diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2013-11-03 13:20:41 -0800 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2013-11-03 13:20:41 -0800 |
commit | a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e (patch) | |
tree | bdb58ed277c0bd8e6a19c271919fe0e458ed6391 /docs | |
parent | 8c9dcb38167938068fe7b662dc403dd03a8a7ef8 (diff) | |
download | cryptography-a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e.tar.gz cryptography-a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e.tar.bz2 cryptography-a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e.zip |
Get real scary
Diffstat (limited to 'docs')
-rw-r--r-- | docs/glossary.rst | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/docs/glossary.rst b/docs/glossary.rst index b80b4b2b..e4fc8283 100644 --- a/docs/glossary.rst +++ b/docs/glossary.rst @@ -18,7 +18,8 @@ Glossary key Secret data is encoded with a function using this key. Sometimes - multiple keys are used. + multiple keys are used. These **must** be kept secret, if a key is + exposed to an attacker, any data encrypted with it will be exposed. symmetric cryptography Cryptographic operations where encryption and decryption use the same |