Skip to content

Commit e5b36c6

Browse files
committed
fixed coderabbit's nitpicks
1 parent 5e60c7e commit e5b36c6

File tree

4 files changed

+10
-10
lines changed

4 files changed

+10
-10
lines changed

content/blog/2022-12-08-boxcryptor-shuts-down-find-your-cloud-encryption-alternative.en.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ We are here to stay and offer you the chance to try our open-source software. Cr
1212

1313
If you're looking for a replacement, you've come to the right place. We compare the features of Boxcryptor with those of Cryptomator. See for yourself!
1414

15-
<img class="inline-block" src="/img/comparisons/cryptobot-analysis.png" srcset="/img/comparisons/cryptobot-analysis.png 1x, /img/comparisons/[email protected] 2x" alt="Cryptomator is constantly analysed by experts using modern tools." />
15+
<img class="inline-block" src="/img/comparisons/cryptobot-analysis.png" srcset="/img/comparisons/cryptobot-analysis.png 1x, /img/comparisons/[email protected] 2x" alt="Cryptomator is constantly analyzed by experts using modern tools." />
1616

1717
## Features of Boxcryptor
1818

content/comparisons/boxcryptor-alternative.en.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ comparison:
104104

105105
<p class="lead">Boxcryptor and the alternative Cryptomator serve the same purpose: to secure your privacy while conveniently storing data in the cloud. What exactly is the difference between them? And which suits your needs better? Find out here.</p>
106106

107-
<img class="inline-block" src="/img/comparisons/cryptobot-analysis.png" srcset="/img/comparisons/cryptobot-analysis.png 1x, /img/comparisons/[email protected] 2x" alt="Cryptomator is constantly analysed by experts using modern tools." />
107+
<img class="inline-block" src="/img/comparisons/cryptobot-analysis.png" srcset="/img/comparisons/cryptobot-analysis.png 1x, /img/comparisons/[email protected] 2x" alt="Cryptomator is constantly analyzed by experts using modern tools." />
108108

109109
You want your sensitive data to be secure in the cloud. But so far, no encryption solution has been able to convince you?
110110

content/comparisons/veracrypt-alternative.de.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ comparison:
4545
<i class="relative fas fa-check-circle text-xl lg:text-2xl text-primary">
4646
<i class="absolute top-0 right-0 translate-x-1/2 -translate-y-1/2 fas fa-info-circle text-xs text-gray-600 bg-white border border-white rounded-full"></i>
4747
</i>
48-
<div class="tooltip tooltip-center rounded-sm shadow-md bg-white text-xs w-max max-w-3xs p-2">Mobile-Apps sind nicht offiziell.</div>
48+
<div class="tooltip tooltip-center rounded-sm shadow-md bg-white text-xs w-max max-w-3xs p-2">Mobile-Apps werden nicht offiziell unterstützt.</div>
4949
</div>
5050
securityRelevantFeatures:
5151
fileContentEncryption: |
@@ -116,7 +116,7 @@ Es wurde für die Verschlüsselung lokaler und externer Laufwerke entwickelt, wa
116116
<tr>
117117
<td class="font-p font-bold p-2 lg:p-4">Primärer Zweck</td>
118118
<td class="font-p p-2 lg:p-4">Verschlüsselung von Dateien speziell für Cloud-Speicher (z.B. Google Drive, Dropbox)</td>
119-
<td class="font-p p-2 lg:p-4">Festplattenverschlüsselung (ganze Laufwerke, Partitionen und Container-Dateien)</td>
119+
<td class="font-p p-2 lg:p-4">Festplattenverschlüsselung (ganze Laufwerke, Partitionen und Containerdateien)</td>
120120
</tr>
121121
<tr>
122122
<td class="font-p font-bold p-2 lg:p-4">Benutzerfreundlichkeit</td>
@@ -131,7 +131,7 @@ Es wurde für die Verschlüsselung lokaler und externer Laufwerke entwickelt, wa
131131
<tr>
132132
<td class="font-p font-bold p-2 lg:p-4">Schlüssellänge & Algorithmen</td>
133133
<td class="font-p p-2 lg:p-4">Setzt auf AES-256, eine der bewährtesten Verschlüsselungsmethoden</td>
134-
<td class="font-p p-2 lg:p-4">Bietet AES-256, Serpent, Twofish oder deren Kombinationen mit hoher Anpassungsfähigkeit</td>
134+
<td class="font-p p-2 lg:p-4">Bietet AES-256, Serpent, Twofish, oder deren Kombinationen mit hoher Anpassungsfähigkeit</td>
135135
</tr>
136136
<tr>
137137
<td class="font-p font-bold p-2 lg:p-4">Cloud-Integration</td>
@@ -162,7 +162,7 @@ VeraCrypt bietet viele Anpassungsoptionen und eine stärkere Kontrolle über die
162162

163163
Beide Tools verwenden AES-256 als primären Algorithmus, der als einer der sichersten Verschlüsselungsstandards gilt.
164164

165-
VeraCrypt erlaubt zusätzlich die Nutzung anderer Algorithmen wie:
165+
VeraCrypt erlaubt zusätzlich die Nutzung anderer Algorithmen, wie:
166166

167167
- Serpent
168168
- Twofish

content/comparisons/veracrypt-alternative.en.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ comparison:
4545
<i class="relative fas fa-check-circle text-xl lg:text-2xl text-primary">
4646
<i class="absolute top-0 right-0 translate-x-1/2 -translate-y-1/2 fas fa-info-circle text-xs text-gray-600 bg-white border border-white rounded-full"></i>
4747
</i>
48-
<div class="tooltip tooltip-center rounded-sm shadow-md bg-white text-xs w-max max-w-3xs p-2">Mobile apps are not official.</div>
48+
<div class="tooltip tooltip-center rounded-sm shadow-md bg-white text-xs w-max max-w-3xs p-2">Mobile apps are not officially supported.</div>
4949
</div>
5050
securityRelevantFeatures:
5151
fileContentEncryption: |
@@ -75,7 +75,7 @@ comparison:
7575

7676
<p class="lead">Security and privacy are more important than ever. If you want to protect your files, there are several encryption tools available — two of the most well-known are Cryptomator and VeraCrypt. Both tools are free, open-source, and offer strong encryption options. But which one is right for you?</p>
7777

78-
<img class="inline-block" src="/img/comparisons/cryptobot-analysis.png" srcset="/img/comparisons/cryptobot-analysis.png 1x, /img/comparisons/[email protected] 2x" alt="Cryptomator is constantly analysed by experts using modern tools." />
78+
<img class="inline-block" src="/img/comparisons/cryptobot-analysis.png" srcset="/img/comparisons/cryptobot-analysis.png 1x, /img/comparisons/[email protected] 2x" alt="Cryptomator is constantly analyzed by experts using modern tools." />
7979

8080
In this article, we compare Cryptomator and VeraCrypt and explain how each solution fits different needs. With Cryptomator Hub, Cryptomator also offers a way to centrally manage encrypted data for teams — an added benefit for organizations.
8181

@@ -116,7 +116,7 @@ It is designed to encrypt local and external drives, allowing users to secure en
116116
<tr>
117117
<td class="font-p font-bold p-2 lg:p-4">Primary Purpose</td>
118118
<td class="font-p p-2 lg:p-4">File encryption specifically for cloud storage (e.g., Google Drive, Dropbox)</td>
119-
<td class="font-p p-2 lg:p-4">Full disk encryption (entire drives, partitions, and container files)</td>
119+
<td class="font-p p-2 lg:p-4">Full-disk encryption (entire drives, partitions, and container files)</td>
120120
</tr>
121121
<tr>
122122
<td class="font-p font-bold p-2 lg:p-4">Ease of Use</td>
@@ -162,7 +162,7 @@ VeraCrypt offers more customization and greater control over encryption, but thi
162162

163163
Both tools use AES-256 as their primary algorithm, which is widely considered one of the most secure encryption standards.
164164

165-
VeraCrypt also allows the use of other algorithms like:
165+
VeraCrypt also allows the use of other algorithms such as:
166166

167167
- Serpent
168168
- Twofish

0 commit comments

Comments
 (0)