Skip to content

Commit 1f39c68

Browse files
committed
minor fixes, typos mostly
1 parent b98544b commit 1f39c68

File tree

24 files changed

+70
-43
lines changed

24 files changed

+70
-43
lines changed

src/components/NewsletterSection.astro

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ import HeaderTag from "./HeaderTag.astro";
66
interface Props {
77
headerLevel: "1" | "2";
88
}
9-
10-
const { headerLevel } = Astro.props;
11-
12-
const title = "Get informend about new releases";
9+
10+
const { headerLevel } = Astro.props;
11+
12+
const title = "Get informed about new releases";
1313
---
1414

1515
<ProductSection padding="newsletter" bordered>

src/components/product/ProductHeader.astro

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ import ProductSection from "../../layouts/ProductSection.astro";
77
<h1>The Best WireGuard® desktop client</h1>
88
<p>
99
Beautiful, open-source, cross-platform client for Enterprise and home usage, with
10-
real Wireguard-based Multi-Factor Authentication.
10+
real WireGuard®-based Multi-Factor Authentication.
1111
</p>
1212
</header>
1313
</ProductSection>

src/content/client-features/2fa.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,6 @@ title: 2FA/Multi-Factor Authentication with WireGuard® PSK
33
order: 1
44
---
55

6-
Since WireGuard® protocol doesn't support 2FA, most (if not all) available WireGuard® clients use 2FA authorization to the "application" itself (not Wireguard tunnel - just enforece 2FA using Google/Microsoft before opening the client application).
6+
Since WireGuard® protocol doesn't support 2FA, most (if not all) available WireGuard® clients use 2FA authorization to the "application" itself (not WireGuard® tunnel - just enforece 2FA using Google/Microsoft before opening the client application).
77
When using this client with the <a href="https://github.com/defguard/defguard" target="_blank">defguard VPN & SSO server</a> (which is <strong>free & open source</strong>)
88
you will get <strong>real Multi-Factor Authentication using TOTP/Email codes + WireGuard® Pre-shared session keys</strong>.

src/content/core-features/vpn.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enterprise WireGuard® VPN with MFA/2FA
33
order: 1
44
---
55

6-
Defguard has a unique and secure architecture as well as **first of it's kind Multi-Factor Authentication for WireGuard® with TOTP/Email and WireGuard® session Pre-Shared Keys**. Since WireGuard® protocol doesn't support 2FA, most (if not all) available WireGuard® solutions use 2FA authorization to the "application" itself (not Wireguard® tunnel). By using our desktop application defguard provides **real MFA/2FA** - read more about it in our [documentation](https://docs.defguard.net/admin-and-features/wireguard/architecture).
6+
Defguard has a unique and secure architecture as well as **first of it's kind Multi-Factor Authentication for WireGuard® with TOTP/Email and WireGuard® session Pre-Shared Keys**. Since WireGuard® protocol doesn't support 2FA, most (if not all) available WireGuard® solutions use 2FA authorization to the "application" itself (not WireGuard® tunnel). By using our desktop application defguard provides **real MFA/2FA** - read more about it in our [documentation](https://docs.defguard.net/admin-and-features/WireGuard®/architecture).
77
Other features:
88

99
- **multiple VPN Locations** (networks/sites) - with defined access (all users or only Admin group)

src/content/faq/acls.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ order: 4
44
---
55

66
Defguard currently supports a simple ACL based on user group assignment, which determines the VPN locations users can access.
7-
More granular ACLs (e.g., firewall rules) are coming to defguard 1.1, which is currently in development.
7+
More granular ACLs (e.g., firewall rules) are coming to defguard 1.3, which is currently in development.

src/content/faq/defguard-wireguard.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ WireGuard® is a VPN protocol with some low-level command-line tools.
77
Defguard makes WireGuard® easy to deploy and use, adding additional features like
88

99
<a
10-
href="https://docs.defguard.net/admin-and-features/wireguard/multi-factor-authentication-mfa-2fa"
10+
href="https://docs.defguard.net/admin-and-features/WireGuard®/multi-factor-authentication-mfa-2fa"
1111
target="_blank"
1212
>
1313
real 2FA/Multi-Factor Authentication
1414
</a>
1515
.
1616

17-
Defguard has its own VPN <a href="/client/" target="_blank">desktop clients</a> (with mobile clients soon to be released) that include additional functionalities not available in standard WireGuard clients.
17+
Defguard has its own VPN <a href="/client/" target="_blank">desktop clients</a> (with mobile clients soon to be released) that include additional functionalities not available in standard WireGuard® clients.
1818

1919
Defguard also offers features outside of VPN, such as built-in OpenID Connect SSO, Yubico YubiKey provisioning, and more!

src/content/openvpn-features/2fa.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,4 +3,4 @@ title: Real (near protocol) 2FA/Multi-Factor Authentication
33
order: 3
44
---
55

6-
- defguard is the only open-source solution with real WireGuard® [MFA/2FA](https://docs.defguard.net/admin-and-features/wireguard/multi-factor-authentication-mfa-2fa) & integrated [OpenID Connect SSO](https://docs.defguard.net/admin-and-features/openid-connect)
6+
- defguard is the only open-source solution with real WireGuard® [MFA/2FA](https://docs.defguard.net/admin-and-features/WireGuard®/multi-factor-authentication-mfa-2fa) & integrated [OpenID Connect SSO](https://docs.defguard.net/admin-and-features/openid-connect)

src/content/openvpn-features/migrate-fast.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ order: 1
66
- Faster VPN Speeds: WireGuard® is ~10x faster then OpenVPN - since it's on kernel and protocol level and not application level (like OpenVPN)
77
- Seamless Roaming: WireGuard® is designed to handle network changes (like switching from Wi-Fi to cellular) more gracefully than OpenVPN, maintaining the connection without interruption - wherase OpenVPN looses connections on network change.
88
- Lower VPN Latency: WireGuard® has far lower latency than OpenVPN due to its lightweight design.
9-
- Instant Connectivity: WireGuard's handshakes are very fast, allowing near-instantaneous connections, unlike OpenVPN, which can take a few seconds to establish a connection.
9+
- Instant Connectivity: WireGuard®'s handshakes are very fast, allowing near-instantaneous connections, unlike OpenVPN, which can take a few seconds to establish a connection.

src/content/openvpn-features/migrate-secure.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,6 @@ title: Migrate to most secure VPN solution
33
order: 2
44
---
55

6-
- WireGuard® is part of Linux kernel (and not an application). WireGuard’s codebase (about 4,000 lines vs hundreds of thousands of lines of OpenVPN).
6+
- WireGuard® is part of Linux kernel (and not an application). WireGuard®’s codebase (about 4,000 lines vs hundreds of thousands of lines of OpenVPN).
77
- WireGuard® uses state-of-the-art cryptographic algorithms, including ChaCha20 for encryption, Poly1305 for authentication, and Curve25519 for key exchange. This modern approach enhances security and efficiency.
8-
- Minimal Attack Surface: The simplicity of WireGuard’s code reduces the potential for vulnerabilities, unlike OpenVPN, which has more complex code and therefore a larger attack surface.
8+
- Minimal Attack Surface: The simplicity of WireGuard®’s code reduces the potential for vulnerabilities, unlike OpenVPN, which has more complex code and therefore a larger attack surface.

src/data/home/testimonials/prusa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@ imagePrimary: /images/data/testimonials/prusa/ta-1.jpg
55
imageSecondary: /images/data/testimonials/prusa/tl-1.png
66
---
77

8-
It's a unique modern VPN solution, not another extension based on Wireguard with just web interface and MFA for login to the web without connection cover. You can run all microservices components written in Rust yourself without any requirements for communication with other services running by someone else and you have more options on how to run it, e.g. control plane on Kubernetes and gateways on other VMs. But it's not only VPN solution, it provides you also IDP like e.g. Keycloak so you can decrease the number of tools for hardening. And all of this is open-source with a community driven development.
8+
It's a unique modern VPN solution, not another extension based on WireGuard® with just web interface and MFA for login to the web without connection cover. You can run all microservices components written in Rust yourself without any requirements for communication with other services running by someone else and you have more options on how to run it, e.g. control plane on Kubernetes and gateways on other VMs. But it's not only VPN solution, it provides you also IDP like e.g. Keycloak so you can decrease the number of tools for hardening. And all of this is open-source with a community driven development.

0 commit comments

Comments
 (0)