs—even malicious |
-ones—safely, on computers that use 32-bit ARM processors. It’s an |
-extension of earlier work on Native Client for x86 processors. This |
-security is provided with a low performance overhead of about 10% over |
-regular ARM code, and as you’ll see in this document the sandbox model |
-is beautifully simple, meaning that the trusted codebase is much easier |
-to validate.</p> |
+<p>Native Client for ARM is a sandboxing technology for running |
+programs—even malicious ones—safely, on computers that use 32-bit |
+ARM processors. The ARM sandbox is an extension of earlier work on |
+Native Client for x86 processors. Security is provided with a low |
+performance overhead of about 10% over regular ARM code, and as you’ll |
+see in this document the sandbox model is beautifully simple, meaning |
+that the trusted codebase is much easier to validate.</p> |
<p>As an implementation detail, the Native Client 32-bit ARM sandbox is |
currently used by Portable Native Client to execute code on 32-bit ARM |
machines in a safe manner. The portable bitcode contained in a <strong>pexe</strong> |