mirror of
				https://github.com/privacyguides/privacyguides.org.git
				synced 2025-10-31 11:36:36 +00:00 
			
		
		
		
	Fix word order, typo (#1645)
Signed-off-by: Daniel Gray <dng@disroot.org>
This commit is contained in:
		 Morten Lautrup
					Morten Lautrup
				
			
				
					committed by
					
						 Daniel Gray
						Daniel Gray
					
				
			
			
				
	
			
			
			 Daniel Gray
						Daniel Gray
					
				
			
						parent
						
							68096ef2ab
						
					
				
				
					commit
					3d8c8d969c
				
			| @@ -65,7 +65,7 @@ Tor allows us to connect to a server without any single party knowing the entire | ||||
|  | ||||
| Though Tor does provide strong privacy guarantees, one must be aware that Tor is not perfect: | ||||
|  | ||||
| - Well-funded adversaries with the capability to passively watch most network traffic over the globe have a chance of deanonymizing Tor users by means of advanced traffic analysis. Nor Tor does not protect you from exposing yourself by mistake, such as if you share to much information about your real identity. | ||||
| - Well-funded adversaries with the capability to passively watch most network traffic over the globe have a chance of deanonymizing Tor users by means of advanced traffic analysis. Nor does Tor protect you from exposing yourself by mistake, such as if you share too much information about your real identity. | ||||
| - Tor exit nodes can also monitor traffic that passes through them. This means traffic which is not encrypted, such as plain HTTP traffic, can be recorded and monitored. If such traffic contains personally identifiable information, then it can deanonymize you to that exit node. Thus, we recommend using HTTPS over Tor where possible. | ||||
|  | ||||
| If you wish to use Tor for browsing the web, we only recommend the **official** Tor Browser—it is designed to prevent fingerprinting. | ||||
|   | ||||
		Reference in New Issue
	
	Block a user