diff --git a/doc/design-paper/challenges.pdf b/doc/design-paper/challenges.pdf index fbda3caa5e..a62dcc0b84 100644 Binary files a/doc/design-paper/challenges.pdf and b/doc/design-paper/challenges.pdf differ diff --git a/doc/design-paper/challenges.tex b/doc/design-paper/challenges.tex index 953b622910..1259d4b18d 100644 --- a/doc/design-paper/challenges.tex +++ b/doc/design-paper/challenges.tex @@ -186,7 +186,7 @@ their popular Java Anon Proxy anonymizing client. \medskip \noindent {\bf Threat models and design philosophy.} -The ideal Tor network would be practical, useful and and anonymous. When +The ideal Tor network would be practical, useful and anonymous. When trade-offs arise between these properties, Tor's research strategy has been to remain useful enough to attract many users, and practical enough to support them. Only subject to these