aboutsummaryrefslogtreecommitdiff
path: root/path-spec.txt
diff options
context:
space:
mode:
authorHans-Christoph Steiner <hans@eds.org>2019-11-26 21:52:08 +0100
committerHans-Christoph Steiner <hans@eds.org>2019-11-26 21:52:08 +0100
commite899eab17d622e6e55e3319a1aa65764e18f9f5b (patch)
tree5182780b6802d299771474ce717f418a9838146b /path-spec.txt
parenta3fd19302312d44257f175bded3551bc1397ced6 (diff)
downloadtorspec-e899eab17d622e6e55e3319a1aa65764e18f9f5b.tar.gz
torspec-e899eab17d622e6e55e3319a1aa65764e18f9f5b.zip
remove trailing whitespace `sed -i 's, *$,,' *.txt`
Diffstat (limited to 'path-spec.txt')
-rw-r--r--path-spec.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/path-spec.txt b/path-spec.txt
index a79a4d6..82f07cd 100644
--- a/path-spec.txt
+++ b/path-spec.txt
@@ -672,7 +672,7 @@ of their choices.
threat model. It also allows targeted attacks aimed at monitoring
the activity of specific users, bridges, or Guard nodes.
- There are two points where path selection can be manipulated:
+ There are two points where path selection can be manipulated:
during construction, and during usage. Circuit construction
can be manipulated by inducing circuit failures during circuit
extend steps, which causes the Tor client to transparently retry