aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2015-09-26 11:54:03 +0200
committerChristian Grothoff <christian@grothoff.org>2015-09-26 11:54:03 +0200
commit9ff0c56018366bc49c04521f8d3bcea1c256c014 (patch)
treec53dfd22388d7072f9f400c3f5f2ef56a6f2bb53
parentecd663621997d98d22ae9bc340d717fc13bdcbfe (diff)
typo
-rw-r--r--doc/paper/taler.tex2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/paper/taler.tex b/doc/paper/taler.tex
index 5ef1df3c9..a84962dd2 100644
--- a/doc/paper/taler.tex
+++ b/doc/paper/taler.tex
@@ -510,7 +510,7 @@ existence using the respective coin signing key. In this case, the
mint can allow the original set of customers to exchange the coins
that were signed with the compromised private key, while refusing
further transactions from merchants if they involve those coins. As a
-result, the financial damage of loosing a private signing key can be
+result, the financial damage of losing a private signing key can be
limited to at most twice the amount originally signed with that key.
To ensure that the mint does not enable deanonymization of users by
signing each coin with a fresh coin signing key, the mint must