@@ -82,7 +82,7 @@ This document describes the [adversary model](#3-adversary-model), [design requi
...
@@ -82,7 +82,7 @@ This document describes the [adversary model](#3-adversary-model), [design requi
This document is also meant to serve as a set of design requirements and to describe a reference implementation of a Private Browsing Mode that defends against active network adversaries, in addition to the passive forensic local adversary currently addressed by the major browsers.
This document is also meant to serve as a set of design requirements and to describe a reference implementation of a Private Browsing Mode that defends against active network adversaries, in addition to the passive forensic local adversary currently addressed by the major browsers.
For more practical information regarding Tor Browser development, please consult the [Tor Browser Hacking Guide](https://gitlab.torproject.org/tpo/applications/tor-browser/-/wikis/Hacking).
For more practical information regarding Tor Browser development, please consult the [Application's Team Wiki](https://gitlab.torproject.org/tpo/applications/team/-/wikis/Development-Information).