summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMeshCollider <dobsonsa68@gmail.com>2017-08-24 23:50:20 +1200
committerLuke Dashjr <luke-jr+git@utopios.org>2017-09-16 20:19:35 +0000
commitf1485fdb5f1875bf96d5ecdcfa27b275ac45ef6a (patch)
tree850a5f28269fd20b913bb0e9fdef2c8a61892e91
parentabb94297c333562923ad95c65996fb9e6c437b1d (diff)
downloadbips-f1485fdb5f1875bf96d5ecdcfa27b275ac45ef6a.tar.xz
Fixing spelling in BIP 150
-rw-r--r--bip-0150.mediawiki2
1 files changed, 1 insertions, 1 deletions
diff --git a/bip-0150.mediawiki b/bip-0150.mediawiki
index 1fe4582..277341d 100644
--- a/bip-0150.mediawiki
+++ b/bip-0150.mediawiki
@@ -17,7 +17,7 @@ This BIP describes a way for peers to authenticate to other peers to guarantee n
== Motivation ==
-We assume peer operators want to limit the access of different node services or increase datastream priorities to a selective subset of peers. Also we assume that peers want to connect to specific peers to broadcast or filter transactions (or similar actions that reveal sensitive informations) and therefore operators want to authenticate the remote peer and ensure that they have not connected to a MITM (man-in-the-middle) attacker.
+We assume peer operators want to limit the access of different node services or increase datastream priorities to a selective subset of peers. Also we assume that peers want to connect to specific peers to broadcast or filter transactions (or similar actions that reveal sensitive information) and therefore operators want to authenticate the remote peer and ensure that they have not connected to a MITM (man-in-the-middle) attacker.
Benefits of peer authentication:
* Peers can detect MITM attacks when connecting to known peers