aboutsummaryrefslogtreecommitdiff
path: root/security/pwned-check
diff options
context:
space:
mode:
authorDmitry Marakasov <amdmi3@FreeBSD.org>2022-04-01 15:08:31 +0000
committerDmitry Marakasov <amdmi3@FreeBSD.org>2022-04-01 15:09:49 +0000
commit7b4d1f0b36f88f7fee1898a9cc10c2acf261a123 (patch)
tree2abf1c896f8e1fd58b9c4e767d74a5ba36df7259 /security/pwned-check
parentfda98f5fc2459e6d2a205ca94c44ec038b560866 (diff)
downloadports-7b4d1f0b36f88f7fee1898a9cc10c2acf261a123.tar.gz
ports-7b4d1f0b36f88f7fee1898a9cc10c2acf261a123.zip
*/*: fix trailing whitespace in pkg-descr's
Approved by: portmgr blanket
Diffstat (limited to 'security/pwned-check')
-rw-r--r--security/pwned-check/pkg-descr6
1 files changed, 3 insertions, 3 deletions
diff --git a/security/pwned-check/pkg-descr b/security/pwned-check/pkg-descr
index 60a265c1099e..2769b48e5b8d 100644
--- a/security/pwned-check/pkg-descr
+++ b/security/pwned-check/pkg-descr
@@ -1,6 +1,6 @@
-Pwned Passwords are hundreds of millions of real world passwords exposed in
+Pwned Passwords are hundreds of millions of real world passwords exposed in
data breaches. This exposure makes them unsuitable for ongoing use as they
-are at much greater risk of being used to take over other accounts.
+are at much greater risk of being used to take over other accounts.
This script offers 2 methods to check whether a password has been exposed
in an uncovered breach:
@@ -11,7 +11,7 @@ in an uncovered breach:
2) Local check against a copy of the pawned passwords database.
Since the local copy of the database requires nearly 20 GB of disk space
-(and a download of more than 10 GB of compressed data) the access via the
+(and a download of more than 10 GB of compressed data) the access via the
online check should be preferred, if the compatible with operational and
security requirements.