Author: toad Date: 2009-01-21 01:01:13 +0000 (Wed, 21 Jan 2009) New Revision: 25169
Modified: trunk/website/pages/en/faq.php Log: s/just/e.g. Modified: trunk/website/pages/en/faq.php =================================================================== --- trunk/website/pages/en/faq.php 2009-01-21 01:00:51 UTC (rev 25168) +++ trunk/website/pages/en/faq.php 2009-01-21 01:01:13 UTC (rev 25169) @@ -460,7 +460,7 @@ perform the attack while the data is being inserted; after that, it is distributed across the network and is much harder to trace, and the originator may have left the network. However, if by chance or by overwhelming force the attacker is connected -to the whistleblower (or just seizes the computers of everyone on the network), he +to the whistleblower (or e.g. seizes the computers of everyone on the network), he may be able to identify this much more quickly. All of this is vastly more difficult on a darknet, where everyone connects only to their friends, where it is very hard for an attacker to find nodes, and where to connect to a given node he must social engineer _______________________________________________ cvs mailing list [email protected] http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs
