web: fix list numbering for safari (#4106)

Co-authored-by: Evgeny Poberezkin <evgeny@poberezkin.com>
This commit is contained in:
M. Sarmad Qadeer 2024-05-06 12:36:13 +05:00 committed by GitHub
parent db136116d3
commit 9615e525c0
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 22 additions and 11 deletions

View file

@ -17,12 +17,12 @@ This post also covers various aspects of end-to-end encryption, compares differe
- [Why do we need end-to-end encryption?](#why-do-we-need-end-to-end-encryption) - [Why do we need end-to-end encryption?](#why-do-we-need-end-to-end-encryption)
- [Why is encryption even allowed?](#why-is-encryption-even-allowed) - [Why is encryption even allowed?](#why-is-encryption-even-allowed)
- [End-to-end encryption security: attacks and defense.](#end-to-end-encryption-security-attacks-and-defense) - [End-to-end encryption security: attacks and defense.](#end-to-end-encryption-security-attacks-and-defense)
- Compromised message size - mitigated by padding messages to a fixed block size. 1. Compromised message size - mitigated by padding messages to a fixed block size.
- Compromised confidentiality - mitigated by repudiation (deniability). 2. Compromised confidentiality - mitigated by repudiation (deniability).
- Compromised message keys - mitigated by forward secrecy. 3. Compromised message keys - mitigated by forward secrecy.
- Compromised long-term or session - mitigated by break-in recovery. 4. Compromised long-term or session - mitigated by break-in recovery.
- Man-in-the-middle attack - mitigated by two-factor key exchange. 5. Man-in-the-middle attack - mitigated by two-factor key exchange.
- "Record now, decrypt later" attacks - mitigated by post-quantum cryptography. 6. "Record now, decrypt later" attacks - mitigated by post-quantum cryptography.
- [How secure is encryption in different messengers?](#how-secure-is-end-to-end-encryption-in-different-messengers) - [How secure is encryption in different messengers?](#how-secure-is-end-to-end-encryption-in-different-messengers)
- [Adding quantum resistance to Signal double ratchet algorithm.](#adding-quantum-resistance-to-signal-double-ratchet-algorithm) - [Adding quantum resistance to Signal double ratchet algorithm.](#adding-quantum-resistance-to-signal-double-ratchet-algorithm)
- [When can you start using quantum resistant chats?](#when-can-you-start-using-quantum-resistant-chats) - [When can you start using quantum resistant chats?](#when-can-you-start-using-quantum-resistant-chats)

View file

@ -85,7 +85,8 @@ section.container>div>p:nth-child(2) {
} }
} }
.dark #article h3, .dark #article h4 { .dark #article h3,
.dark #article h4 {
color: white; color: white;
} }
@ -112,7 +113,8 @@ section.container>div>p:nth-child(2) {
#article ol li { #article ol li {
margin-right: 0; margin-right: 0;
margin-left: 0; margin-left: 0;
-webkit-margin-start: 1.1rem;; -webkit-margin-start: 1.1rem;
;
color: #000; color: #000;
} }
@ -193,7 +195,7 @@ h2,
h3, h3,
h4, h4,
h5, h5,
h6{ h6 {
clear: both; clear: both;
} }
@ -206,12 +208,12 @@ h6{
} }
@media (min-width: 1024px) { @media (min-width: 1024px) {
#article .float-to-left{ #article .float-to-left {
float: left; float: left;
margin-right: 3rem; margin-right: 3rem;
} }
#article .float-to-right{ #article .float-to-right {
float: right; float: right;
margin-left: 3rem; margin-left: 3rem;
} }
@ -221,4 +223,13 @@ h6{
img { img {
width: 100%; width: 100%;
} }
}
#article ol>li {
list-style-position: inside !important;
margin-left: -0px !important;
}
#article ol>li::marker {
font-weight: 500;
} }