Author: hobx
Date: 2006-03-08 21:17:42 +0000 (Wed, 08 Mar 2006)
New Revision: 8197

Modified:
   trunk/docs/fnet.tex
Log:
a


Modified: trunk/docs/fnet.tex
===================================================================
--- trunk/docs/fnet.tex 2006-03-08 21:16:40 UTC (rev 8196)
+++ trunk/docs/fnet.tex 2006-03-08 21:17:42 UTC (rev 8197)
@@ -41,7 +41,7 @@

 \section{Introduction}

-As the international growth of the Internet throughout the world, it
+As Internet connectivity spreads throughout the world, it
 has the potential to increase the availability of information for
 everybody, and to strengthen free speech and discourse. However, a
 blind belief that the Internet, in and of itself, cannot be controlled
@@ -57,13 +57,13 @@
 intended to strengthen the freedom of speech by allowing anyone to
 publish anything in the network at any time.  To this end, the system
 integrates many levels of redundancy and dispersion of data throughout
-the Internets topology, which makes it difficult for an adversary to
-eliminate data from the network. The network strives to opaque, so
-that it is difficult without global knowledge to see which nodes are
-responsible are responsible for storing which data at which time, and
-flexible, so that it can survive both the everyday churn of an
-uncontrolled peer-to-peer environment and malicious attacks against
-the network itself.
+the Internet's topology, which makes it difficult for an adversary to
+eliminate data from the network. The network strives to be opaque, so
+that it is difficult without global knowledge to see which nodes
+responsible for storing which data at which time, and flexible, so
+that it can survive both the everyday churn of an uncontrolled
+peer-to-peer environment and malicious attacks against the network
+itself.

 An important element of allowing free communication is that the
 privacy of both those who publish and those who access information
@@ -78,9 +78,9 @@

 A second concern, that has come to the forefront with the actual
 deployment of Freenet, is the vulnerability of people operating nodes
-in the network. While the network has striven to dissociate users with
-the data they access and nodes with the data they serve, it has not
-hidden the presence of nodes from the world. In order to find Freenet
+in the network. While the network strived to dissociate users with the
+data they access and nodes with the data they serve, it not hide the
+nodes which that were part of the network. In order to find Freenet
 nodes in earlier incarnations of the system, it has been enough to
 join the network and start operating as a node oneself: part of the
 continuous process of routing and optimizing the network, one would
@@ -317,9 +317,11 @@
 value of $m = 10$ is used, which is motivated by attempting to balance
 a thorough search while limiting resource usage.

-
 \section{Redundancy and Fault Tolerance}

+
+
+
 \section{Joining and Leaving the Network}

 \bibliographystyle{unsrt


Reply via email to