diff options
author | Joey Hess <joeyh@joeyh.name> | 2016-08-19 18:13:26 -0400 |
---|---|---|
committer | Joey Hess <joeyh@joeyh.name> | 2016-08-19 18:13:26 -0400 |
commit | 24263c298e5db940a849a33ad33648b27f69ec6c (patch) | |
tree | bd2af8c4b6a0126c75507d0d7ebd6f6098109d7f /keysafe.1 | |
parent | 8e4bb8051fb0655220e5fc8f87e24d1f6ca3e888 (diff) | |
download | keysafe-24263c298e5db940a849a33ad33648b27f69ec6c.tar.gz |
typo
Diffstat (limited to 'keysafe.1')
-rw-r--r-- | keysafe.1 | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -29,7 +29,7 @@ to decrypt. This makes it hard for an attacker to crack your password, because each guess they make costs them. .PP Keysafe is designed so that it should take millions of dollars of computer -time to crack any fairly good password, With a truely good +time to crack any fairly good password. With a truely good password, such as four random words, the cracking cost should be many trillions of dollars. Keysafe checks your password strength (using the zxcvbn library), and shows an estimate of the cost to crack your password, |