summaryrefslogtreecommitdiffhomepage
path: root/keysafe.1
diff options
context:
space:
mode:
authorJoey Hess <joeyh@joeyh.name>2016-08-19 18:13:26 -0400
committerJoey Hess <joeyh@joeyh.name>2016-08-19 18:13:26 -0400
commit24263c298e5db940a849a33ad33648b27f69ec6c (patch)
treebd2af8c4b6a0126c75507d0d7ebd6f6098109d7f /keysafe.1
parent8e4bb8051fb0655220e5fc8f87e24d1f6ca3e888 (diff)
downloadkeysafe-24263c298e5db940a849a33ad33648b27f69ec6c.tar.gz
typo
Diffstat (limited to 'keysafe.1')
-rw-r--r--keysafe.12
1 files changed, 1 insertions, 1 deletions
diff --git a/keysafe.1 b/keysafe.1
index 4f3bf3e..f5be2b2 100644
--- a/keysafe.1
+++ b/keysafe.1
@@ -29,7 +29,7 @@ to decrypt. This makes it hard for an attacker to crack your password,
because each guess they make costs them.
.PP
Keysafe is designed so that it should take millions of dollars of computer
-time to crack any fairly good password, With a truely good
+time to crack any fairly good password. With a truely good
password, such as four random words, the cracking cost should be many
trillions of dollars. Keysafe checks your password strength (using the
zxcvbn library), and shows an estimate of the cost to crack your password,