[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] Spell checkers are smarter than we are



Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv9845

Modified Files:
	tor-design.tex 
Log Message:
Spell checkers are smarter than we are

Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -d -r1.105 -r1.106
--- tor-design.tex	5 Nov 2003 00:12:18 -0000	1.105
+++ tor-design.tex	5 Nov 2003 00:15:11 -0000	1.106
@@ -1479,8 +1479,8 @@
 indefinitely by sending new forged descriptors to the directory servers.
 
 \emph{Iterated compromise.} A roving adversary who can
-compromise ORs (by system intrusion, legal coersion, or extralegal
-coersion) could march down the circuit compromising the
+compromise ORs (by system intrusion, legal coercion, or extralegal
+coercion) could march down the circuit compromising the
 nodes until he reaches the end.  Unless the adversary can complete
 this attack within the lifetime of the circuit, however, the ORs
 will have discarded the necessary information before the attack can
@@ -1528,7 +1528,7 @@
 hostile node must be immediately adjacent to that endpoint. 
 If an adversary is able to
 run multiple ORs, and is able to persuade the directory servers
-that those ORs are trustworthy and independant, then occasionally
+that those ORs are trustworthy and independent, then occasionally
 some user will choose one of those ORs for the start and another
 as the end of a circuit.  When this happens, the user's
 anonymity is compromised for those streams.  If an adversary can
@@ -1572,7 +1572,7 @@
 of the recorded session can't be used.  
 
 \emph{Smear attacks.} An attacker could use the Tor network to
-engage in socially dissapproved acts, so as to try to bring the
+engage in socially disapproved acts, so as to try to bring the
 entire network into disrepute and get its operators to shut it down.
 Exit policies can help reduce the possibilities for abuse, but
 ultimately, the network will require volunteers who can tolerate