gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-docs] branch master updated (d908b8f -> 168cf44)


From: gnunet
Subject: [taler-docs] branch master updated (d908b8f -> 168cf44)
Date: Sat, 28 Nov 2020 05:48:54 +0100

This is an automated email from the git hooks/post-receive script.

ttn pushed a change to branch master
in repository docs.

    from d908b8f  mark up ‘kdf_id’
     new 563a699  add period at end of sentence
     new aa72dd1  mark up ‘kdf_id’
     new 168cf44  add ‘\ ’ post-markup to keep the ‘s’ separate

The 3 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 anastasis.rst | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/anastasis.rst b/anastasis.rst
index ecfda6b..9572dbb 100644
--- a/anastasis.rst
+++ b/anastasis.rst
@@ -138,7 +138,7 @@ which will be used to derive other keys later. The Hash 
must also include the
 respective **server_salt**. This also ensures that the **kdf_id** is different
 on each server. The use of Argon2 and the respective **server_salt** is 
intended
 to make it difficult to brute-force **kdf_id** values and help protect the 
user's
-privacy. Also this ensures that the **kdf_id**s on every server differs. 
However,
+privacy. Also this ensures that the **kdf_id**\ s on every server differs. 
However,
 we do not assume that the **identifier** or the **kdf_id** cannot be
 determined by an adversary performing a targeted attack, as a user's
 **identifier** is likely to always be known to state actors and may
@@ -151,7 +151,7 @@ likely also be available to other actors.
 
 **identifier**: The secret defined from the user beforehand.
 
-**server_salt**: The salt from the Server
+**server_salt**: The salt from the Server.
 
 **keysize**: The desired output size of the KDF, here 32 bytes.
 
@@ -162,7 +162,7 @@ Verification
 For users to authorize "policy" operations we need an EdDSA key pair.  As we
 cannot assure that the corresponding private key is truly secret, such policy
 operations must never be destructive: Should an adversary learn the private
-key, they could access (and with the kdf_id decrypt) the user's policy (but
+key, they could access (and with the **kdf_id** decrypt) the user's policy (but
 not the core secret), or upload a new version of the
 **encrypted recovery document** (but not delete an existing version).
 

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]