Skip to content
This repository was archived by the owner on Sep 3, 2021. It is now read-only.

Commit 2f82d94

Browse files
committed
Spellchecking
1 parent 9da83e8 commit 2f82d94

File tree

6 files changed

+12
-12
lines changed

6 files changed

+12
-12
lines changed

Devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ See: [https://www.nitrokey.com/]
7272

7373
The VivoKey is an NFC-only device designed to cover the bulk of use cases of the YubiKey Neo while also having space for general user-supplied applications such as transit pass emulation via the Fidesmo platform. It is Paralyne-C coated and on a flexible PCB intended for implantation and is currently in human trials.
7474

75-
For people who are not as into scapels, it would of course be possible to insert such a device into a watch band or bracelet.
75+
For people who are not as into scalpels, it would of course be possible to insert such a device into a watch band or bracelet.
7676

7777
![VivoKey](assets/img/vivokey.png)
7878

Use_Cases/Building_Access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Building Access
22

3-
Most building access systems tend to use 125Khz unencrypted HID cards such as a Proxcard II.
3+
Most building access systems tend to use 125KHz unencrypted HID cards such as a Proxcard II.
44

55
These can be cloned trivially to any writable T5577 tag via a professional RFID analysis tool like a Proxmark 3 or even a cheap generic cloner.
66

7-
Other buildings often support 13.56Mhz MiFare NFC cards with no encryption. A smartphone can easily clone these to most NFC tags, or a NFC enabled Security Token like a Yubikey Neo.
7+
Other buildings often support 13.56MHz MiFare NFC cards with no encryption. A smartphone can easily clone these to most NFC tags, or a NFC enabled Security Token like a YubiKey Neo.

Use_Cases/Commit_Signing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ every line of code between releases on the individual cutting a release. In a
3939
large codebase this is an unreasonable expectation.
4040

4141
Having signing and review at every PR between releases distributes
42-
responsibility more fairly. When you sign a commit or sign a mege commit after
42+
responsibility more fairly. When you sign a commit or sign a merge commit after
4343
a PR you are signing only that one chunk of code or subset of changes and
4444
creating a smaller set of checks and balances through the release cycle.
4545

Use_Cases/GPG/Advanced_Setup.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ You should ideally perform these steps from an "airgapped" system, such as from
88
a Linux Live-CD not connected to the internet.
99

1010
Unlike the "Simple Setup" steps, this will result in your Master key being
11-
offline and only Subkeys will exist on the Security Token. This will mean your
11+
offline and only subkeys will exist on the Security Token. This will mean your
1212
Security Token will lack the Certify permission, meaning it will not be able to
1313
sign other GPG keychains.
1414

@@ -19,7 +19,7 @@ of other people.
1919
## Prepare Offline Storage Directory
2020

2121
This directory needs to be kept on an offline device (USB drive, etc) in a
22-
stable location (Fireproof box, safe, under your matress, etc)
22+
stable location (Fireproof box, safe, under your mattress, etc)
2323

2424
This will contain:
2525
* Backup plaintext secret keys, useful for emergencies
@@ -122,7 +122,7 @@ revocation, and further manipulation of your key (and its subkeys).
122122

123123
When the Security Token is set up you likely won't need this password for daily
124124
operation but it should be maintained in your brain. You could also store only
125-
part of the password in memory, and a long complex part in a usb drive in a
125+
part of the password in memory, and a long complex part in a USB drive in a
126126
secure location.
127127

128128
```
@@ -694,7 +694,7 @@ gpg> save
694694
The following is critical to ensure no private keys are left on disk, and that
695695
you are in fact are only relying on the private keys in your Security Token.
696696

697-
If you heeded the advice in this document of working from a LiveCD this still
697+
If you heeded the advice in this document of working from a Live CD this still
698698
serves as a good test.
699699

700700
We opt for a "clean room" approach here to ensure you could use your key as

Use_Cases/GPG/Simple_Setup.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22

33
These steps are the simplest way to initialize a Security Token for GPG however If you lose the key or forget the PIN, you will not be able to recover it!
44

5-
This is only recommended where you universally have administrators or peers capable of revoking and rotating all of your credentials if nessesary.
5+
This is only recommended where you universally have administrators or peers capable of revoking and rotating all of your credentials if necessary.
66

7-
If you are wanting to setup a GPG on a Security Token for mixed or personal use, or are an administator it is recommended to use the Advanced Setup which will allow you an opprotunity to make a secure offline backup of key data.
7+
If you are wanting to setup a GPG on a Security Token for mixed or personal use, or are an administrator it is recommended to use the Advanced Setup which will allow you an opportunity to make a secure offline backup of key data.
88

99
## Configure PIN codes
1010

Use_Cases/SSH.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22

33
## Configure SSH to use your Security Token
44

5-
This assumes you already have a Security Token configured with a GPG Authentication Subkey.
5+
This assumes you already have a Security Token configured with a GPG Authentication subkey.
66

7-
The end result will be that you distribute the SSH Public Key from your Security Token to all VCS systems and servers you normally connect to via SSH. From there you will need to have your key insert it, and tap it once for every connection. You will also be required to tap the key for all SSH Agent forwarding hops removing many of the security issues with traditiional ssh agent forwarding on shared systems.
7+
The end result will be that you distribute the SSH Public Key from your Security Token to all VCS systems and servers you normally connect to via SSH. From there you will need to have your key insert it, and tap it once for every connection. You will also be required to tap the key for all SSH Agent forwarding hops removing many of the security issues with traditional ssh agent forwarding on shared systems.
88

99
### Configure gpg-agent to also behave as an ssh-agent:
1010

0 commit comments

Comments
 (0)