Author: toad
Date: 2009-01-21 01:01:13 +0000 (Wed, 21 Jan 2009)
New Revision: 25169

Modified:
   trunk/website/pages/en/faq.php
Log:
s/just/e.g.


Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2009-01-21 01:00:51 UTC (rev 25168)
+++ trunk/website/pages/en/faq.php      2009-01-21 01:01:13 UTC (rev 25169)
@@ -460,7 +460,7 @@
 perform the attack while the data is being inserted; after that, it is 
distributed 
 across the network and is much harder to trace, and the originator may have 
left the 
 network. However, if by chance or by overwhelming force the attacker is 
connected
-to the whistleblower (or just seizes the computers of everyone on the 
network), he 
+to the whistleblower (or e.g. seizes the computers of everyone on the 
network), he 
 may be able to identify this much more quickly. All of this is vastly more 
difficult 
 on a darknet, where everyone connects only to their friends, where it is very 
hard for
 an attacker to find nodes, and where to connect to a given node he must social 
engineer

_______________________________________________
cvs mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs

Reply via email to