From a98a1e4c5b900835f843f0e12f4d09d9fbcdeeae Mon Sep 17 00:00:00 2001 From: Daniel Gray Date: Thu, 7 Apr 2022 09:22:08 +0000 Subject: [PATCH] Fix broken link (#933) --- docs/passwords.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/passwords.md b/docs/passwords.md index 1baff6e7..1d26bc64 100644 --- a/docs/passwords.md +++ b/docs/passwords.md @@ -7,7 +7,7 @@ Stay safe and secure online with an encrypted and open-source password manager. ## Password Best Practices - Always use unique passwords. Don't make yourself a victim of "[credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing)". -- Store an exported backup of your passwords in an [encrypted container](/file-encryption) on another storage device. This can be useful if something happens to your device or the service you are using. +- Store an exported backup of your passwords in an [encrypted container](/encryption) on another storage device. This can be useful if something happens to your device or the service you are using. - If possible, store [Time-based one-time password (TOTP)](https://en.wikipedia.org/wiki/Time-based_one-time_password) tokens in a separate [TOTP app](/multi-factor-authentication) and not your password manager. TOTP codes are generated from a "[shared secret](https://en.wikipedia.org/wiki/Time-based_one-time_password#Security)". If the secret is obtained by an adversary they can generate TOTP values. Typically, mobile platforms have better app isolation and more secure methods for storing sensitive credentials. ## Local Password Managers