mirror of
				https://github.com/privacyguides/privacyguides.org.git
				synced 2025-10-31 03:26:35 +00:00 
			
		
		
		
	Fix typo of YubiKey, YubiCloud (#2128)
This commit is contained in:
		
							
								
								
									
										2
									
								
								.github/workflows/release.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.github/workflows/release.yml
									
									
									
									
										vendored
									
									
								
							| @@ -42,7 +42,7 @@ jobs: | ||||
|        | ||||
|       - name: Push to production branch | ||||
|         run: | | ||||
|           git push origin main:production | ||||
|           git push origin HEAD:production | ||||
|        | ||||
|       - name: Pages setup | ||||
|         uses: actions/configure-pages@v3 | ||||
|   | ||||
| @@ -23,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S | ||||
|  | ||||
| ### How Do I Protect My Private Keys? | ||||
|  | ||||
| A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. | ||||
| A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. | ||||
|  | ||||
| It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device. | ||||
|  | ||||
|   | ||||
| @@ -123,7 +123,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro | ||||
|  | ||||
| #### :material-check:{ .pg-green } Account Security | ||||
|  | ||||
| Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. | ||||
| Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. | ||||
|  | ||||
| #### :material-information-outline:{ .pg-blue } Data Security | ||||
|  | ||||
|   | ||||
| @@ -48,7 +48,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo | ||||
|  | ||||
| !!! warning | ||||
|  | ||||
|     While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead. | ||||
|     While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. | ||||
|  | ||||
| !!! warning | ||||
|  | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 yeoneer
					yeoneer