From 98a0dbf26dec312c37f89a0b53c63a7bdf26c2c1 Mon Sep 17 00:00:00 2001 From: Angristan Date: Sun, 4 Dec 2016 18:49:08 +0100 Subject: [PATCH] =?UTF-8?q?Fix=20typo=20of=20the=20crypto=20update=20?= =?UTF-8?q?=F0=9F=94=90?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Thanks to https://twitter.com/TiCubius/status/805468611875897344 --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 60dcb90..17b8db5 100644 --- a/README.md +++ b/README.md @@ -104,7 +104,7 @@ However I'm far from a crypto expert, so don't hesitate to doubt what I say (I p OpenVPN 2.4 will be a great update on the encryption part, because we'll be able to use elliptic curves, so ECDSA and ECDH (as well for the control channel), and AES GCM. They are faster and more secure. I will, of course, update the script when it will be available. -**Note:** With OpenVPN's default parameters, you have a relatively weak encryption. Nonetheless, it's you trafic is still encrypted, so unless you're under surveillance, probably no one will try to decrypt it. Yet it's not a reason to use old and weak algorithm when there are much better ones available. 😉 +**Note:** With OpenVPN's default parameters, you have a relatively weak encryption. Nonetheless, your trafic is still encrypted, so unless you're under surveillance, probably no one will try to decrypt it. Yet it's not a reason to use old and weak algorithm when there are much better ones available. 😉 ### TLS version