Author: toad
Date: 2007-12-11 15:49:55 +0000 (Tue, 11 Dec 2007)
New Revision: 16486

Modified:
   trunk/website/pages/en/faq.php
Log:
delete unnecessary words

Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2007-12-11 15:49:30 UTC (rev 16485)
+++ trunk/website/pages/en/faq.php      2007-12-11 15:49:55 UTC (rev 16486)
@@ -414,7 +414,7 @@
 that these were designed to counter would probably be successful in
 identifying someone making requests on Freenet.</p>
 <p>Your identity is always visible to the nodes you are actually connected to.
-They know what keys your node sends requests for: your anonymity against them
+They know what keys your node requests: your anonymity against them
 consists in a limited level of plausible deniability, that maybe you are 
 forwarding these requests for some other node. Unfortunately, your peers can 
do 
 <a href="http://wiki.freenetproject.org/CorrelationAttacks";>correlation 


Reply via email to