Remove repeated word and oxymoron (#1647)

Signed-off-by: Daniel Gray <dng@disroot.org>
This commit is contained in:
Morten Lautrup 2022-08-16 09:23:18 +00:00 committed by Daniel Gray
parent 3d8c8d969c
commit 61acc755c6
No known key found for this signature in database
GPG Key ID: 41911F722B0F9AE3
2 changed files with 2 additions and 2 deletions

View File

@ -171,7 +171,7 @@ So, how might this look?
One of the clearest threat models is one where people *know who you are* and one where they do not. There will always be situations where you must declare your legal name and places where you can get away without doing so.
1. **Known identity** - A known identity is used for things where you must declare your name. There are many such legal documents and contracts where a legal identity is required. This could range from opening a bank account, signing a property lease, obtaining a passport, a customs declaration when importing an item or otherwise dealing with your Government. These things will usually always lead back credentials such as credit cards, credit rating checks, account numbers and possibly physical addresses.
1. **Known identity** - A known identity is used for things where you must declare your name. There are many such legal documents and contracts where a legal identity is required. This could range from opening a bank account, signing a property lease, obtaining a passport, a customs declaration when importing an item or otherwise dealing with your Government. These things will usually lead back credentials such as credit cards, credit rating checks, account numbers and possibly physical addresses.
We don't suggest using a VPN or Tor for any of these things as your identity is already known through other means.

View File

@ -143,7 +143,7 @@ Briar supports perfect forward secrecy by using the Bramble [Handshake](https://
## Types of Communication Networks
There are several network architectures commonly used to relay messages between people. These networks can provide different different privacy guarantees, which is why it's worth considering your [threat model](https://en.wikipedia.org/wiki/Threat_model) when making a decision about which app to use.
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](https://en.wikipedia.org/wiki/Threat_model) when making a decision about which app to use.
### Centralized Networks