aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMaximilian Hils <git@maximilianhils.com>2020-04-26 19:29:02 +0200
committerGitHub <noreply@github.com>2020-04-26 19:29:02 +0200
commite9d5b6d9f590e514f27cc32abf001a694a3e8795 (patch)
tree364138d32a3b120ac6e40b5974b1ce1773072633
parentcddcc8dfb109367e615b7d56fc8da1225682ffe4 (diff)
downloadmitmproxy-e9d5b6d9f590e514f27cc32abf001a694a3e8795.tar.gz
mitmproxy-e9d5b6d9f590e514f27cc32abf001a694a3e8795.tar.bz2
mitmproxy-e9d5b6d9f590e514f27cc32abf001a694a3e8795.zip
fix typo
-rw-r--r--docs/src/content/concepts-certificates.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/src/content/concepts-certificates.md b/docs/src/content/concepts-certificates.md
index 20b03dc6..9b5f1a83 100644
--- a/docs/src/content/concepts-certificates.md
+++ b/docs/src/content/concepts-certificates.md
@@ -65,7 +65,7 @@ SSL sites that your client visits. Since your browser won't trust the mitmproxy
CA out of the box, you will see an SSL certificate warning every time you visit
a new SSL domain through mitmproxy. When you are testing a single site through a
browser, just accepting the bogus SSL cert manually is not too much trouble, but
-there are a many circumstances where you will want to configure your testing
+there are many circumstances where you will want to configure your testing
system or browser to trust the mitmproxy CA as a signing root authority. For
security reasons, the mitmproxy CA is generated uniquely on the first start and
is not shared between mitmproxy installations on different devices.