|
@@ -206,7 +206,7 @@ or rotated its keys. In Tor, clients negotiate {\it rendezvous points}
|
|
|
to connect with hidden servers; reply onions are no longer required.
|
|
|
|
|
|
|
|
|
-Unlike Freedom \cite{freedom2-arch}, Tor does not anonymizes
|
|
|
+Unlike Freedom \cite{freedom2-arch}, Tor does not anonymize
|
|
|
non-TCP protocols---not requiring patches (or built-in support) in an
|
|
|
operating system's network stack has been valuable to Tor's
|
|
|
portability and deployability.
|