diff options
author | Hans-Christoph Steiner <hans@eds.org> | 2019-11-26 21:52:08 +0100 |
---|---|---|
committer | Hans-Christoph Steiner <hans@eds.org> | 2019-11-26 21:52:08 +0100 |
commit | e899eab17d622e6e55e3319a1aa65764e18f9f5b (patch) | |
tree | 5182780b6802d299771474ce717f418a9838146b /path-spec.txt | |
parent | a3fd19302312d44257f175bded3551bc1397ced6 (diff) | |
download | torspec-e899eab17d622e6e55e3319a1aa65764e18f9f5b.tar.gz torspec-e899eab17d622e6e55e3319a1aa65764e18f9f5b.zip |
remove trailing whitespace `sed -i 's, *$,,' *.txt`
Diffstat (limited to 'path-spec.txt')
-rw-r--r-- | path-spec.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/path-spec.txt b/path-spec.txt index a79a4d6..82f07cd 100644 --- a/path-spec.txt +++ b/path-spec.txt @@ -672,7 +672,7 @@ of their choices. threat model. It also allows targeted attacks aimed at monitoring the activity of specific users, bridges, or Guard nodes. - There are two points where path selection can be manipulated: + There are two points where path selection can be manipulated: during construction, and during usage. Circuit construction can be manipulated by inducing circuit failures during circuit extend steps, which causes the Tor client to transparently retry |