From fc5a433b247927c4b134d7d6028c68837e3e003d Mon Sep 17 00:00:00 2001 From: Andrea Gelmini Date: Wed, 28 Feb 2018 01:34:29 +0100 Subject: Fix typo Change-Id: I03ac8de6528ed33d07fe91e52f50964eb7b74b0d Reviewed-on: https://gerrit.libreoffice.org/50478 Reviewed-by: Michael Stahl Tested-by: Michael Stahl --- source/text/shared/guide/digitalsign_send.xhp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/source/text/shared/guide/digitalsign_send.xhp b/source/text/shared/guide/digitalsign_send.xhp index 4216a412d8..941fe96141 100644 --- a/source/text/shared/guide/digitalsign_send.xhp +++ b/source/text/shared/guide/digitalsign_send.xhp @@ -56,7 +56,7 @@ Your digital signature private key will usually be generated and securely stored by Windows as part of the signature-issuance ceremony. Once the issuing Certificate Authority authority is satisfied that your computer produced the private key and you have satisfied any other identification requirements, the corresponding public key is signed by the Certificate Authority. (For personal keys obtained over the Internet, the private key is generated by your browser and it is not shared with the Certificate Authority.) - If a private key is received by other means or you transfer it from another computer, you can install it on your Windows PC by double-clicking on the private key certificate and providing any required password. This private key may be known to others (such as an organizational or governmental security administation) depending on how it was issued to you. + If a private key is received by other means or you transfer it from another computer, you can install it on your Windows PC by double-clicking on the private key certificate and providing any required password. This private key may be known to others (such as an organizational or governmental security administration) depending on how it was issued to you. Public keys of others that you use to verify documents signed by them and to encrypt by digital signature for their eyes only tend to be retained on your system by the software products that provide confirmation of those signatures and that support encryption using public keys of others. In some cases you will need to manage those public-key certificates yourself. -- cgit