summaryrefslogtreecommitdiff
path: root/doc/tips/peer_to_peer_network_with_tor.mdwn
diff options
context:
space:
mode:
authorGravatar Joey Hess <joeyh@joeyh.name>2017-03-02 13:28:31 -0400
committerGravatar Joey Hess <joeyh@joeyh.name>2017-03-02 13:28:31 -0400
commitaaf552f2078b737427ab42f936807ed298c3bc3a (patch)
tree444c823e4155680d835ee4f8db87412a57d57a99 /doc/tips/peer_to_peer_network_with_tor.mdwn
parentcca684b17dc3583fd4137061f32282d2e6b2100e (diff)
clarification
Diffstat (limited to 'doc/tips/peer_to_peer_network_with_tor.mdwn')
-rw-r--r--doc/tips/peer_to_peer_network_with_tor.mdwn10
1 files changed, 5 insertions, 5 deletions
diff --git a/doc/tips/peer_to_peer_network_with_tor.mdwn b/doc/tips/peer_to_peer_network_with_tor.mdwn
index d2aa89e0b..cefca3c0b 100644
--- a/doc/tips/peer_to_peer_network_with_tor.mdwn
+++ b/doc/tips/peer_to_peer_network_with_tor.mdwn
@@ -132,11 +132,11 @@ Tor hidden services can be quite secure. But this doesn't mean that using
git-annex over Tor is automatically perfectly secure. Here are some things
to consider:
-* Anyone who learns the address of a peer can connect to that peer,
- download the whole history of the git repository, and any available
- annexed files. They can also upload new files to the peer, and even
- remove annexed files from the peer. So consider ways that the address
- of a peer might be exposed.
+* Anyone who learns the onion address address and authentication data of a peer
+ can connect to that peer, download the whole history of the git repository,
+ and any available annexed files. They can also upload new files to the peer,
+ and even remove annexed files from the peer. So consider ways that the
+ authentication data of a peer might be exposed.
* While Tor can be used to anonymize who you are, git defaults to including
your name and email address in git commit messages. So if you want an