@@ -62,14 +62,14 @@ and verify metadata files.
6262To begin, cryptographic keys are generated with the repository tool. However,
6363before metadata files can be validated by clients and target files fetched in a
6464secure manner, public keys must be pinned to particular metadata roles and
65- metadata signed by the role's private keys. After covering keys, the four
66- required top-level metadata are created next. Examples are given demonstrating
67- the expected work flow, where the metadata roles are created in a specific
68- order, keys imported and loaded, and metadata signed and written to disk.
69- Lastly, target files are added to the repository, and a custom delegation
70- performed to extend the default roles of the repository. By the end, a fully
71- populated TUF repository is generated that can be used by clients to securely
72- download updates.
65+ metadata signed by role's private keys. After covering keys, the four required
66+ top-level metadata are created next. Examples are given demonstrating the
67+ expected work flow, where the metadata roles are created in a specific order,
68+ keys imported and loaded, and metadata signed and written to disk. Lastly,
69+ target files are added to the repository, and a custom delegation performed to
70+ extend the default roles of the repository. By the end, a fully populated TUF
71+ repository is generated that can be used by clients to securely download
72+ updates.
7373
7474### Keys ###
7575The repository tool supports multiple public-key algorithms, such as
0 commit comments