diff --git a/tools/encfs_aes_getpass.py b/tools/encfs_aes_getpass.py index 4e4b005eda..31a526f0d4 100755 --- a/tools/encfs_aes_getpass.py +++ b/tools/encfs_aes_getpass.py @@ -87,7 +87,7 @@ def main(): label = input() sys.stderr.write('Computer asked TREZOR for new strong password.\n') - sys.stderr.write('Please confirm action on your device.\n') + sys.stderr.write('Please confirm the action on your device ...\n') # 32 bytes, good for AES trezor_entropy = client.get_entropy(32) @@ -109,7 +109,7 @@ def main(): # Let's load password data = json.load(open(passw_file, 'r')) - sys.stderr.write('Please confirm action on your device.\n') + sys.stderr.write('Please confirm the action on your device ...\n') passw = client.decrypt_keyvalue(data['bip32_path'], data['label'], binascii.unhexlify(data['password_encrypted_hex']), diff --git a/trezorctl b/trezorctl index 5dab13cb94..37f5032ae7 100755 --- a/trezorctl +++ b/trezorctl @@ -285,7 +285,7 @@ def wipe_device(connect, bootloader): click.echo('Please switch your device to bootloader mode.') sys.exit(1) else: - click.echo('Wiping user data and firmware. Please confirm on your device.') + click.echo('Wiping user data and firmware! Please confirm the action on your device ...') else: if client.features.bootloader_mode: click.echo('Your device is in bootloader mode. This operation would also erase firmware.') @@ -293,7 +293,7 @@ def wipe_device(connect, bootloader): click.echo('Aborting.') sys.exit(1) else: - click.echo('Wiping user data. Please confirm on your device.') + click.echo('Wiping user data! Please confirm the action on your device ...') try: return connect().wipe_device() @@ -470,7 +470,7 @@ def firmware_update(connect, filename, url, version, skip_check, fingerprint): click.echo("Fingerprints do not match, aborting.") sys.exit(5) - click.echo('Please confirm action on device...') + click.echo('If asked, please confirm the action on your device ...') try: return client.firmware_update(fp=io.BytesIO(fp))