summaryrefslogtreecommitdiff
path: root/doc/sources.list.5.xml
diff options
context:
space:
mode:
Diffstat (limited to 'doc/sources.list.5.xml')
-rw-r--r--doc/sources.list.5.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/sources.list.5.xml b/doc/sources.list.5.xml
index eaea13ae5..302154999 100644
--- a/doc/sources.list.5.xml
+++ b/doc/sources.list.5.xml
@@ -409,7 +409,7 @@ deb-src [ option1=value1 option2=value2 ] uri suite [component1] [component2] [.
difference is that the communication between apt and server (or proxy) is
encrypted. Note that the encryption does not prevent an attacker from
knowing which server (or proxy) apt is communicating with and deeper
- analyses can potentially still reveal which data was downloaded. If this is
+ analysis can potentially still reveal which data was downloaded. If this is
a concern the Tor-based schemes mentioned further below might be a suitable
alternative.</para></listitem>
</varlistentry>