diff options
author | Alyssa Rosenzweig <alyssa@rosenzweig.io> | 2017-03-17 22:43:08 -0700 |
---|---|---|
committer | Alyssa Rosenzweig <alyssa@rosenzweig.io> | 2017-03-17 22:43:08 -0700 |
commit | 8022472fef91c59975f4e6d57097081729f87903 (patch) | |
tree | 84d266bbeb680eea1617c38c0a8acacffba0b7b3 /docs/depthcharge | |
parent | bc677bc862eb6308b4af273fd1bb5fe58bfb19cc (diff) | |
download | librebootfr-8022472fef91c59975f4e6d57097081729f87903.tar.gz librebootfr-8022472fef91c59975f4e6d57097081729f87903.zip |
Typographically correct quotes
Diffstat (limited to 'docs/depthcharge')
-rw-r--r-- | docs/depthcharge/index.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/docs/depthcharge/index.md b/docs/depthcharge/index.md index ae419a88..1e81f7f0 100644 --- a/docs/depthcharge/index.md +++ b/docs/depthcharge/index.md @@ -30,7 +30,7 @@ most of which is executed within depthcharge. A detailed overview of the CrOS security model is available on the dedicated page. -In spite of the CrOS security model, depthcharge won\'t allow booting +In spite of the CrOS security model, depthcharge won't allow booting kernels without verifying their signature and booting from external media or legacy payload unless explicitly allowed: see [configuring verified boot parameters](#configuring_verified_boot_parameters). @@ -138,7 +138,7 @@ that hold a kernel signed with the recovery key. Google provides images of such recovery media for Chrome OS (which are not advised to users as they contain proprietary software).\ -They are signed with Google\'s recovery keys, that are pre-installed on +They are signed with Google's recovery keys, that are pre-installed on the device when it ships. When replacing the full flash of the device, the pre-installed keys are @@ -162,7 +162,7 @@ screen. Configuring verified boot parameters {#configuring_verified_boot_parameters} ==================================== -Depthcharge\'s behavior relies on the verified boot (vboot) reference +Depthcharge's behavior relies on the verified boot (vboot) reference implementation, that can be configured with parameters stored in the verified boot non-volatile storage.\ These parameters can be modified with the **crossystem** tool, that |