aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNils Gillmann <ng0@n0.is>2018-10-10 08:24:05 +0000
committerNils Gillmann <ng0@n0.is>2018-10-10 08:24:05 +0000
commit247202ff339c90ec69175cf355b5541f6e7fa8ae (patch)
treefb507627e2a56d14c5cb011127326884fbd39266
parentc21f3c8f28c142b41e3e10e801ec5291f9ad8f0a (diff)
downloadgnunet-247202ff339c90ec69175cf355b5541f6e7fa8ae.tar.gz
gnunet-247202ff339c90ec69175cf355b5541f6e7fa8ae.zip
philosophy: reformat paragraphs.
Signed-off-by: Nils Gillmann <ng0@n0.is>
-rw-r--r--doc/documentation/chapters/philosophy.texi37
1 files changed, 20 insertions, 17 deletions
diff --git a/doc/documentation/chapters/philosophy.texi b/doc/documentation/chapters/philosophy.texi
index 52b74a029..e57c20914 100644
--- a/doc/documentation/chapters/philosophy.texi
+++ b/doc/documentation/chapters/philosophy.texi
@@ -51,28 +51,31 @@ to redistribute exact copies, and to distribute modified versions.
51@node Privacy and Anonymity 51@node Privacy and Anonymity
52@section Privacy and Anonymity 52@section Privacy and Anonymity
53 53
54The GNUnet protocols minimize the leakage of personally identifiable information of participants and 54The GNUnet protocols minimize the leakage of personally identifiable
55do not allow adversaries to control, track, monitor or censor users activities. The 55information of participants and do not allow adversaries to control,
56GNUnet protocols also make it as hard as possible to disrupt operations by participating in the network with malicious intent. 56track, monitor or censor users activities. The GNUnet protocols also
57make it as hard as possible to disrupt operations by participating in
58the network with malicious intent.
57 59
58Analyzing participant's activities becomes more difficult as the number of peers and 60Analyzing participant's activities becomes more difficult as the
59applications that generate traffic on the network grows, even if the additional 61number of peers and applications that generate traffic on the network
60traffic generated is not related to anonymous communication. This is one of the reasons why GNUnet is developed as a peer-to-peer 62grows, even if the additional traffic generated is not related to
61framework where many applications share the lower layers of an 63anonymous communication. This is one of the reasons why GNUnet is
62increasingly complex protocol stack. The GNUnet architecture encourages many 64developed as a peer-to-peer framework where many applications share
63different forms of peer-to-peer applications. 65the lower layers of an increasingly complex protocol stack. The GNUnet
66architecture encourages many different forms of peer-to-peer
67applications.
64 68
65@cindex Practicality 69@cindex Practicality
66@node Practicality 70@node Practicality
67@section Practicality 71@section Practicality
68 72
69Whereever possible GNUnet allows the peer to adjust its operations 73Whereever possible GNUnet allows the peer to adjust its operations and
70and functionalities to specific use cases. A GNUnet peer running on 74functionalities to specific use cases. A GNUnet peer running on a
71a mobile device with limited battery for example might choose not to 75mobile device with limited battery for example might choose not to
72relay traffic for other participants. 76relay traffic for other participants.
73 77
74For certain applications like file-sharing GNUnet allows participants to trade degrees of anonymity in 78For certain applications like file-sharing GNUnet allows participants
75exchange for increased efficiency. However, it is not possible for any 79to trade degrees of anonymity in exchange for increased
76user's efficiency requirements to compromise the anonymity 80efficiency. However, it is not possible for any user's efficiency
77of any other user. 81requirements to compromise the anonymity of any other user.
78