From 7194d25b0caf9f26755f0f1959a463ccd87a588f Mon Sep 17 00:00:00 2001 From: Alexander Senier Date: Wed, 8 Nov 2023 12:59:47 +0000 Subject: [PATCH] UG: Hyperlink Ripple20 and Amnesia:33 --- doc/user_guide/10-introduction.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/user_guide/10-introduction.rst b/doc/user_guide/10-introduction.rst index 75b95456f..68f43e5f7 100644 --- a/doc/user_guide/10-introduction.rst +++ b/doc/user_guide/10-introduction.rst @@ -21,7 +21,7 @@ It is not possible to express or check precise invariants characterizing the des Consequently, many implementations contain severe security vulnerabilities waiting to be discovered and exploited by malicious actors. Using standardized formats and protocols and relying on widespread implementations with good quality assurance can help to lower the risk of zero-day exploits. -However, high profile vulnerabilities in commonly used protocol stacks, as found in Ripple20 or Amnesia:33, demonstrate that this by no means guarantees good security. +However, high profile vulnerabilities in commonly used protocol stacks, as found in `Ripple20 `__ or `Amnesia:33 `__, demonstrate that this by no means guarantees good security. While standard implementations receive at least a certain level of scrutiny by the open source community and independent researchers, the situation is even worse for custom data formats and protocol implementations. Specifications (if present at all) and implementations are often only reviewed by a few people.