From af018107e9c8cb94a3eadcf25673215e7ee8b139 Mon Sep 17 00:00:00 2001 From: saturneric Date: Sat, 28 Jun 2025 02:51:51 +0200 Subject: docs(overview): improve formatting and readability of GPG security section in FAQ --- src/content/docs/overview/faq.mdx | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/src/content/docs/overview/faq.mdx b/src/content/docs/overview/faq.mdx index 9b02027..4bf3d1e 100644 --- a/src/content/docs/overview/faq.mdx +++ b/src/content/docs/overview/faq.mdx @@ -90,10 +90,13 @@ When used correctly, GPG provides strong cryptographic protection: - Strong algorithms and key sizes are available, in line with modern standards. - Open source: Its code is continually reviewed by global experts. -- No central data leaks: No major vulnerability has ever led to a mass compromise of GPG private keys. -- Common risks arise from user error—weak passphrases, mishandled keys, device malware—not GPG itself. +- No central data leaks: No major vulnerability has ever led to a mass + compromise of GPG private keys. +- Common risks arise from user error—weak passphrases, mishandled keys, device + malware—not GPG itself. -Bottom line: Your keys and passphrase security are just as important as the software you use. +Bottom line: Your keys and passphrase security are just as important as the +software you use. ## Has GnuPG ever been successfully attacked? -- cgit v1.2.3