@@ -226,8 +226,7 @@ It essentially provides whole operating system level data isolation to its users
## 3. Adversary Model
A Tor web browser adversary has a number of goals, capabilities, and attack types that can be used to illustrate the design requirements for the browser.
Let's start with the goals.
The browser's adversaries have a number of possible goals, capabilities, and attack types that can be used to illustrate the design requirements for the browser.