Skip to content

Commit 99eaad3

Browse files
minor readme fixes
1 parent 2392e35 commit 99eaad3

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

README.rst

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,23 +27,23 @@ How it works
2727

2828
When creating the paste:
2929

30-
- the browser generate a random key;
30+
- the browser generates a random key;
3131
- the pasted content is encrypted with this key using AES256;
3232
- the encrypted pasted content is sent to the server;
33-
- the browser receives the paste URL and add the key in the URL hash (#).
33+
- the browser receives the paste URL and adds the key in the URL hash (#).
3434

3535
When reading the paste:
3636

3737
- the browser makes the GET request to the paste URL;
3838
- because the key is in the hash, the key is not part of the request;
39-
- browser gets the encrypted content et decrypt it using the key;
40-
- the pasted decrypted content is displayed and code is colored.
39+
- browser gets the encrypted content end decrypts it using the key;
40+
- the pasted decrypted content is displayed and sourcecode is highlighted.
4141

4242
Key points:
4343

4444
- because the key is in the hash, the key is never sent to the server;
45-
- therefor it won't appear in the server logs;
46-
- all operations, including code coloration, must happens on the client;
45+
- therefore it won't appear in the server logs;
46+
- all operations, including code coloration, happen on the client-side;
4747
- the server is no more than a fancy recipient for the encrypted data.
4848

4949
Other features
@@ -76,15 +76,15 @@ Known issues
7676

7777
- 0bin uses several HTML5/CSS3 features that are not widely supported. In that case we handle the degradation as gracefully as we can.
7878
- The "copy to clipboard" feature is buggy under linux. It's flash, so we won't fix it. Better wait for the HTML5 clipboard API to be implemented in major browsers.
79-
- The pasted content size limit check is not accurate. It's just a safety net, so we thinks it's ok.
79+
- The pasted content size limit check is not accurate. It's just a safety net, so we think it's ok.
8080
- Some url shorteners and other services storing URLs break the encryption key. We will sanitize the URL as much as we can, but there is a limit to what we can do.
8181

8282
What does 0bin not implement?
8383
=================================
8484

8585
* Request throttling. It would be inefficient to do it at the app level, and web servers have robust implementations for it.
8686
* Hash collision prevention: the ratio "probability it happens/consequence seriousness" `is not worth it`_
87-
* Comments: it was initially planed. But comes with a lot of issues so we chose to focus on lower handing fruits.
87+
* Comments: it was initially planed. But comes with a lot of issues so we chose to focus on lower hanging fruits.
8888

8989

9090
.. _moderate the pastebin content: http://www.zdnet.com/blog/security/pastebin-to-hunt-for-hacker-pastes-anonymous-cries-censorship/11336

0 commit comments

Comments
 (0)