commit | a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e | [log] [tgz] |
---|---|---|
author | Alex Gaynor <alex.gaynor@gmail.com> | Sun Nov 03 13:20:41 2013 -0800 |
committer | Alex Gaynor <alex.gaynor@gmail.com> | Sun Nov 03 13:20:41 2013 -0800 |
tree | bdb58ed277c0bd8e6a19c271919fe0e458ed6391 | |
parent | 8c9dcb38167938068fe7b662dc403dd03a8a7ef8 [diff] |
Get real scary
diff --git a/docs/glossary.rst b/docs/glossary.rst index b80b4b2..e4fc828 100644 --- a/docs/glossary.rst +++ b/docs/glossary.rst
@@ -18,7 +18,8 @@ key Secret data is encoded with a function using this key. Sometimes - multiple keys are used. + multiple keys are used. These **must** be kept secret, if a key is + exposed to an attacker, any data encrypted with it will be exposed. symmetric cryptography Cryptographic operations where encryption and decryption use the same