X-Git-Url: http://www.git.cypherpunks.ru/?p=nncp.git;a=blobdiff_plain;f=doc%2Fusecases%2Fairgap.texi;h=2251d4f4a675f062383edc58fd2142878e38b07c;hp=2c75d19ee6a9386a86d430321641db2770143aa6;hb=203dfe36da7adf2b3089e4fa4017a67409cbad70;hpb=8994f66557a7f53c0d808416d16ca33202ac3968 diff --git a/doc/usecases/airgap.texi b/doc/usecases/airgap.texi index 2c75d19..2251d4f 100644 --- a/doc/usecases/airgap.texi +++ b/doc/usecases/airgap.texi @@ -1,4 +1,5 @@ @node UsecaseAirgap +@cindex air-gap @section Highly secure isolated air-gap computers If you worry much about security, then air-gapped computer could be the @@ -42,4 +43,4 @@ endpoint, and other carrying it for intermediate relaying node. Pay attention that relaying node knows nothing about the packet inside, but just its size and priority. Transition packets are encrypted too: using well-known @url{https://en.wikipedia.org/wiki/Onion_routing, onion -routing} technology. @emph{bob} can not read @emph{bob-airgap}'s packets. +encryption} technology. @emph{bob} can not read @emph{bob-airgap}'s packets.