aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/README.md
diff options
context:
space:
mode:
authorFranciosi <andre@franciosi.org>2022-08-09 21:20:21 -0300
committerGitHub <noreply@github.com>2022-08-09 21:20:21 -0300
commit085f11a3cc0b744980fc9f72d8ec0f265d99d7f1 (patch)
tree20a8a1c31fc808ca940644af8ba760821084f297 /README.md
parentMerge pull request #311 from michael-k/typo (diff)
downloadYubiKey-Guide-085f11a3cc0b744980fc9f72d8ec0f265d99d7f1.tar.gz
Quick VMware name correction
s/VMWare/VMware
Diffstat (limited to '')
-rw-r--r--README.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md
index fd53da6..4d7b9d9 100644
--- a/README.md
+++ b/README.md
@@ -102,7 +102,7 @@ You will also need several small storage devices (microSD cards work well) for s
To create cryptographic keys, a secure environment that can be reasonably assured to be free of adversarial control is recommended. Here is a general ranking of environments most to least likely to be compromised:
1. Daily-use operating system
-1. Virtual machine on daily-use host OS (using [virt-manager](https://virt-manager.org/), VirtualBox, or VMWare)
+1. Virtual machine on daily-use host OS (using [virt-manager](https://virt-manager.org/), VirtualBox, or VMware)
1. Separate hardened [Debian](https://www.debian.org/) or [OpenBSD](https://www.openbsd.org/) installation which can be dual booted
1. Live image, such as [Debian Live](https://www.debian.org/CD/live/) or [Tails](https://tails.boum.org/index.en.html)
1. Secure hardware/firmware ([Coreboot](https://www.coreboot.org/), [Intel ME removed](https://github.com/corna/me_cleaner))