From 18f76a9068b924039ecba1f0c7b85e4e846cb887 Mon Sep 17 00:00:00 2001 From: yeoneer Date: Fri, 14 Apr 2023 17:31:32 +0900 Subject: [PATCH] Fix typo of YubiKey, YubiCloud (#2128) --- .github/workflows/release.yml | 2 +- docs/basics/email-security.md | 2 +- docs/email.md | 2 +- docs/multi-factor-authentication.md | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 08efb36d..3f18640e 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -42,7 +42,7 @@ jobs: - name: Push to production branch run: | - git push origin main:production + git push origin HEAD:production - name: Pages setup uses: actions/configure-pages@v3 diff --git a/docs/basics/email-security.md b/docs/basics/email-security.md index e4e74fdf..5eb3132f 100644 --- a/docs/basics/email-security.md +++ b/docs/basics/email-security.md @@ -23,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device. diff --git a/docs/email.md b/docs/email.md index eaa9bd90..c6099236 100644 --- a/docs/email.md +++ b/docs/email.md @@ -123,7 +123,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security diff --git a/docs/multi-factor-authentication.md b/docs/multi-factor-authentication.md index ea8d4340..1c0d8862 100644 --- a/docs/multi-factor-authentication.md +++ b/docs/multi-factor-authentication.md @@ -48,7 +48,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo !!! warning - While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead. + While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. !!! warning