summaryrefslogtreecommitdiff
path: root/doc/documentation
diff options
context:
space:
mode:
authorNils Gillmann <ng0@n0.is>2018-10-10 08:24:05 +0000
committerNils Gillmann <ng0@n0.is>2018-10-10 08:24:05 +0000
commit247202ff339c90ec69175cf355b5541f6e7fa8ae (patch)
treefb507627e2a56d14c5cb011127326884fbd39266 /doc/documentation
parentc21f3c8f28c142b41e3e10e801ec5291f9ad8f0a (diff)
philosophy: reformat paragraphs.
Signed-off-by: Nils Gillmann <ng0@n0.is>
Diffstat (limited to 'doc/documentation')
-rw-r--r--doc/documentation/chapters/philosophy.texi37
1 files changed, 20 insertions, 17 deletions
diff --git a/doc/documentation/chapters/philosophy.texi b/doc/documentation/chapters/philosophy.texi
index 52b74a029..e57c20914 100644
--- a/doc/documentation/chapters/philosophy.texi
+++ b/doc/documentation/chapters/philosophy.texi
@@ -51,28 +51,31 @@ to redistribute exact copies, and to distribute modified versions.
@node Privacy and Anonymity
@section Privacy and Anonymity
-The GNUnet protocols minimize the leakage of personally identifiable information of participants and
-do not allow adversaries to control, track, monitor or censor users activities. The
-GNUnet protocols also make it as hard as possible to disrupt operations by participating in the network with malicious intent.
+The GNUnet protocols minimize the leakage of personally identifiable
+information of participants and do not allow adversaries to control,
+track, monitor or censor users activities. The GNUnet protocols also
+make it as hard as possible to disrupt operations by participating in
+the network with malicious intent.
-Analyzing participant's activities becomes more difficult as the number of peers and
-applications that generate traffic on the network grows, even if the additional
-traffic generated is not related to anonymous communication. This is one of the reasons why GNUnet is developed as a peer-to-peer
-framework where many applications share the lower layers of an
-increasingly complex protocol stack. The GNUnet architecture encourages many
-different forms of peer-to-peer applications.
+Analyzing participant's activities becomes more difficult as the
+number of peers and applications that generate traffic on the network
+grows, even if the additional traffic generated is not related to
+anonymous communication. This is one of the reasons why GNUnet is
+developed as a peer-to-peer framework where many applications share
+the lower layers of an increasingly complex protocol stack. The GNUnet
+architecture encourages many different forms of peer-to-peer
+applications.
@cindex Practicality
@node Practicality
@section Practicality
-Whereever possible GNUnet allows the peer to adjust its operations
-and functionalities to specific use cases. A GNUnet peer running on
-a mobile device with limited battery for example might choose not to
+Whereever possible GNUnet allows the peer to adjust its operations and
+functionalities to specific use cases. A GNUnet peer running on a
+mobile device with limited battery for example might choose not to
relay traffic for other participants.
-For certain applications like file-sharing GNUnet allows participants to trade degrees of anonymity in
-exchange for increased efficiency. However, it is not possible for any
-user's efficiency requirements to compromise the anonymity
-of any other user.
-
+For certain applications like file-sharing GNUnet allows participants
+to trade degrees of anonymity in exchange for increased
+efficiency. However, it is not possible for any user's efficiency
+requirements to compromise the anonymity of any other user.