Name formatting change for 'Adversary Capabilities' sections authored by Richard Pospesel's avatar Richard Pospesel
......@@ -40,9 +40,9 @@ June 15, 2018
3.1 [Adversary Goals](#31-adversary-goals)
3.2 [Adversary Capabilities - Positioning](#32-adversary-capabilities---positioning)
3.2 [Adversary Capabilities: Positioning](#32-adversary-capabilities-positioning)
3.3 [Adversary Capabilities - Attacks](#33-adversary-capabilities---attacks)
3.3 [Adversary Capabilities: Attacks](#33-adversary-capabilities-attacks)
4. [Implementation](#4-implementation)
......@@ -254,7 +254,7 @@ The browser's adversaries have a number of possible goals, capabilities, and att
The adversary may wish to block access to particular websites or to the entire Tor Network.
### 3.2 Adversary Capabilities - Positioning
### 3.2 Adversary Capabilities: Positioning
The adversary can position themselves at a number of different locations in order to execute their attacks.
......@@ -285,7 +285,7 @@ The adversary can position themselves at a number of different locations in orde
`TODO: also mention adversaries in the home`
### 3.3 Adversary Capabilities - Attacks
### 3.3 Adversary Capabilities: Attacks
The adversary can perform the following attacks from a number of different positions to accomplish various aspects of their goals.
It should be noted that many of these attacks (especially those involving IP address leakage) are often performed by accident by websites that simply have JavaScript, dynamic CSS elements, and plugins.
......
......