From 61acc755c6042742385e409401931dc264a8d60c Mon Sep 17 00:00:00 2001 From: Morten Lautrup <44033709+purtual@users.noreply.github.com> Date: Tue, 16 Aug 2022 09:23:18 +0000 Subject: [PATCH] Remove repeated word and oxymoron (#1647) Signed-off-by: Daniel Gray --- docs/basics/common-threats.en.md | 2 +- docs/real-time-communication.en.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/basics/common-threats.en.md b/docs/basics/common-threats.en.md index 9187dec5..7c12f5be 100644 --- a/docs/basics/common-threats.en.md +++ b/docs/basics/common-threats.en.md @@ -171,7 +171,7 @@ So, how might this look? One of the clearest threat models is one where people *know who you are* and one where they do not. There will always be situations where you must declare your legal name and places where you can get away without doing so. -1. **Known identity** - A known identity is used for things where you must declare your name. There are many such legal documents and contracts where a legal identity is required. This could range from opening a bank account, signing a property lease, obtaining a passport, a customs declaration when importing an item or otherwise dealing with your Government. These things will usually always lead back credentials such as credit cards, credit rating checks, account numbers and possibly physical addresses. +1. **Known identity** - A known identity is used for things where you must declare your name. There are many such legal documents and contracts where a legal identity is required. This could range from opening a bank account, signing a property lease, obtaining a passport, a customs declaration when importing an item or otherwise dealing with your Government. These things will usually lead back credentials such as credit cards, credit rating checks, account numbers and possibly physical addresses. We don't suggest using a VPN or Tor for any of these things as your identity is already known through other means. diff --git a/docs/real-time-communication.en.md b/docs/real-time-communication.en.md index f91642f8..512214d4 100644 --- a/docs/real-time-communication.en.md +++ b/docs/real-time-communication.en.md @@ -143,7 +143,7 @@ Briar supports perfect forward secrecy by using the Bramble [Handshake](https:// ## Types of Communication Networks -There are several network architectures commonly used to relay messages between people. These networks can provide different different privacy guarantees, which is why it's worth considering your [threat model](https://en.wikipedia.org/wiki/Threat_model) when making a decision about which app to use. +There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](https://en.wikipedia.org/wiki/Threat_model) when making a decision about which app to use. ### Centralized Networks