summaryrefslogtreecommitdiff
path: root/doc/sources.list.5.xml
diff options
context:
space:
mode:
authorChris Leick <c.leick@vollbio.de>2018-10-30 22:32:34 +0100
committerDavid Kalnischkies <david@kalnischkies.de>2018-10-30 22:43:35 +0100
commitb6b159cc5eedca24d2ca0e27e230865ad2b4ad0f (patch)
tree5fc74d4464ead28047349f4cd385148179ab01f8 /doc/sources.list.5.xml
parent16f7be06850aa6ff196cf9d70e493ccbfae99a1b (diff)
Fix typos encountered while updating de translation
Diffstat (limited to 'doc/sources.list.5.xml')
-rw-r--r--doc/sources.list.5.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/sources.list.5.xml b/doc/sources.list.5.xml
index eaea13ae5..302154999 100644
--- a/doc/sources.list.5.xml
+++ b/doc/sources.list.5.xml
@@ -409,7 +409,7 @@ deb-src [ option1=value1 option2=value2 ] uri suite [component1] [component2] [.
difference is that the communication between apt and server (or proxy) is
encrypted. Note that the encryption does not prevent an attacker from
knowing which server (or proxy) apt is communicating with and deeper
- analyses can potentially still reveal which data was downloaded. If this is
+ analysis can potentially still reveal which data was downloaded. If this is
a concern the Tor-based schemes mentioned further below might be a suitable
alternative.</para></listitem>
</varlistentry>