Spelling fixes

This commit is contained in:
Sarah Jamie Lewis 2020-07-06 13:48:50 -07:00
parent bf5e7cd240
commit de80a0285f
1 changed files with 7 additions and 7 deletions

View File

@ -9,14 +9,14 @@ Unlike in relay-based schemes where the groups assign a leader, set of
offline) - untrusted infrastructure has a goal of realizing those properties
without the assumption of trust.
The orignal Cwtch paper defined a set of properties that Cwtch Servers were
The original Cwtch paper defined a set of properties that Cwtch Servers were
expected to provide:
* Cwtch Server may be used by multiple groupsor just one.
* Cwtch Server may be used by multiple groups or just one.
* A Cwtch Server, without collaboration of a group member, should
never learn the identity of participants within a group.
* A Cwtch Server should never learn the content of any communication.
* A CwtchServer should never be able to distinguish messages as belonging
* A Cwtch Server should never be able to distinguish messages as belonging
to a particular group.
We note here that these properties are a superset of the design aims of Private
@ -40,14 +40,14 @@ guarantee more efficient properties by relaxing trust and security
### Detectable Faults
* If a Cwtch server fails to relay a specific message to a subset of group
members then there will be a detectable gap in the message tree of certain
peers that can be discovered through peer-to-peer gossip.
members then there will be a detectable gap in the message tree of certain
peers that can be discovered through peer-to-peer gossip.
* A Cwtch server cannot modify any message without the key material known to
the group (any attempt to do so for a subset of group memebers will result in
identical behavior to failing to relay a message).
* While a server *can* duplicate messages, these will have no impact on the
group message tree (because of encryption, nonces and message identities
) - the source of the duplication is not knowable to a peer.
group message tree (because of encryption, nonces and message identities) -
the source of the duplication is not knowable to a peer.
## Efficiency