Compare commits

...

5 commits

Author SHA1 Message Date
3c06e71c83
Fix typo
All checks were successful
continuous-integration/drone/push Build is passing
2020-08-02 23:45:50 +02:00
7445a76830
Merge branch 'master' of git.friedl.net:incubator/coffer
All checks were successful
continuous-integration/drone/push Build is passing
2020-08-02 23:44:27 +02:00
54a127d88d
Merge branch 'develop' 2020-08-02 23:36:53 +02:00
b30fc766ee Merge branch 'develop' of incubator/coffer into master
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2020-03-05 05:22:05 +00:00
2456b4a416
Merge branch 'hotfix/fix/yaml-line-break' 2020-03-05 06:17:56 +01:00

View file

@ -68,7 +68,7 @@ certificates are distributed and kept secret according to your threat model. An
attacker in control of a certificate can steal secret configuration! attacker in control of a certificate can steal secret configuration!
Coffer does not assume a trust anchor for you. Instead, you are free to choose Coffer does not assume a trust anchor for you. Instead, you are free to choose
your own trust anchor according. In a simple personal server setup this might your own trust anchor. In a simple personal server setup this might
mean just distributing certificates by hand. In a more complex, corporate mean just distributing certificates by hand. In a more complex, corporate
environment you may want to set up a secure, central authority. environment you may want to set up a secure, central authority.