From ff5b3ee504e65e41aa5b42eba3869f3c0e7fa0a5 Mon Sep 17 00:00:00 2001 From: elitejake <74049394+elitejake@users.noreply.github.com> Date: Sat, 16 Apr 2022 05:47:12 +0000 Subject: [PATCH] Update to relative link in passwords (#1037) --- docs/passwords.en.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/passwords.en.md b/docs/passwords.en.md index 315b04f4..e45b399d 100644 --- a/docs/passwords.en.md +++ b/docs/passwords.en.md @@ -7,7 +7,7 @@ Stay safe and secure online with an encrypted and open-source password manager. ## Password Best Practices - Always use unique passwords. Don't make yourself a victim of "[credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing)". -- Store an exported backup of your passwords in an [encrypted container](encryption) on another storage device. This can be useful if something happens to your device or the service you are using. +- Store an exported backup of your passwords in an [encrypted container](encryption.md) on another storage device. This can be useful if something happens to your device or the service you are using. - If possible, store [Time-based one-time password (TOTP)](https://en.wikipedia.org/wiki/Time-based_one-time_password) tokens in a separate [TOTP app](security/multi-factor-authentication.md#authenticator-apps) and not your password manager. TOTP codes are generated from a "[shared secret](https://en.wikipedia.org/wiki/Time-based_one-time_password#Security)". If the secret is obtained by an adversary they can generate TOTP values. Typically, mobile platforms have better app isolation and more secure methods for storing sensitive credentials. ## Local Password Managers