mirror of https://github.com/nucypher/nucypher.git
Fix formatting problems with bullet lists and tables in RST
parent
673aa13b81
commit
cf091f245a
|
@ -19,7 +19,7 @@ There are no gate-keepers and anyone can use it.
|
|||
* Intuitive - The network leverages the classic cryptological narrative of Alice and Bob
|
||||
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
|
||||
developers write safe, misuse-resistant code.
|
||||
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives.
|
||||
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support for other cryptographic primitives.
|
||||
|
||||
Access permissions are baked into the underlying encryption,
|
||||
and access can only be explicitly granted by the data owner via sharing policies.
|
||||
|
|
|
@ -43,7 +43,7 @@ All staking-related operations done by StakeHolder are performed through the ``n
|
|||
+----------------------+-------------------------------------------------------------------------------+
|
||||
| ``divide`` | Create a new stake from part of an existing one |
|
||||
+----------------------+-------------------------------------------------------------------------------+
|
||||
| ``restake`` | Manage automatic reward re-staking |
|
||||
| ``restake`` | Manage automatic reward re-staking |
|
||||
+----------------------+-------------------------------------------------------------------------------+
|
||||
|
||||
**Stake Command Options**
|
||||
|
|
|
@ -32,12 +32,13 @@ NuCypher
|
|||
.. _Umbral: https://github.com/nucypher/pyUmbral
|
||||
|
||||
The NuCypher network provides accessible, intuitive, and extensible runtimes and interfaces for secrets management and dynamic access control.
|
||||
|
||||
* Accessible - The network is permissionless and censorship-resistant.
|
||||
There are no gate-keepers and anyone can use it.
|
||||
There are no gate-keepers and anyone can use it.
|
||||
* Intuitive - The network leverages the classic cryptological narrative of Alice and Bob
|
||||
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
|
||||
developers write safe, misuse-resistant code.
|
||||
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives.
|
||||
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
|
||||
developers write safe, misuse-resistant code.
|
||||
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support for other cryptographic primitives.
|
||||
|
||||
Access permissions are baked into the underlying encryption,
|
||||
and access can only be explicitly granted by the data owner via sharing policies.
|
||||
|
|
Loading…
Reference in New Issue