aboutsummaryrefslogtreecommitdiff
path: root/doc/design-paper/challenges.tex
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2005-02-09 12:13:38 +0000
committerRoger Dingledine <arma@torproject.org>2005-02-09 12:13:38 +0000
commit1cc0933d93692353ced4bef48ccfb35539871f45 (patch)
treee0f08c24bfdb4d290700834d3212a362ab6a1f89 /doc/design-paper/challenges.tex
parent5b7bbb008c59bcae1081d274e396e579c42392da (diff)
downloadtor-1cc0933d93692353ced4bef48ccfb35539871f45.tar
tor-1cc0933d93692353ced4bef48ccfb35539871f45.tar.gz
fix wordo
svn:r3604
Diffstat (limited to 'doc/design-paper/challenges.tex')
-rw-r--r--doc/design-paper/challenges.tex2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/design-paper/challenges.tex b/doc/design-paper/challenges.tex
index 953b62291..1259d4b18 100644
--- a/doc/design-paper/challenges.tex
+++ b/doc/design-paper/challenges.tex
@@ -186,7 +186,7 @@ their popular Java Anon Proxy anonymizing client.
\medskip
\noindent
{\bf Threat models and design philosophy.}
-The ideal Tor network would be practical, useful and and anonymous. When
+The ideal Tor network would be practical, useful and anonymous. When
trade-offs arise between these properties, Tor's research strategy has been
to remain useful enough to attract many users,
and practical enough to support them. Only subject to these