diff options
author | Nils Gillmann <ng0@n0.is> | 2018-10-10 08:24:05 +0000 |
---|---|---|
committer | Nils Gillmann <ng0@n0.is> | 2018-10-10 08:24:05 +0000 |
commit | 247202ff339c90ec69175cf355b5541f6e7fa8ae (patch) | |
tree | fb507627e2a56d14c5cb011127326884fbd39266 /doc/documentation | |
parent | c21f3c8f28c142b41e3e10e801ec5291f9ad8f0a (diff) |
philosophy: reformat paragraphs.
Signed-off-by: Nils Gillmann <ng0@n0.is>
Diffstat (limited to 'doc/documentation')
-rw-r--r-- | doc/documentation/chapters/philosophy.texi | 37 |
1 files changed, 20 insertions, 17 deletions
diff --git a/doc/documentation/chapters/philosophy.texi b/doc/documentation/chapters/philosophy.texi index 52b74a029..e57c20914 100644 --- a/doc/documentation/chapters/philosophy.texi +++ b/doc/documentation/chapters/philosophy.texi @@ -51,28 +51,31 @@ to redistribute exact copies, and to distribute modified versions. @node Privacy and Anonymity @section Privacy and Anonymity -The GNUnet protocols minimize the leakage of personally identifiable information of participants and -do not allow adversaries to control, track, monitor or censor users activities. The -GNUnet protocols also make it as hard as possible to disrupt operations by participating in the network with malicious intent. +The GNUnet protocols minimize the leakage of personally identifiable +information of participants and do not allow adversaries to control, +track, monitor or censor users activities. The GNUnet protocols also +make it as hard as possible to disrupt operations by participating in +the network with malicious intent. -Analyzing participant's activities becomes more difficult as the number of peers and -applications that generate traffic on the network grows, even if the additional -traffic generated is not related to anonymous communication. This is one of the reasons why GNUnet is developed as a peer-to-peer -framework where many applications share the lower layers of an -increasingly complex protocol stack. The GNUnet architecture encourages many -different forms of peer-to-peer applications. +Analyzing participant's activities becomes more difficult as the +number of peers and applications that generate traffic on the network +grows, even if the additional traffic generated is not related to +anonymous communication. This is one of the reasons why GNUnet is +developed as a peer-to-peer framework where many applications share +the lower layers of an increasingly complex protocol stack. The GNUnet +architecture encourages many different forms of peer-to-peer +applications. @cindex Practicality @node Practicality @section Practicality -Whereever possible GNUnet allows the peer to adjust its operations -and functionalities to specific use cases. A GNUnet peer running on -a mobile device with limited battery for example might choose not to +Whereever possible GNUnet allows the peer to adjust its operations and +functionalities to specific use cases. A GNUnet peer running on a +mobile device with limited battery for example might choose not to relay traffic for other participants. -For certain applications like file-sharing GNUnet allows participants to trade degrees of anonymity in -exchange for increased efficiency. However, it is not possible for any -user's efficiency requirements to compromise the anonymity -of any other user. - +For certain applications like file-sharing GNUnet allows participants +to trade degrees of anonymity in exchange for increased +efficiency. However, it is not possible for any user's efficiency +requirements to compromise the anonymity of any other user. |