From 7f52d1918646a04b1839f4ce9170d603d042b8e6 Mon Sep 17 00:00:00 2001 From: Adam Leibson Date: Mon, 17 Aug 2015 14:22:44 -0400 Subject: [PATCH] commit --- en/index.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/en/index.html b/en/index.html index 1c1ac516..23f5d155 100644 --- a/en/index.html +++ b/en/index.html @@ -224,9 +224,9 @@

Advanced

Strong Passphrases with Diceware
-
Human-made passwords tend to either be very easy to guess, or difficult to memorise and easy to forget. Fortunately, if your privacy is more important to you than an extra 10 to 15 minutes of your time, you can use dice to come up with a password which is both strong and memorable using the 'diceware' method.
+
Human-made passwords tend to either be very easy to guess, or difficult to memorise and easy to forget. Fortunately, if your privacy is more important to you than an extra 10 to 15 minutes of your time, you can use dice to come up with a password which is both strong and memorable using the 'Diceware' method.
-
To use the diceware method, you will need dice (preferably 5, but 1 will do) and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
+
To use the Diceware method, you will need dice (preferably 5, but 1 will do) and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
Command line key generation
If you prefer using the command line for a higher degree of control, you can follow the documentation from the GnuPG Mini Howto or The GNU Privacy Handbook. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than the algorithms recommended in the old previously mentioned documentation.
-- 2.25.1