[git] gnupg-doc - branch, master, updated. 6a2296632f4d2c528160f9f424ae9aafe00ffaa3

by Neal H. Walfield cvs at cvs.gnupg.org
Mon Sep 19 20:16:08 CEST 2016


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GnuPG website and other docs".

The branch, master has been updated
       via  6a2296632f4d2c528160f9f424ae9aafe00ffaa3 (commit)
      from  13367dca28e4aff778ef7a9849e27549a801f22a (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 6a2296632f4d2c528160f9f424ae9aafe00ffaa3
Author: Neal H. Walfield <neal at gnu.org>
Date:   Mon Sep 19 20:16:04 2016 +0200

    blog: Minor edits.
    
    (Thanks Werner)

diff --git a/misc/blog.gnupg.org/20160919-openpgp-conf.org b/misc/blog.gnupg.org/20160919-openpgp-conf.org
index 198c2b2..16bb869 100644
--- a/misc/blog.gnupg.org/20160919-openpgp-conf.org
+++ b/misc/blog.gnupg.org/20160919-openpgp-conf.org
@@ -50,13 +50,13 @@ do with making it easier to get the components, and more to do with
 security: getting documentation for secure chips, for instance,
 requires signing an NDA and, due to their specialized nature, are more
 likely to have a backdoor.  Instead, the GnuK uses a general purpose
-CPU.  To protect the secret key material, it uses the flash ROM
-protection feature.  There are currently discussions underway to
-further increase the security of this by partially decrypting the
-secret key material on the host with its much more capable CPU, which
-would make a brute force attack significantly more expensive should
-the key material be extracted.  The GnuK can currently be ordered
-either from [[https://www.seeedstudio.com/FST-01-without-Enclosure-p-1276.html][seeed]] or the [[https://shop.fsf.org/storage-devices/neug-usb-true-random-number-generator][FSF]].
+MCU (microcontroller unit).  To protect the secret key material, it
+uses the flash ROM protection feature.  There are currently
+discussions underway to further increase the security of this by
+partially decrypting the secret key material on the host with its much
+more capable CPU, which would make a brute force attack significantly
+more expensive should the key material be extracted.  The GnuK can
+currently be ordered either from [[https://www.seeedstudio.com/FST-01-without-Enclosure-p-1276.html][seeed]] or the [[https://shop.fsf.org/storage-devices/neug-usb-true-random-number-generator][FSF]].
 
 Andre discussed [[https://files.intevation.de/users/aheinecke/gpgme.pdf][how to use GPGME]].  The main takeaway is that although
 GPGME's API is sometimes inconveniently low-level and some features
@@ -77,9 +77,9 @@ submitted those for PHP, Perl, Python and Bash, and they will be part
 of the next GnuPG release.
 
 Another talk included a discussion of encrypted mailing list software
-and the current state of Schleuder by Iif and paz.  Schleuder is
+and the current state of Schleuder by Ilf and Paz.  Schleuder is
 apparently the only encrypted mailing list software that currently
-works (its also actively maintained).  Its design, however, requires
+works (it is also actively maintained).  Its design, however, requires
 that the mailing list server be able to decrypt the messages in order
 to reencrypt them to all of the subscribers.  The authors would like a
 better solution, but, as they point out, there are ideas out there
@@ -97,6 +97,6 @@ contracted]], [[https://www.gnupg.org/conf/2016/openpgp-2016-a-few-concerns.pdf]
 UX decisions]], [[https://www.gnupg.org/conf/2016/openpgp-2016-bypass-pinentry.pdf][how to bypass pinentry]], [[https://sks-keyservers.net/files/2016-09_OpenPGP-Conf-sks-keyservers.pdf][an update on the sks keyservers]],
 an overview of PEP, and an analysis of the keyserver data.
 
-Given our very positive reactions from the participants and our own
+Given the very positive reactions from the participants and our own
 positive impressions, we expect there to be a second edition of the
 conference in the near future.

-----------------------------------------------------------------------

Summary of changes:
 misc/blog.gnupg.org/20160919-openpgp-conf.org | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)


hooks/post-receive
-- 
The GnuPG website and other docs
http://git.gnupg.org




More information about the Gnupg-commits mailing list