summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
authorJoey Hess <joeyh@joeyh.name>2016-08-19 18:13:26 -0400
committerJoey Hess <joeyh@joeyh.name>2016-08-19 18:13:26 -0400
commit24263c298e5db940a849a33ad33648b27f69ec6c (patch)
treebd2af8c4b6a0126c75507d0d7ebd6f6098109d7f
parent8e4bb8051fb0655220e5fc8f87e24d1f6ca3e888 (diff)
downloadkeysafe-24263c298e5db940a849a33ad33648b27f69ec6c.tar.gz
typo
-rw-r--r--keysafe.12
1 files changed, 1 insertions, 1 deletions
diff --git a/keysafe.1 b/keysafe.1
index 4f3bf3e..f5be2b2 100644
--- a/keysafe.1
+++ b/keysafe.1
@@ -29,7 +29,7 @@ to decrypt. This makes it hard for an attacker to crack your password,
because each guess they make costs them.
.PP
Keysafe is designed so that it should take millions of dollars of computer
-time to crack any fairly good password, With a truely good
+time to crack any fairly good password. With a truely good
password, such as four random words, the cracking cost should be many
trillions of dollars. Keysafe checks your password strength (using the
zxcvbn library), and shows an estimate of the cost to crack your password,