aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--src/content/docs/overview/faq.mdx9
1 files changed, 6 insertions, 3 deletions
diff --git a/src/content/docs/overview/faq.mdx b/src/content/docs/overview/faq.mdx
index 9b02027..4bf3d1e 100644
--- a/src/content/docs/overview/faq.mdx
+++ b/src/content/docs/overview/faq.mdx
@@ -90,10 +90,13 @@ When used correctly, GPG provides strong cryptographic protection:
- Strong algorithms and key sizes are available, in line with modern standards.
- Open source: Its code is continually reviewed by global experts.
-- No central data leaks: No major vulnerability has ever led to a mass compromise of GPG private keys.
-- Common risks arise from user error—weak passphrases, mishandled keys, device malware—not GPG itself.
+- No central data leaks: No major vulnerability has ever led to a mass
+ compromise of GPG private keys.
+- Common risks arise from user error—weak passphrases, mishandled keys, device
+ malware—not GPG itself.
-Bottom line: Your keys and passphrase security are just as important as the software you use.
+Bottom line: Your keys and passphrase security are just as important as the
+software you use.
## Has GnuPG ever been successfully attacked?