Author: toad Date: 2009-01-21 01:00:51 +0000 (Wed, 21 Jan 2009) New Revision: 25168
Modified: trunk/website/pages/en/faq.php Log: s/datastore/computers Modified: trunk/website/pages/en/faq.php =================================================================== --- trunk/website/pages/en/faq.php 2009-01-21 00:59:26 UTC (rev 25167) +++ trunk/website/pages/en/faq.php 2009-01-21 01:00:51 UTC (rev 25168) @@ -460,7 +460,7 @@ perform the attack while the data is being inserted; after that, it is distributed across the network and is much harder to trace, and the originator may have left the network. However, if by chance or by overwhelming force the attacker is connected -to the whistleblower (or just seizes the datastore of everyone on the network), he +to the whistleblower (or just seizes the computers of everyone on the network), he may be able to identify this much more quickly. All of this is vastly more difficult on a darknet, where everyone connects only to their friends, where it is very hard for an attacker to find nodes, and where to connect to a given node he must social engineer _______________________________________________ cvs mailing list [email protected] http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs
