diff --git a/doc/EN/faq.org b/doc/EN/faq.org index b78a177c..0e55bf19 100644 --- a/doc/EN/faq.org +++ b/doc/EN/faq.org @@ -209,7 +209,7 @@ ssh username@mydomainname -p 2222 sudo control #+END_SRC -Select *Security settings* then *Create a new Encrypt certificate*. +Select *Security settings* then *Create a new Let's Encrypt certificate*. One thing to be aware of is that Let's Encrypt doesn't support many dynamic DNS subdomains, such as those from freeDNS, so to run Hubzilla and GNU Social you will need to have your own official domains for those. There are many sites from which you can buy cheap domain names, and while this isn't ideal in terms of making you dependent upon another company it's the only option currently. * How do I renew a Let's Encrypt certificate? @@ -231,7 +231,7 @@ ssh username@mydomainname -p 2222 sudo control #+END_SRC -Select *Security settings* then *Create a new Encrypt certificate*. +Select *Security settings* then *Create a new Let's Encrypt certificate*. * Why use self-signed certificates? Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up /scary-scary looking/ browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is /no certainty about who that connection is with/. diff --git a/website/EN/faq.html b/website/EN/faq.html index 6ce02129..400c5aa4 100644 --- a/website/EN/faq.html +++ b/website/EN/faq.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -570,7 +570,7 @@ sudo control

-Select Security settings then Create a new Encrypt certificate. +Select Security settings then Create a new Let's Encrypt certificate.

@@ -616,7 +616,7 @@ sudo control

-Select Security settings then Create a new Encrypt certificate. +Select Security settings then Create a new Let's Encrypt certificate.