From: Adam Leibson Date: Mon, 17 Aug 2015 18:22:44 +0000 (-0400) Subject: commit X-Git-Url: https://vcs.fsf.org/?a=commitdiff_plain;h=7f52d1918646a04b1839f4ce9170d603d042b8e6;p=enc-live.git commit --- diff --git a/en/index.html b/en/index.html index 1c1ac51..23f5d15 100644 --- a/en/index.html +++ b/en/index.html @@ -224,9 +224,9 @@

Advanced

Strong Passphrases with Diceware
-
Human-made passwords tend to either be very easy to guess, or difficult to memorise and easy to forget. Fortunately, if your privacy is more important to you than an extra 10 to 15 minutes of your time, you can use dice to come up with a password which is both strong and memorable using the 'diceware' method.
+
Human-made passwords tend to either be very easy to guess, or difficult to memorise and easy to forget. Fortunately, if your privacy is more important to you than an extra 10 to 15 minutes of your time, you can use dice to come up with a password which is both strong and memorable using the 'Diceware' method.
-
To use the diceware method, you will need dice (preferably 5, but 1 will do) and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
+
To use the Diceware method, you will need dice (preferably 5, but 1 will do) and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
Command line key generation
If you prefer using the command line for a higher degree of control, you can follow the documentation from the GnuPG Mini Howto or The GNU Privacy Handbook. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than the algorithms recommended in the old previously mentioned documentation.