Author: toad
Date: 2007-12-11 15:49:30 +0000 (Tue, 11 Dec 2007)
New Revision: 16485

Modified:
   trunk/website/pages/en/faq.php
Log:
against them, format

Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2007-12-11 15:47:14 UTC (rev 16484)
+++ trunk/website/pages/en/faq.php      2007-12-11 15:49:30 UTC (rev 16485)
@@ -414,9 +414,9 @@
 that these were designed to counter would probably be successful in
 identifying someone making requests on Freenet.</p>
 <p>Your identity is always visible to the nodes you are actually connected to.
-They know what keys your node sends requests for: your anonymity consists in a
-limited level of plausible deniability, that maybe you are forwarding these 
-requests for some other node. Unfortunately, your peers can do 
+They know what keys your node sends requests for: your anonymity against them
+consists in a limited level of plausible deniability, that maybe you are 
+forwarding these requests for some other node. Unfortunately, your peers can 
do 
 <a href="http://wiki.freenetproject.org/CorrelationAttacks";>correlation 
 attacks</a> to figure out which requests are from you and which requests are 
from
 your peers or somebody else. One key thing you can do to protect yourself is

_______________________________________________
cvs mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs

Reply via email to