diff --git a/README.md b/README.md index 9ebf8bc71..7ef424047 100644 --- a/README.md +++ b/README.md @@ -19,7 +19,7 @@ There are no gate-keepers and anyone can use it. * Intuitive - The network leverages the classic cryptological narrative of Alice and Bob (with additional characters where appropriate). This character-based narrative permeates the code-base and helps developers write safe, misuse-resistant code. -* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives. +* Extensible - The network currently supports proxy re-encryption but can be extended to provide support for other cryptographic primitives. Access permissions are baked into the underlying encryption, and access can only be explicitly granted by the data owner via sharing policies. diff --git a/docs/source/guides/staking_guide.rst b/docs/source/guides/staking_guide.rst index 74a5e45af..88f1501a3 100644 --- a/docs/source/guides/staking_guide.rst +++ b/docs/source/guides/staking_guide.rst @@ -43,7 +43,7 @@ All staking-related operations done by StakeHolder are performed through the ``n +----------------------+-------------------------------------------------------------------------------+ | ``divide`` | Create a new stake from part of an existing one | +----------------------+-------------------------------------------------------------------------------+ -| ``restake`` | Manage automatic reward re-staking | +| ``restake`` | Manage automatic reward re-staking | +----------------------+-------------------------------------------------------------------------------+ **Stake Command Options** diff --git a/docs/source/index.rst b/docs/source/index.rst index e88f5c53d..6880a2d81 100644 --- a/docs/source/index.rst +++ b/docs/source/index.rst @@ -32,12 +32,13 @@ NuCypher .. _Umbral: https://github.com/nucypher/pyUmbral The NuCypher network provides accessible, intuitive, and extensible runtimes and interfaces for secrets management and dynamic access control. + * Accessible - The network is permissionless and censorship-resistant. -There are no gate-keepers and anyone can use it. + There are no gate-keepers and anyone can use it. * Intuitive - The network leverages the classic cryptological narrative of Alice and Bob -(with additional characters where appropriate). This character-based narrative permeates the code-base and helps -developers write safe, misuse-resistant code. -* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives. + (with additional characters where appropriate). This character-based narrative permeates the code-base and helps + developers write safe, misuse-resistant code. +* Extensible - The network currently supports proxy re-encryption but can be extended to provide support for other cryptographic primitives. Access permissions are baked into the underlying encryption, and access can only be explicitly granted by the data owner via sharing policies.