  | 
Security |  
	      
		 
		 
		 
	      
	      
		- 
		  A reliable and secure OS is the base of security. We
		  will use a hardened version of Linux which is already
		  known for this.
		
 - All remote accesses to the system will
		  be encrypted and authentified via SSH and HTTPS to avoid
		  risks of snooping on the network for passwords.
		
 - A smart card
		    reader will allow the use of smart cards to
		  hold encryption keys, or lock local accesses to the
		  system.
	      
  
	    
 |  
 
 | 
  |