Small Updates and Clarifications #6
|
@ -14,7 +14,7 @@ use of discardable, untrusted, anonymous infrastructure.
|
|||
|
||||
Since then, Cwtch has evolved into a protocol in its own right, this section
|
||||
will outline the various known risks that Cwtch attempts to mitigate and will
|
||||
nbe heavily referenced throughout the rest of the document when discussing the
|
||||
be heavily referenced throughout the rest of the document when discussing the
|
||||
various sub-components of the Cwtch Architecture.
|
||||
|
||||
## Threat Model
|
||||
|
|
Loading…
Reference in New Issue