aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--proposals/241-suspicious-guard-turnover.txt2
-rw-r--r--rend-spec.txt1
-rw-r--r--tor-spec.txt2
3 files changed, 2 insertions, 3 deletions
diff --git a/proposals/241-suspicious-guard-turnover.txt b/proposals/241-suspicious-guard-turnover.txt
index a0313b2..c75ae80 100644
--- a/proposals/241-suspicious-guard-turnover.txt
+++ b/proposals/241-suspicious-guard-turnover.txt
@@ -30,7 +30,7 @@ Status: Draft
In the presence of these attacks, we can't continue to connect to
the Tor network unconditionally. Doing so would eventually result
- in the user chosing a hostile node as their guard, and losing
+ in the user choosing a hostile node as their guard, and losing
anonymity.
diff --git a/rend-spec.txt b/rend-spec.txt
index 914ba89..540fca0 100644
--- a/rend-spec.txt
+++ b/rend-spec.txt
@@ -249,7 +249,6 @@
created by the service.
"time-period" changes periodically as a function of time and
-
"permanent-id". The current value for "time-period" can be calculated
using the following formula:
diff --git a/tor-spec.txt b/tor-spec.txt
index 43bb181..de5387e 100644
--- a/tor-spec.txt
+++ b/tor-spec.txt
@@ -514,7 +514,7 @@ see tor-design.pdf.
Link protocols differences are:
1 -- The "certs up front" handshake.
2 -- Uses the renegotiation-based handshake. Introduces
- varible-length cells.
+ variable-length cells.
3 -- Uses the in-protocol handshake.
4 -- Increases circuit ID width to 4 bytes.