[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r22395: {projects} andrew pointed out that this phrase could lead to confusion. (projects/articles)
Author: arma
Date: 2010-05-25 20:37:46 +0000 (Tue, 25 May 2010)
New Revision: 22395
Modified:
projects/articles/circumvention-features.html
projects/articles/circumvention-features.tex
projects/articles/circumvention-features.txt
Log:
andrew pointed out that this phrase could lead to confusion.
Modified: projects/articles/circumvention-features.html
===================================================================
--- projects/articles/circumvention-features.html 2010-05-25 20:15:27 UTC (rev 22394)
+++ projects/articles/circumvention-features.html 2010-05-25 20:37:46 UTC (rev 22395)
@@ -162,7 +162,7 @@
</p>
<p>
-Just having an open software license is not enough. Trustworthy
+Just having an open source license is not enough. Trustworthy
circumvention tools need to provide clear, complete documentation for
other security experts — not just how it's built but what features
and goals its developers aimed for. Do they intend for it to provide
Modified: projects/articles/circumvention-features.tex
===================================================================
--- projects/articles/circumvention-features.tex 2010-05-25 20:15:27 UTC (rev 22394)
+++ projects/articles/circumvention-features.tex 2010-05-25 20:37:46 UTC (rev 22395)
@@ -146,9 +146,9 @@
you are forced to trust that a small number of developers have thought
of and addressed every possible problem.
-Just having an open software license is not enough. Trustworthy
+Just having an open source license is not enough. Trustworthy
circumvention tools need to provide clear, complete documentation for
-other security experts â not just how it's built but what features
+other security experts -- not just how it's built but what features
and goals its developers aimed for. Do they intend for it to provide
privacy? What kind and against what attackers? In what way does it
use encryption? Do they intend for it to stand up to attacks from
Modified: projects/articles/circumvention-features.txt
===================================================================
--- projects/articles/circumvention-features.txt 2010-05-25 20:15:27 UTC (rev 22394)
+++ projects/articles/circumvention-features.txt 2010-05-25 20:37:46 UTC (rev 22395)
@@ -130,7 +130,7 @@
you are forced to trust that a small number of developers have thought
of and addressed every possible problem.
-Just having an open software license is not enough. Trustworthy
+Just having an open source license is not enough. Trustworthy
circumvention tools need to provide clear, complete documentation for
other security experts -- not just how it's built but what features
and goals its developers aimed for. Do they intend for it to provide