diff --git a/i2p2www/spec/proposals/166-identity-aware-proxies.rst b/i2p2www/spec/proposals/166-identity-aware-proxies.rst index 4b2d14968766eeb63d49b7bfc8a028a3921e5af6..8923f3bf3a7b653bda7f85131822d90454d6bef7 100644 --- a/i2p2www/spec/proposals/166-identity-aware-proxies.rst +++ b/i2p2www/spec/proposals/166-identity-aware-proxies.rst @@ -90,7 +90,7 @@ identity†for the application lies. There are several possibilities: It also depends on who you think your attackers are and what you would like to prevent. Someone in a position to carry out this attack would be -a person in a position to have multiple sites “collude†in order too +a person in a position to have multiple sites “collude†in order to collect the destinations of I2P Clients, in order to correlate activity on one site with activity on another. This is a fairly basic form of profile-building on the clear web where organizations can correlate @@ -111,7 +111,7 @@ Is it Solvable? It is probably not possible to make a proxy which intelligently responds to every possible case in which it’s operation could weaken the anonymity of an application. However, it is possible to build a proxy -which intelligently responds to a specific application which is behaves +which intelligently responds to a specific application which behaves in a predictable way. For instance, in modern Web Browsers, it is expected that users will have multiple tabs open, where they will be interacting with multiple web sites, which will be distinguished by