aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorsaturneric <[email protected]>2025-06-28 00:51:51 +0000
committersaturneric <[email protected]>2025-06-28 00:51:51 +0000
commitaf018107e9c8cb94a3eadcf25673215e7ee8b139 (patch)
treeb5a7aa98a06b4d5546dae885a96fcea0b051ec48
parentdocs(overview): refine FAQ section for clarity and conciseness, update GnuPG ... (diff)
downloadManual-main.tar.gz
Manual-main.zip
docs(overview): improve formatting and readability of GPG security section in FAQHEADmain
-rw-r--r--src/content/docs/overview/faq.mdx9
1 files changed, 6 insertions, 3 deletions
diff --git a/src/content/docs/overview/faq.mdx b/src/content/docs/overview/faq.mdx
index 9b02027..4bf3d1e 100644
--- a/src/content/docs/overview/faq.mdx
+++ b/src/content/docs/overview/faq.mdx
@@ -90,10 +90,13 @@ When used correctly, GPG provides strong cryptographic protection:
- Strong algorithms and key sizes are available, in line with modern standards.
- Open source: Its code is continually reviewed by global experts.
-- No central data leaks: No major vulnerability has ever led to a mass compromise of GPG private keys.
-- Common risks arise from user error—weak passphrases, mishandled keys, device malware—not GPG itself.
+- No central data leaks: No major vulnerability has ever led to a mass
+ compromise of GPG private keys.
+- Common risks arise from user error—weak passphrases, mishandled keys, device
+ malware—not GPG itself.
-Bottom line: Your keys and passphrase security are just as important as the software you use.
+Bottom line: Your keys and passphrase security are just as important as the
+software you use.
## Has GnuPG ever been successfully attacked?