Apply suggestions from code review

Co-Authored-By: Matthew Hodgson <matthew@arasphere.net>
pull/977/head
Hubert Chathi 5 years ago committed by GitHub
parent 3e42cf528b
commit 3b2f897c7e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -69,11 +69,11 @@ keys, respectively.
Currently, users will only be allowed to see Currently, users will only be allowed to see
* signatures made by their own master, self-signing or user-signing keys, * signatures made by their own master, self-signing or user-signing keys,
* signatures made by their own devices about their own master key, * signatures made by their own devices about their own master key,
* signatures made by other users' self-signing keys about the other users' own * signatures made by other users' self-signing keys about their own respective
devices, devices,
* signatures made by other users' master keys about the other users' * signatures made by other users' master keys about their respective
self-signing key, or self-signing key, or
* signatures made by other users' devices about the other users' master keys. * signatures made by other users' devices about their respective master keys.
This is done in order to preserve the privacy of social connections. Future This is done in order to preserve the privacy of social connections. Future
proposals may define mechanisms for distributing signatures to other users in proposals may define mechanisms for distributing signatures to other users in
@ -84,7 +84,7 @@ order to allow for other web-of-trust use cases.
Users who have verified individual devices may wish to migrate these Users who have verified individual devices may wish to migrate these
verifications to use cross-signing instead. In order to aid with this, verifications to use cross-signing instead. In order to aid with this,
signatures of a user's master key, made by their own devices, may be uploaded signatures of a user's master key, made by their own devices, may be uploaded
to the server. If another client sees that the user's master key has a valid to the server. If another user's client sees that that a given user's master key has a valid
signature from a device that was previously verified, then the client may signature from a device that was previously verified, then the client may
choose to trust and sign the master key. The client should take precautions to choose to trust and sign the master key. The client should take precautions to
ensure that a stolen device cannot be used to cause it to trust a malicious ensure that a stolen device cannot be used to cause it to trust a malicious

Loading…
Cancel
Save