Author: ian
Date: 2006-03-10 00:33:25 +0000 (Fri, 10 Mar 2006)
New Revision: 8207

Modified:
   trunk/docs/fnet.tex
Log:
a few more corrections, its still a mess

Modified: trunk/docs/fnet.tex
===================================================================
--- trunk/docs/fnet.tex 2006-03-09 22:37:25 UTC (rev 8206)
+++ trunk/docs/fnet.tex 2006-03-10 00:33:25 UTC (rev 8207)
@@ -353,11 +353,11 @@

 \section{Joining and Leaving the Network}

-Technically, the system for joining and leaving the network is very
+The system for joining and leaving the network is very
 simple. Nodes choose an identity at random, and then connect to those
 peers with whom they have a prestablished trusted relationship. To
 protect against man in the middle attacks, the connections are
-initiated by the exchange certificates between user - the certificates
+initiated by the exchange of certificates between user - the certificates
 include both contact information (in practice, the nodes current IP
 address and port number) and cryptographic identifiers for the nodes. 

@@ -401,8 +401,8 @@
 trusted connections in practice sufficiently match the small-world of
 theory to make communication in the network practical. 

-In the course of developing the software, we have many question yet to
-answer about the viability of the system in the real world. The
+Many questions remain as to the viability of operating software like
+Freenet in the real world. The
 difficulty of performing denial of service attacks by attempting to
 affect the routing in various ways needs to be studied, and similarly
 attacks by flooding and spamming in order to decrease the avilability


Reply via email to