aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-10-07 21:05:32 +0200
committerRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-10-07 21:05:32 +0200
commit3936df4362703636fb070433b81da65e865e5d09 (patch)
tree5355cc40ae10ef28d13253dc98fe6d12474a769d
parentcd176c54bbac45690488e392afeaa57ac4b27818 (diff)
fixed rendering error on cgit
-rw-r--r--README.md1
1 files changed, 1 insertions, 0 deletions
diff --git a/README.md b/README.md
index fc54744..63d7ba7 100644
--- a/README.md
+++ b/README.md
@@ -12,6 +12,7 @@ example, malicious and unintended key-usage can be detected. Transparent
key-usage also facilitates verification of falsifiable claims.
Examples include:
+
- Everyone gets the same executable binaries
- A domain does not serve malicious javascript
- A list of key-value pairs is maintained with a certain policy