Skip to content

Commit e0a70fa

Browse files
glyedabrt
andauthored
Wording
Co-authored-by: Tomasz Dąbrowski <[email protected]>
1 parent ffc6639 commit e0a70fa

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/infrastructure_and_maintenance/security/security_checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -237,7 +237,7 @@ For example, if someone succeeds in injecting their JavaScript into your site, t
237237

238238
Consider blocking the use of TLS 1.2 and older versions.
239239
The newer TLS 1.3 does not include the weaker cipher suites that are included in 1.2 and older.
240-
Removing them means attackers can't attempt to force other users to use weak ciphers and eavesdrop on their communications.
240+
Removing them means that attackers can't attempt to force other users to use weak ciphers and eavesdrop on their communications.
241241
TLS 1.3 is as of December 2024 [supported by ca. 97% of global internet users](https://caniuse.com/tls1-3).
242242
If you need to support Internet Explorer or old versions of other browsers, you can disable TLS 1.1 and older, leaving 1.2 and 1.3 enabled.
243243

0 commit comments

Comments
 (0)