From 80ac321448004f0a46697f74f9e2a71d495150f9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= Date: Wed, 1 Jul 2020 17:49:13 +0200 Subject: [PATCH] website: securing-updates: Fix typo. * website/posts/securing-updates.md: Fix typo. --- website/posts/securing-updates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/posts/securing-updates.md b/website/posts/securing-updates.md index 5aac984..5a76e47 100644 --- a/website/posts/securing-updates.md +++ b/website/posts/securing-updates.md @@ -53,7 +53,7 @@ an attacker can push code to the Guix repository, which everyone would pull. The change might even go unnoticed and remain in the repository forever. An attacker with access to Savannah can also reset the main branch to an earlier revision, leading users to install outdated -software with known vulunerabilities—a _downgrade attack_. These are +software with known vulnerabilities—a _downgrade attack_. These are the kind of attacks we want to protect against. # Authenticating Git checkouts