Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion faq/how_to_seal.rst
Original file line number Diff line number Diff line change
Expand Up @@ -157,7 +157,7 @@ unseal the capabilities we pass to these untrusted functions. For example:
[untrusted func] read as char *: Shh! This is a secret!


To address this potential security issue, we can create our own sealer, and seal sensetive
To address this potential security issue, we can create our own sealer, and seal sensitive
capabilities with it instead of the OS canonical one. The reason for doing so is that, in
CHERI, a sealed capability can only be unseal with its original sealer.

Expand Down