Skip to content

Commit 43675f6

Browse files
committed
fix: various copy feedback
1 parent 43c1e0e commit 43675f6

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

docs/architecture/security/definitions.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ sidebar_position: 2
4040
Data stored in a format that is unreadable without additional information. Usually synonymous to
4141
encrypted, but with additional expectations about how the key is stored. Encrypted data which is
4242
stored together with its decryption key in plain text is not considered to be protected, even
43-
thought it is encrypted.
43+
though it is encrypted.
4444
</dd>
4545
<dt>Communication channel</dt>
4646
<dd>
@@ -57,7 +57,7 @@ message queues, shared memory, and HTTP connections.
5757

5858
- **Confidentiality**: The data is unreadable to unauthorized
5959
parties, typically using encryption.
60-
- **Integrity**: The data cannot be altered or tampered with
60+
- **Integrity**: The data cannot be tampered with or altered
6161
without detection during transmission.
6262

6363
</dd>
@@ -77,16 +77,16 @@ message queues, shared memory, and HTTP connections.
7777
party or parties may not have done so, making the channel trusted by one party but untrusted by
7878
the other(s).
7979
</dd>
80-
<dt>Fully trusted Channel</dt>
80+
<dt>Fully trusted channel</dt>
8181
<dd>
82-
A communication channel where all parties have verified each others identities. This means the
82+
A communication channel where all parties have verified each other's identities. This means the
8383
channel provides confidentiality, integrity, and authenticity, ensuring that the data is secure,
8484
unaltered, and exchanged only between the trusted parties.
8585
</dd>
8686
<dt>Data at rest</dt>
8787
<dd>
8888
Any data that is stored on a device or medium that is not actively being used, processed, or
89-
transmitted. This includes (but is not limited to) data stored on disk on the users devices, or on
89+
transmitted. This includes (but is not limited to) data stored on disk on the user's devices, or on
9090
disk on the server side.
9191
</dd>
9292
<dt>Data in use</dt>

docs/architecture/security/principles/05-minimized-impact-of-security-breaches.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Even with robust security measures in place, user error or unforeseen vulnerabilities can lead to
44
various security breaches, including the compromise of encryption keys or data leaks. Bitwarden
55
should take available actions to help users limit the damage caused by such breaches, both in scope
6-
and duration. This involves:
6+
and duration. This includes:
77

88
- Detecting and invalidating compromised device sessions.
99
- Rotating encryption keys to reduce the risk of “harvest now, decrypt later” attacks (forward

0 commit comments

Comments
 (0)