summaryrefslogtreecommitdiff
path: root/doc/design/encryption.mdwn
diff options
context:
space:
mode:
authorGravatar Joey Hess <joey@kitenet.net>2011-04-05 14:29:44 -0400
committerGravatar Joey Hess <joey@kitenet.net>2011-04-05 14:29:44 -0400
commita301a38d9969febdea3a4f3d3eb2d98077d3d66f (patch)
treea5308f4717a35f1a24aa3c55e9cb357507139bd7 /doc/design/encryption.mdwn
parent683ad73e7da14ac61888e17bcb6db4c83956fce8 (diff)
redundancy
Diffstat (limited to 'doc/design/encryption.mdwn')
-rw-r--r--doc/design/encryption.mdwn2
1 files changed, 0 insertions, 2 deletions
diff --git a/doc/design/encryption.mdwn b/doc/design/encryption.mdwn
index 0242aabeb..f8f8656a7 100644
--- a/doc/design/encryption.mdwn
+++ b/doc/design/encryption.mdwn
@@ -43,8 +43,6 @@ At a high level, an encryption backend needs to support these operations:
* Clean up.
-* Configure an encryption key to use.
-
The rest of this page will describe a single encryption backend using GPG.
Probably only one will be needed, but who knows? Maybe that backend will
turn out badly designed, or some other encryptor needed. Designing