diff options
-rw-r--r-- | proposals/241-suspicious-guard-turnover.txt | 2 | ||||
-rw-r--r-- | rend-spec.txt | 1 | ||||
-rw-r--r-- | tor-spec.txt | 2 |
3 files changed, 2 insertions, 3 deletions
diff --git a/proposals/241-suspicious-guard-turnover.txt b/proposals/241-suspicious-guard-turnover.txt index a0313b2..c75ae80 100644 --- a/proposals/241-suspicious-guard-turnover.txt +++ b/proposals/241-suspicious-guard-turnover.txt @@ -30,7 +30,7 @@ Status: Draft In the presence of these attacks, we can't continue to connect to the Tor network unconditionally. Doing so would eventually result - in the user chosing a hostile node as their guard, and losing + in the user choosing a hostile node as their guard, and losing anonymity. diff --git a/rend-spec.txt b/rend-spec.txt index 914ba89..540fca0 100644 --- a/rend-spec.txt +++ b/rend-spec.txt @@ -249,7 +249,6 @@ created by the service. "time-period" changes periodically as a function of time and - "permanent-id". The current value for "time-period" can be calculated using the following formula: diff --git a/tor-spec.txt b/tor-spec.txt index 43bb181..de5387e 100644 --- a/tor-spec.txt +++ b/tor-spec.txt @@ -514,7 +514,7 @@ see tor-design.pdf. Link protocols differences are: 1 -- The "certs up front" handshake. 2 -- Uses the renegotiation-based handshake. Introduces - varible-length cells. + variable-length cells. 3 -- Uses the in-protocol handshake. 4 -- Increases circuit ID width to 4 bytes. |