From 3d8c8d969c5cf35f097533d2bf77c14296d14bd1 Mon Sep 17 00:00:00 2001 From: Morten Lautrup <44033709+purtual@users.noreply.github.com> Date: Wed, 17 Aug 2022 04:11:39 +0000 Subject: [PATCH] Fix word order, typo (#1645) Signed-off-by: Daniel Gray --- docs/basics/tor-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/basics/tor-overview.md b/docs/basics/tor-overview.md index 7623709d..27bd75f2 100644 --- a/docs/basics/tor-overview.md +++ b/docs/basics/tor-overview.md @@ -65,7 +65,7 @@ Tor allows us to connect to a server without any single party knowing the entire Though Tor does provide strong privacy guarantees, one must be aware that Tor is not perfect: -- Well-funded adversaries with the capability to passively watch most network traffic over the globe have a chance of deanonymizing Tor users by means of advanced traffic analysis. Nor Tor does not protect you from exposing yourself by mistake, such as if you share to much information about your real identity. +- Well-funded adversaries with the capability to passively watch most network traffic over the globe have a chance of deanonymizing Tor users by means of advanced traffic analysis. Nor does Tor protect you from exposing yourself by mistake, such as if you share too much information about your real identity. - Tor exit nodes can also monitor traffic that passes through them. This means traffic which is not encrypted, such as plain HTTP traffic, can be recorded and monitored. If such traffic contains personally identifiable information, then it can deanonymize you to that exit node. Thus, we recommend using HTTPS over Tor where possible. If you wish to use Tor for browsing the web, we only recommend the **official** Tor Browser—it is designed to prevent fingerprinting.