diff --git a/i2p2www/pages/site/docs/how/elgamal-aes.html b/i2p2www/pages/site/docs/how/elgamal-aes.html
index 70ae9b724877894ac39d3513d379a12ea1e6a53c..dd17122c25a0bcfaccbf8dd70129b6fd1bdb4ec2 100644
--- a/i2p2www/pages/site/docs/how/elgamal-aes.html
+++ b/i2p2www/pages/site/docs/how/elgamal-aes.html
@@ -1,7 +1,7 @@
 {% extends "global/layout.html" %}
 {% block title %}{% trans %}ElGamal/AES + SessionTag Encryption{% endtrans %}{% endblock %}
-{% block lastupdated %}{% trans %}January 2016{% endtrans %}{% endblock %}
-{% block accuratefor %}0.9.24{% endblock %}
+{% block lastupdated %}April 2020{% endblock %}
+{% block accuratefor %}0.9.46{% endblock %}
 {% block content %}
 <h2>{% trans %}Overview{% endtrans %}</h2>
 <p>{% trans -%}
@@ -342,6 +342,14 @@ See the <a href="{{ i2cpspec }}#msg_SendMessageExpires">I2CP Send Message Expire
 
 
 <h2 id="future">{% trans %}Future Work{% endtrans %}</h2>
+
+<p><b>Note:</b>
+ElGamal/AES+SessionTags is being replaced with ECIES-X25519-AEAD-Ratchet (Proposal 144).
+The issues and ideas referenced below have been incorporated
+into the design of the new protocol.
+The following items will not be addressed in ElGamal/AES+SessionTags.
+</p>
+
 <p>{% trans -%}
 There are many possible areas to tune the Session Key Manager's algorithms;
 some may interact with the streaming library behavior, or have significant
diff --git a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst
index bb1952825a2ab8166462e943a62b811e71e3d52f..9e89cf4cff2ded184dd957b63a1e675e3f6a408c 100644
--- a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst
+++ b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst
@@ -5,7 +5,7 @@ ECIES-X25519-AEAD-Ratchet
     :author: zzz, chisana, orignal
     :created: 2018-11-22
     :thread: http://zzz.i2p/topics/2639
-    :lastupdated: 2020-04-27
+    :lastupdated: 2020-04-28
     :status: Open
     :target: 0.9.46
     :implementedin: 0.9.46
@@ -3512,11 +3512,14 @@ Storage
 The sender generates tags and keys on the fly, so there is no storage.
 This cuts overall storage requirements in half compared to ElGamal/AES.
 ECIES tags are 8 bytes instead of 32 for ElGamal/AES.
-This cuts overall storage requiremens by another factor of 4.
+This cuts overall storage requirements by another factor of 4.
 Per-tag session keys are not stored at the receiver except for "gaps",
 which are minimal for reasonable loss rates.
 
-Therefore, the total space savings vs. ElGamal/AES is a factor of 8, or 87%.
+The 33% reduction in tag expiration time creates another 33% savings,
+assuming short session times.
+
+Therefore, the total space savings vs. ElGamal/AES is a factor of 10.7, or 92%.