From 079641675ef01e43bea69923b3bbebe2993135d0 Mon Sep 17 00:00:00 2001 From: s2 Date: Sun, 8 Jan 2023 15:57:02 +0100 Subject: [PATCH] fix readme link --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index b4dea92..e36598c 100644 --- a/README.md +++ b/README.md @@ -4,13 +4,13 @@ If you received a message from someone that was encrypted with this script, you can decrypt it with your ssh private key using the following command without installing anything: ``` -bash <(curl -s https://github.com/S2-/sshenc.sh/sshenc.sh) -s ~/.ssh/id_rsa < file-containing-the-encrypted-text.txt +bash <(curl -s https://raw.githubusercontent.com/S2-/sshenc.sh/master/sshenc.sh) -s ~/.ssh/id_rsa < file-containing-the-encrypted-text.txt ``` sshenc.sh uses openssl under the hood, so you need to have that installed in your path to make it work. ## Install ``` -curl -O https://github.com/S2-/sshenc.sh/sshenc.sh +curl -O https://raw.githubusercontent.com/S2-/sshenc.sh/master/sshenc.sh chmod +x sshenc.sh ``` @@ -42,7 +42,7 @@ sshenc.sh -s ~/.ssh/id_rsa < encrypted.txt Also, a new `-iter` parameter to explicitly specify a given number of iterations on the password in deriving the encryption key was added. Before OpenSSL 1.1.1 this option was not available. Since the new parameters are more secure, `sshenc.sh` changed to adopt them, so since 2019-11-26, files encrypted with a previous version of `sshenc.sh` will not decrypt. -To do so, use the prevous `sshenc.sh` script, located at [https://github.com/S2-/sshenc.sh/sshenc-pre1.1.1.sh](https://github.com/S2-/sshenc.sh/sshenc-pre1.1.1.sh). +To do so, use the prevous `sshenc.sh` script, located at [https://raw.githubusercontent.com/S2-/sshenc.sh/master/sshenc-pre1.1.1.sh](https://raw.githubusercontent.com/S2-/sshenc.sh/master/sshenc-pre1.1.1.sh). ## License [MIT](https://opensource.org/licenses/MIT)