[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r22395: {projects} andrew pointed out that this phrase could lead to confusion. (projects/articles)



Author: arma
Date: 2010-05-25 20:37:46 +0000 (Tue, 25 May 2010)
New Revision: 22395

Modified:
   projects/articles/circumvention-features.html
   projects/articles/circumvention-features.tex
   projects/articles/circumvention-features.txt
Log:
andrew pointed out that this phrase could lead to confusion.


Modified: projects/articles/circumvention-features.html
===================================================================
--- projects/articles/circumvention-features.html	2010-05-25 20:15:27 UTC (rev 22394)
+++ projects/articles/circumvention-features.html	2010-05-25 20:37:46 UTC (rev 22395)
@@ -162,7 +162,7 @@
 </p>
 
 <p>
-Just having an open software license is not enough. Trustworthy
+Just having an open source license is not enough. Trustworthy
 circumvention tools need to provide clear, complete documentation for
 other security experts &mdash; not just how it's built but what features
 and goals its developers aimed for. Do they intend for it to provide

Modified: projects/articles/circumvention-features.tex
===================================================================
--- projects/articles/circumvention-features.tex	2010-05-25 20:15:27 UTC (rev 22394)
+++ projects/articles/circumvention-features.tex	2010-05-25 20:37:46 UTC (rev 22395)
@@ -146,9 +146,9 @@
 you are forced to trust that a small number of developers have thought
 of and addressed every possible problem.
 
-Just having an open software license is not enough. Trustworthy
+Just having an open source license is not enough. Trustworthy
 circumvention tools need to provide clear, complete documentation for
-other security experts â not just how it's built but what features
+other security experts -- not just how it's built but what features
 and goals its developers aimed for. Do they intend for it to provide
 privacy? What kind and against what attackers? In what way does it
 use encryption? Do they intend for it to stand up to attacks from

Modified: projects/articles/circumvention-features.txt
===================================================================
--- projects/articles/circumvention-features.txt	2010-05-25 20:15:27 UTC (rev 22394)
+++ projects/articles/circumvention-features.txt	2010-05-25 20:37:46 UTC (rev 22395)
@@ -130,7 +130,7 @@
 you are forced to trust that a small number of developers have thought
 of and addressed every possible problem.
 
-Just having an open software license is not enough. Trustworthy
+Just having an open source license is not enough. Trustworthy
 circumvention tools need to provide clear, complete documentation for
 other security experts -- not just how it's built but what features
 and goals its developers aimed for. Do they intend for it to provide