Tweak intro to Adversary Model authored by Richard Pospesel's avatar Richard Pospesel
...@@ -226,8 +226,7 @@ It essentially provides whole operating system level data isolation to its users ...@@ -226,8 +226,7 @@ It essentially provides whole operating system level data isolation to its users
## 3. Adversary Model ## 3. Adversary Model
A Tor web browser adversary has a number of goals, capabilities, and attack types that can be used to illustrate the design requirements for the browser. The browser's adversaries have a number of possible goals, capabilities, and attack types that can be used to illustrate the design requirements for the browser.
Let's start with the goals.
### 3.1 Adversary Goals ### 3.1 Adversary Goals
... ...
......