aboutsummaryrefslogtreecommitdiff
path: root/content/blog
diff options
context:
space:
mode:
Diffstat (limited to 'content/blog')
-rw-r--r--content/blog/2021-03-28-gemini-capsule.md4
-rw-r--r--content/blog/2021-03-30-vps-web-server.md2
-rw-r--r--content/blog/2021-08-25-audit-sampling.md2
-rw-r--r--content/blog/2022-07-14-gnupg.md8
4 files changed, 8 insertions, 8 deletions
diff --git a/content/blog/2021-03-28-gemini-capsule.md b/content/blog/2021-03-28-gemini-capsule.md
index 3fd9fd6..9e8d292 100644
--- a/content/blog/2021-03-28-gemini-capsule.md
+++ b/content/blog/2021-03-28-gemini-capsule.md
@@ -12,7 +12,7 @@ in June 2019 as an alternative to HTTP(S) or Gopher. In layman's terms, it's an
alternative way to browse sites (called capsules) that requires a special
browser. Since Gemini is not standardized as an internet standard, normal web
browsers won't be able to load a Gemini capsule. Instead, you'll need to use [a
-Gemini-specific browser](https://gemini.%20circumlunar.space/clients.html).
+Gemini-specific browser](https://gemini.circumlunar.space/clients.html).
The content found within a Gemini page is called
[Gemtext](https://gemini.circumlunar.space/docs/cheatsheet.gmi) and is
@@ -168,4 +168,4 @@ remote: https://builds.sr.ht/~user/job/689803 [.build.yml]
```
Now that you've properly built your Sourcehut page, you can browse to
-your-username.srht.site in a Gemini browser and view the final results. \ No newline at end of file
+your-username.srht.site in a Gemini browser and view the final results.
diff --git a/content/blog/2021-03-30-vps-web-server.md b/content/blog/2021-03-30-vps-web-server.md
index 26ba13e..649c277 100644
--- a/content/blog/2021-03-30-vps-web-server.md
+++ b/content/blog/2021-03-30-vps-web-server.md
@@ -387,7 +387,7 @@ your actions and make sure you didn't miss any steps.
Many websites have fantastic guides to setting up various web servers. This is
one of the areas [where DigitalOcean
-shines](https://www.digitalocean.%20com/community/tutorials). For simpler or
+shines](https://www.digitalocean.com/community/tutorials). For simpler or
more Linux-oriented questions, I suggest using [Linuxize]
(<https://linuxize.com>).
diff --git a/content/blog/2021-08-25-audit-sampling.md b/content/blog/2021-08-25-audit-sampling.md
index c2d3c1d..90562c6 100644
--- a/content/blog/2021-08-25-audit-sampling.md
+++ b/content/blog/2021-08-25-audit-sampling.md
@@ -66,7 +66,7 @@ generation and will allow you to reproduce a sample, given that nothing else
changes. This is critical to the posterity of audit work. After all, how can you
say your audit process is adequately documented if the next person can't run the
code and get the same sample? The final piece here on randomness is to look at
-the [choice](https://docs.%20python.org/3/library/random.html#random.choice)
+the [choice](https://docs.python.org/3/library/random.html#random.choice)
function used above. This is the crux of the generation and can also be examined
for more detailed analysis on its reliability. As far as auditing goes, we will
trust that these functions are mathematically random.
diff --git a/content/blog/2022-07-14-gnupg.md b/content/blog/2022-07-14-gnupg.md
index 77e0623..5be27a6 100644
--- a/content/blog/2022-07-14-gnupg.md
+++ b/content/blog/2022-07-14-gnupg.md
@@ -61,7 +61,7 @@ or the libraries it uses:
([Source](https://www.di.ens.fr/~pnguyen/pub_Ng04.htm))
- GPG versions prior to 1.4.2.1 contain a false positive signature
verification bug.
- ([Source](https://lists.gnupg.%20org/pipermail/gnupg-announce/2006q1/000211.html))
+ ([Source](https://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html))
- GPG versions prior to 1.4.2.2 cannot detect injection of unsigned data. (
[Source](https://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000218.html))
- Libgcrypt, a library used by GPG, contained a bug which enabled full key
@@ -69,13 +69,13 @@ or the libraries it uses:
update in 2017. ([Source](https://lwn.net/Articles/727179/))
- The [ROCA Vulnerability](https://en.wikipedia.org/wiki/ROCA_vulnerability)
affects RSA keys generated by YubiKey 4 tokens.
- ([Source](https://crocs.fi.%20muni.cz/_media/public/papers/nemec_roca_ccs17_preprint.pdf))
+ ([Source](https://crocs.fi.muni.cz/_media/public/papers/nemec_roca_ccs17_preprint.pdf))
- The [SigSpoof Attack](https://en.wikipedia.org/wiki/SigSpoof) allows an
attacker to spoof digital signatures.
- ([Source](https://arstechnica.%20com/information-technology/2018/06/decades-old-pgp-bug-allowed-hackers-to-spoof-just-about-anyones-signature/))
+ ([Source](https://arstechnica.com/information-technology/2018/06/decades-old-pgp-bug-allowed-hackers-to-spoof-just-about-anyones-signature/))
- Libgcrypt 1.9.0 contains a severe flaw related to a heap buffer overflow,
fixed in Libgcrypt 1.9.1
- ([Source](https://web.archive.%20org/web/20210221012505/https://www.theregister.com/2021/01/29/severe_libgcrypt_bug/))
+ ([Source](https://web.archive.org/web/20210221012505/https://www.theregister.com/2021/01/29/severe_libgcrypt_bug/))
### Platforms