pashage

Yet Another Opinionated Re-engineering of the Unix Password Store
git clone https://git.instinctive.eu/pashage.git
Log | Files | Refs | README | LICENSE

commit d98f393ed53375021487b1a6cfe4afc686105b9d
parent 0e51afc5f407be08ffcfa8c7eaceb7f588e16e04
Author: Natasha Kerensikova <natgh@instinctive.eu>
Date:   Tue, 10 Sep 2024 16:14:22 +0000

English wording is improved

Thanks to bsdsx on #gcu
Diffstat:
MREADME.md | 2+-
Msrc/pashage.sh | 2+-
2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/README.md b/README.md @@ -22,7 +22,7 @@ Security is not branded as a core objective, because the author does not have the clout to declare anything secure, and you should probably not trust random READMEs anyway. However the simplicity should help you assess whether this password store -is a worthwhile compromise for _your_ threat model. +is a worthwhile trade-off for _your_ threat model. For the reference, the author has views [similar to those of Filippo Valsorda](https://words.filippo.io/dispatches/passage/) and considers diff --git a/src/pashage.sh b/src/pashage.sh @@ -208,7 +208,7 @@ scm_rm() { # ACTIONS # ########### -# Copy or move (depending on ${ACTION}) a secret file or dectory +# Copy or move (depending on ${ACTION}) a secret file or directory # $1: source name # $2: destination name # ACTION: Copy or Move