@@ -254,7 +254,7 @@ The browser's adversaries have a number of possible goals, capabilities, and att
The adversary may wish to block access to particular websites or to the entire Tor Network.
### 3.2 Adversary Capabilities: Positioning
### 3.2 Adversary Positioning
Adversaries may position themselves at a number of different locations in order to execute their attacks.
...
...
@@ -294,7 +294,7 @@ Adversaries may position themselves at a number of different locations in order
Adversaries may have intermittent or constant physical access to users' computers.
They may also be able to compel users to surrender their encryption keys.
### 3.3 Adversary Capabilities: Attacks
### 3.3 Adversary Attacks
The adversary can perform the following attacks from a number of different positions to accomplish various aspects of their goals.
It should be noted that many of these attacks (especially those involving IP address leakage) are often performed by accident by websites that simply have JavaScript, dynamic CSS elements, and plugins.