Author: toad Date: 2007-12-11 15:49:30 +0000 (Tue, 11 Dec 2007) New Revision: 16485
Modified: trunk/website/pages/en/faq.php Log: against them, format Modified: trunk/website/pages/en/faq.php =================================================================== --- trunk/website/pages/en/faq.php 2007-12-11 15:47:14 UTC (rev 16484) +++ trunk/website/pages/en/faq.php 2007-12-11 15:49:30 UTC (rev 16485) @@ -414,9 +414,9 @@ that these were designed to counter would probably be successful in identifying someone making requests on Freenet.</p> <p>Your identity is always visible to the nodes you are actually connected to. -They know what keys your node sends requests for: your anonymity consists in a -limited level of plausible deniability, that maybe you are forwarding these -requests for some other node. Unfortunately, your peers can do +They know what keys your node sends requests for: your anonymity against them +consists in a limited level of plausible deniability, that maybe you are +forwarding these requests for some other node. Unfortunately, your peers can do <a href="http://wiki.freenetproject.org/CorrelationAttacks">correlation attacks</a> to figure out which requests are from you and which requests are from your peers or somebody else. One key thing you can do to protect yourself is
