commit 47d2e4f06ec26a79542865d054f01ea09304f59d
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Wed Apr 26 15:16:41 2017 -0400
Reflow blurb.
---
ChangeLog | 8 ++++----
ReleaseNotes | 8 ++++----
2 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 7efebf1..39ef538 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -4,10 +4,10 @@ Changes in version 0.3.0.6 - 2017-04-26
With the 0.3.0 series, clients and relays now use Ed25519 keys to
authenticate their link connections to relays, rather than the old
RSA1024 keys that they used before. (Circuit crypto has been
- Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced
+ Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced
the guard selection and replacement algorithm to behave more robustly
- in the presence of unreliable networks, and to resist guard-capture
- attacks.
+ in the presence of unreliable networks, and to resist guard-
+ capture attacks.
This series also includes numerous other small features and bugfixes,
along with more groundwork for the upcoming hidden-services revamp.
@@ -15,7 +15,7 @@ Changes in version 0.3.0.6 - 2017-04-26
Per our stable release policy, we plan to support the Tor 0.3.0
release series for at least the next nine months, or for three months
after the first stable release of the 0.3.1 series: whichever is
- longer. If you need a release with long-term support, we recommend
+ longer. If you need a release with long-term support, we recommend
that you stay with the 0.2.9 series.
Below are the changes since 0.3.0.5-rc. For a list of all changes
diff --git a/ReleaseNotes b/ReleaseNotes
index a36036c..c5ccfbe 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -9,10 +9,10 @@ Changes in version 0.3.0.6 - 2017-04-26
With the 0.3.0 series, clients and relays now use Ed25519 keys to
authenticate their link connections to relays, rather than the old
RSA1024 keys that they used before. (Circuit crypto has been
- Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced
+ Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced
the guard selection and replacement algorithm to behave more robustly
- in the presence of unreliable networks, and to resist guard-capture
- attacks.
+ in the presence of unreliable networks, and to resist guard-
+ capture attacks.
This series also includes numerous other small features and bugfixes,
along with more groundwork for the upcoming hidden-services revamp.
@@ -20,7 +20,7 @@ Changes in version 0.3.0.6 - 2017-04-26
Per our stable release policy, we plan to support the Tor 0.3.0
release series for at least the next nine months, or for three months
after the first stable release of the 0.3.1 series: whichever is
- longer. If you need a release with long-term support, we recommend
+ longer. If you need a release with long-term support, we recommend
that you stay with the 0.2.9 series.
Below are the changes since 0.2.9.10. For a list of only the changes