From 47d2e4f06ec26a79542865d054f01ea09304f59d Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 26 Apr 2017 15:16:41 -0400 Subject: Reflow blurb. --- ChangeLog | 8 ++++---- ReleaseNotes | 8 ++++---- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/ChangeLog b/ChangeLog index 7efebf1a7e..39ef538890 100644 --- a/ChangeLog +++ b/ChangeLog @@ -4,10 +4,10 @@ Changes in version 0.3.0.6 - 2017-04-26 With the 0.3.0 series, clients and relays now use Ed25519 keys to authenticate their link connections to relays, rather than the old RSA1024 keys that they used before. (Circuit crypto has been - Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced + Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced the guard selection and replacement algorithm to behave more robustly - in the presence of unreliable networks, and to resist guard-capture - attacks. + in the presence of unreliable networks, and to resist guard- + capture attacks. This series also includes numerous other small features and bugfixes, along with more groundwork for the upcoming hidden-services revamp. @@ -15,7 +15,7 @@ Changes in version 0.3.0.6 - 2017-04-26 Per our stable release policy, we plan to support the Tor 0.3.0 release series for at least the next nine months, or for three months after the first stable release of the 0.3.1 series: whichever is - longer. If you need a release with long-term support, we recommend + longer. If you need a release with long-term support, we recommend that you stay with the 0.2.9 series. Below are the changes since 0.3.0.5-rc. For a list of all changes diff --git a/ReleaseNotes b/ReleaseNotes index a36036c98a..c5ccfbe9b3 100644 --- a/ReleaseNotes +++ b/ReleaseNotes @@ -9,10 +9,10 @@ Changes in version 0.3.0.6 - 2017-04-26 With the 0.3.0 series, clients and relays now use Ed25519 keys to authenticate their link connections to relays, rather than the old RSA1024 keys that they used before. (Circuit crypto has been - Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced + Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced the guard selection and replacement algorithm to behave more robustly - in the presence of unreliable networks, and to resist guard-capture - attacks. + in the presence of unreliable networks, and to resist guard- + capture attacks. This series also includes numerous other small features and bugfixes, along with more groundwork for the upcoming hidden-services revamp. @@ -20,7 +20,7 @@ Changes in version 0.3.0.6 - 2017-04-26 Per our stable release policy, we plan to support the Tor 0.3.0 release series for at least the next nine months, or for three months after the first stable release of the 0.3.1 series: whichever is - longer. If you need a release with long-term support, we recommend + longer. If you need a release with long-term support, we recommend that you stay with the 0.2.9 series. Below are the changes since 0.2.9.10. For a list of only the changes -- cgit v1.2.3-54-g00ecf