summaryrefslogtreecommitdiff
path: root/content/posts/2018/2018-09-04-setting-up-pgp-with-a-yubikey.md
diff options
context:
space:
mode:
Diffstat (limited to 'content/posts/2018/2018-09-04-setting-up-pgp-with-a-yubikey.md')
-rw-r--r--content/posts/2018/2018-09-04-setting-up-pgp-with-a-yubikey.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/content/posts/2018/2018-09-04-setting-up-pgp-with-a-yubikey.md b/content/posts/2018/2018-09-04-setting-up-pgp-with-a-yubikey.md
index 314ba09..278a4d3 100644
--- a/content/posts/2018/2018-09-04-setting-up-pgp-with-a-yubikey.md
+++ b/content/posts/2018/2018-09-04-setting-up-pgp-with-a-yubikey.md
@@ -21,10 +21,10 @@ In this blogpost, I will detail how I set up my security policies in the hopes
it will be able to help out other people looking to improve their security, and
to get feedback to improve my set up as well.
-{< admonition title="note" >}
+{{< admonition title="note" >}}
I am using the Yubikey 4. If you're using another version, some steps may
differ.
-{< / admonition >}
+{{< / admonition >}}
## Installing required software
@@ -287,10 +287,10 @@ need the `cryptsetup` utility to apply the encryption, and to unlock the drive.
You can find out the device name from `dmesg` or `lsblk`. Once you know it,
encrypt the drive with the `luksFormat` subcommand.
-{< admonition title="warning" >}
+{{< admonition title="warning" >}}
Using the wrong name for the device can irrecoverably destroy data from another
drive!
-{< / admonition >}
+{{< / admonition >}}
```txt
cryptsetup luksFormat /dev/sdb