diff options
-rw-r--r-- | src/content/docs/overview/faq.mdx | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/src/content/docs/overview/faq.mdx b/src/content/docs/overview/faq.mdx index 9b02027..4bf3d1e 100644 --- a/src/content/docs/overview/faq.mdx +++ b/src/content/docs/overview/faq.mdx @@ -90,10 +90,13 @@ When used correctly, GPG provides strong cryptographic protection: - Strong algorithms and key sizes are available, in line with modern standards. - Open source: Its code is continually reviewed by global experts. -- No central data leaks: No major vulnerability has ever led to a mass compromise of GPG private keys. -- Common risks arise from user error—weak passphrases, mishandled keys, device malware—not GPG itself. +- No central data leaks: No major vulnerability has ever led to a mass + compromise of GPG private keys. +- Common risks arise from user error—weak passphrases, mishandled keys, device + malware—not GPG itself. -Bottom line: Your keys and passphrase security are just as important as the software you use. +Bottom line: Your keys and passphrase security are just as important as the +software you use. ## Has GnuPG ever been successfully attacked? |