Skip to content

Commit 5e9107b

Browse files
BasicBelugaLibrarian
authored andcommitted
modified: en/Archive/Development/GPGAuthentication
User Summary: removing gendered language
1 parent 8fe958a commit 5e9107b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

Page/en/Archive/Development/GPGAuthentication.mediawiki

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ At this point, both server and client have each other's public keys, and authent
3939
4040
== NOTES ==
4141

42-
# Username / password is not needed. The GPG key acts as the username, and the password authentication is done locally on a user's computer through the GPG program. GPG encryption is considered extremely secure, and the only way to pass off as another user would be to get a hold of both his private key and his password.
42+
# Username / password is not needed. The GPG key acts as the username, and the password authentication is done locally on a user's computer through the GPG program. GPG encryption is considered extremely secure, and the only way to pass off as another user would be to get a hold of both their private key and their password.
4343
# Because all communication both ways are encrypted and signed, putting up a man-in-the-middle attack is extremely cumbersome. Because the server owner is given the client's key on beforehand, the person attempting man-in-the-middle attack would actually have to disrupt this process first, which can be near-impossible, before even having a chance at the man-in-the-middle-attack in the first place.
4444
4545
== [[en/Archive/Development/Miscellaneous suggestions/Centralised authentication]] ==

0 commit comments

Comments
 (0)