aboutsummaryrefslogtreecommitdiffstats
path: root/docs/glossary.rst
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2013-11-03 13:20:41 -0800
committerAlex Gaynor <alex.gaynor@gmail.com>2013-11-03 13:20:41 -0800
commita0516bf23ceb6c02dbc56aa8c39b8df0cf01119e (patch)
treebdb58ed277c0bd8e6a19c271919fe0e458ed6391 /docs/glossary.rst
parent8c9dcb38167938068fe7b662dc403dd03a8a7ef8 (diff)
downloadcryptography-a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e.tar.gz
cryptography-a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e.tar.bz2
cryptography-a0516bf23ceb6c02dbc56aa8c39b8df0cf01119e.zip
Get real scary
Diffstat (limited to 'docs/glossary.rst')
-rw-r--r--docs/glossary.rst3
1 files changed, 2 insertions, 1 deletions
diff --git a/docs/glossary.rst b/docs/glossary.rst
index b80b4b2b..e4fc8283 100644
--- a/docs/glossary.rst
+++ b/docs/glossary.rst
@@ -18,7 +18,8 @@ Glossary
key
Secret data is encoded with a function using this key. Sometimes
- multiple keys are used.
+ multiple keys are used. These **must** be kept secret, if a key is
+ exposed to an attacker, any data encrypted with it will be exposed.
symmetric cryptography
Cryptographic operations where encryption and decryption use the same