diff --git a/www.i2p2/pages/how_networkdatabase.html b/www.i2p2/pages/how_networkdatabase.html
index 011ac5bc8be3ec8628fb6c1bf5f68c318b362c60..3f44ccbad33d1dbd9b89a2862880c3b5009bc171 100644
--- a/www.i2p2/pages/how_networkdatabase.html
+++ b/www.i2p2/pages/how_networkdatabase.html
@@ -3,7 +3,7 @@
 {% block content %}
 
 <p>
-  Updated August 2011, current as of router version 0.8.9
+  Updated June 2012, current as of router version 0.9
 </p>
 
 <h2>Overview</h2>
@@ -78,7 +78,6 @@
   Current statistics are limited to:
 </p>
 <ul>
-  <li>1 hour average bandwidth (average of outbound  and inbound bandwidth)
   <li>Client and exploratory tunnel build success, reject, and timeout rates
   <li>1 hour average number of participating tunnels
 </ul>
@@ -659,7 +658,8 @@ This attack becomes more difficult as the network size grows.
   Several defenses are possible, and most of these are planned:
 </p>
 <ul>
-  <li>Switching from HTTP to HTTPS for reseeding, with SSL certificate verification
+  <li>Disallow fallback from HTTPS to HTTP for reseeding.
+    A MITM attacker could simply block HTTPS, then respond to the HTTP.
   <li>Changing the reseed task to fetch a subset of RouterInfos from
     each of several reseed sites rather than using only a single site
   <li>Creating an out-of-network reseed monitoring service that