Small Updates and Clarifications #6
|
@ -14,7 +14,7 @@ use of discardable, untrusted, anonymous infrastructure.
|
||||||
|
|
||||||
Since then, Cwtch has evolved into a protocol in its own right, this section
|
Since then, Cwtch has evolved into a protocol in its own right, this section
|
||||||
will outline the various known risks that Cwtch attempts to mitigate and will
|
will outline the various known risks that Cwtch attempts to mitigate and will
|
||||||
nbe heavily referenced throughout the rest of the document when discussing the
|
be heavily referenced throughout the rest of the document when discussing the
|
||||||
various sub-components of the Cwtch Architecture.
|
various sub-components of the Cwtch Architecture.
|
||||||
|
|
||||||
## Threat Model
|
## Threat Model
|
||||||
|
|
Loading…
Reference in New Issue