Author: toad Date: 2007-12-11 15:49:55 +0000 (Tue, 11 Dec 2007) New Revision: 16486
Modified: trunk/website/pages/en/faq.php Log: delete unnecessary words Modified: trunk/website/pages/en/faq.php =================================================================== --- trunk/website/pages/en/faq.php 2007-12-11 15:49:30 UTC (rev 16485) +++ trunk/website/pages/en/faq.php 2007-12-11 15:49:55 UTC (rev 16486) @@ -414,7 +414,7 @@ that these were designed to counter would probably be successful in identifying someone making requests on Freenet.</p> <p>Your identity is always visible to the nodes you are actually connected to. -They know what keys your node sends requests for: your anonymity against them +They know what keys your node requests: your anonymity against them consists in a limited level of plausible deniability, that maybe you are forwarding these requests for some other node. Unfortunately, your peers can do <a href="http://wiki.freenetproject.org/CorrelationAttacks">correlation
