Fix formatting problems with bullet lists and tables in RST

pull/1352/head
David Núñez 2019-09-21 22:42:53 +02:00
parent 673aa13b81
commit cf091f245a
3 changed files with 7 additions and 6 deletions

View File

@ -19,7 +19,7 @@ There are no gate-keepers and anyone can use it.
* Intuitive - The network leverages the classic cryptological narrative of Alice and Bob
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
developers write safe, misuse-resistant code.
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives.
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support for other cryptographic primitives.
Access permissions are baked into the underlying encryption,
and access can only be explicitly granted by the data owner via sharing policies.

View File

@ -43,7 +43,7 @@ All staking-related operations done by StakeHolder are performed through the ``n
+----------------------+-------------------------------------------------------------------------------+
| ``divide`` | Create a new stake from part of an existing one |
+----------------------+-------------------------------------------------------------------------------+
| ``restake`` | Manage automatic reward re-staking |
| ``restake`` | Manage automatic reward re-staking |
+----------------------+-------------------------------------------------------------------------------+
**Stake Command Options**

View File

@ -32,12 +32,13 @@ NuCypher
.. _Umbral: https://github.com/nucypher/pyUmbral
The NuCypher network provides accessible, intuitive, and extensible runtimes and interfaces for secrets management and dynamic access control.
* Accessible - The network is permissionless and censorship-resistant.
There are no gate-keepers and anyone can use it.
There are no gate-keepers and anyone can use it.
* Intuitive - The network leverages the classic cryptological narrative of Alice and Bob
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
developers write safe, misuse-resistant code.
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives.
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
developers write safe, misuse-resistant code.
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support for other cryptographic primitives.
Access permissions are baked into the underlying encryption,
and access can only be explicitly granted by the data owner via sharing policies.