diff options
author | Lars Wirzenius <liw@sequoia-pgp.org> | 2021-10-30 11:24:51 +0300 |
---|---|---|
committer | Lars Wirzenius <liw@sequoia-pgp.org> | 2021-10-30 11:24:51 +0300 |
commit | bc83ea294772ff7cb8420cd093952b83f03dcc0f (patch) | |
tree | 9229bcac9e3058139236bb0dd6c69802f72ca70d | |
parent | 58ae8c1a6a747f99dd03c51fb86bf3ff3f0ed7d5 (diff) | |
download | sq-user-guide-bc83ea294772ff7cb8420cd093952b83f03dcc0f.tar.gz |
tighten wording
-rw-r--r-- | sq-guide.md | 15 |
1 files changed, 7 insertions, 8 deletions
diff --git a/sq-guide.md b/sq-guide.md index ac7981f..f77787e 100644 --- a/sq-guide.md +++ b/sq-guide.md @@ -357,11 +357,11 @@ Further, cryptography doesn't protect against violence used to coerce either party in a secure communication from disclosing secrets. Finally, cryptography relies on some assumptions of what kind of -attacks are likely, whether they're based on mathematics or raw +attacks are feasible, whether they're based on mathematics or raw computing power. Over time, attacks on cryptographic protocols, -algorithms, and implementations get stronger. Every few years, +algorithms, and implementations only get stronger. Every few years, attackers have a breakthrough, and some classes of cryptography -suddenly becomes so weak normal people can break them. Then the +suddenly become so weak normal people can break them. Then the purveyors and users of cryptography move to newer, stronger alternatives. @@ -374,11 +374,10 @@ know. # Managing one's own key -This chapter concentrates on creating and managing a key as a digital -representation of oneself. Please see the [glossary](#glossary) for -definitions of terms. Some of the terminology `sq` uses is specific to -cryptography in general, or to OpenPGP, and some is specific to `sq` -itself. +This chapter concentrates on creating and managing a key oneself. +Please see the [glossary](#glossary) for definitions of terms. Some of +the terminology `sq` uses is specific to cryptography in general, or +to OpenPGP, and some is specific to `sq` itself. ## Why use keys and certificates? |