Author: toad
Date: 2007-12-11 15:49:30 +0000 (Tue, 11 Dec 2007)
New Revision: 16485

Modified:
   trunk/website/pages/en/faq.php
Log:
against them, format

Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2007-12-11 15:47:14 UTC (rev 16484)
+++ trunk/website/pages/en/faq.php      2007-12-11 15:49:30 UTC (rev 16485)
@@ -414,9 +414,9 @@
 that these were designed to counter would probably be successful in
 identifying someone making requests on Freenet.</p>
 <p>Your identity is always visible to the nodes you are actually connected to.
-They know what keys your node sends requests for: your anonymity consists in a
-limited level of plausible deniability, that maybe you are forwarding these 
-requests for some other node. Unfortunately, your peers can do 
+They know what keys your node sends requests for: your anonymity against them
+consists in a limited level of plausible deniability, that maybe you are 
+forwarding these requests for some other node. Unfortunately, your peers can 
do 
 <a href="http://wiki.freenetproject.org/CorrelationAttacks";>correlation 
 attacks</a> to figure out which requests are from you and which requests are 
from
 your peers or somebody else. One key thing you can do to protect yourself is


Reply via email to