diff --git a/i2p2www/spec/proposals/166-identity-aware-proxies.rst b/i2p2www/spec/proposals/166-identity-aware-proxies.rst
index 4b2d14968766eeb63d49b7bfc8a028a3921e5af6..8923f3bf3a7b653bda7f85131822d90454d6bef7 100644
--- a/i2p2www/spec/proposals/166-identity-aware-proxies.rst
+++ b/i2p2www/spec/proposals/166-identity-aware-proxies.rst
@@ -90,7 +90,7 @@ identity” for the application lies. There are several possibilities:
 
 It also depends on who you think your attackers are and what you would
 like to prevent. Someone in a position to carry out this attack would be
-a person in a position to have multiple sites “collude” in order too
+a person in a position to have multiple sites “collude” in order to
 collect the destinations of I2P Clients, in order to correlate activity
 on one site with activity on another. This is a fairly basic form of
 profile-building on the clear web where organizations can correlate
@@ -111,7 +111,7 @@ Is it Solvable?
 It is probably not possible to make a proxy which intelligently responds
 to every possible case in which it’s operation could weaken the
 anonymity of an application. However, it is possible to build a proxy
-which intelligently responds to a specific application which is behaves
+which intelligently responds to a specific application which behaves
 in a predictable way. For instance, in modern Web Browsers, it is
 expected that users will have multiple tabs open, where they will be
 interacting with multiple web sites, which will be distinguished by