gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated: English


From: gnunet
Subject: [taler-anastasis] branch master updated: English
Date: Tue, 20 Oct 2020 11:00:58 +0200

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository anastasis.

The following commit(s) were added to refs/heads/master by this push:
     new 4f3e5c6  English
4f3e5c6 is described below

commit 4f3e5c6256198c841acac1b5a7b289acb0a90669
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Tue Oct 20 11:00:56 2020 +0200

    English
---
 doc/ypsomed/ypsomed.tex | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/doc/ypsomed/ypsomed.tex b/doc/ypsomed/ypsomed.tex
index bd3a517..fc7c8e4 100644
--- a/doc/ypsomed/ypsomed.tex
+++ b/doc/ypsomed/ypsomed.tex
@@ -189,7 +189,7 @@ Authentication data is then added to the encrypted parts 
(e.g. mobile phone numb
   \caption{Distribute parts to the providers}
   \label{fig:step3}
  \end{figure}
- In the last step of the backup procedure the prepared parts are distributed 
to the various provider servers.\\
+ In the last step of the backup procedure, the prepared parts are distributed 
to the various provider servers.\\
 
 \begin{figure}[H]
   \centering
@@ -197,14 +197,14 @@ Authentication data is then added to the encrypted parts 
(e.g. mobile phone numb
   \caption{Send Key and authenticate}
   \label{fig:step1_rec}
  \end{figure}
-In a recovery process the user must authenticate himself with the 
corresponding providers using his stored authentication data. However, since 
these providers cannot yet access the data, the user must send them the second 
key (K2). This key enables them to read only the necessary data.\\
+In a recovery process, the user must authenticate himself with the 
corresponding providers using his stored authentication data. However, since 
these providers cannot yet access the data, the user must send them the second 
key (K2). This key enables them to read only the necessary data to run the 
authorization logic.\\
 \begin{figure}[H]
   \centering
   \includegraphics[scale=0.35]{images/step2_recovery.eps}
   \caption{Authenticate and receive parts}
   \label{fig:step2_rec}
  \end{figure}
-If the user has authenticated himself correctly, he will receive the encrypted 
parts of the core secret from the respective providers. The user can decrypt 
these parts with the first key (K1).\\
+Users that have successfully authorized data recovery will receive the 
encrypted parts of the core secret from the respective providers. They can then 
decrypt these parts with the first key (K1).\\
 \begin{figure}[H]
   \centering
   \includegraphics[scale=0.3]{images/step3_recovery.eps}

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]