mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-01 19:16:27 -04:00
fix typos
This commit is contained in:
parent
61ced3aa60
commit
7347b38834
15 changed files with 25 additions and 25 deletions
|
@ -54,7 +54,7 @@ SMS:
|
|||
over to government agencies.)
|
||||
|
||||
* Using `oathtool` in a dedicated, network-isolated Qubes VM allows us to
|
||||
achieve a unqiue combination of security and convenience. The strong isolation
|
||||
achieve a unique combination of security and convenience. The strong isolation
|
||||
Qubes provides allows us to reap the full security benefits of MFA, while
|
||||
virtualization frees us from having to worry about finding and handling a
|
||||
second physical device.
|
||||
|
|
|
@ -13,7 +13,7 @@ Using YubiKey to Qubes authentication
|
|||
You can use YubiKey to enhance Qubes user authentication, for example to mitigate
|
||||
risk of snooping the password. This can also slightly improve security when you have [USB keyboard](https://github.com/marmarek/qubes-app-linux-input-proxy).
|
||||
|
||||
There (at least) two possible configurations: using OTP mode and using challenge-reponse mode.
|
||||
There (at least) two possible configurations: using OTP mode and using challenge-response mode.
|
||||
|
||||
OTP mode
|
||||
--------
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue