marketing

Marketing materials (presentations, posters, flyers)
Log | Files | Refs

commit 4c5ee84654dbbb3296f89c4b58cd6a73865d557b
parent cc2c73ae960bf6ea6a82d2fb76850d7917ede3b1
Author: Florian Dold <florian@dold.me>
Date:   Mon, 27 Feb 2023 11:52:49 +0100

-wording

Diffstat:
Mpresentations/comprehensive/sic.tex | 4++--
1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/presentations/comprehensive/sic.tex b/presentations/comprehensive/sic.tex @@ -2227,7 +2227,7 @@ Searching for functions \uncover<2->{with the following signatures} $C$ and that the exchange thus must pay $M$. \vfill \begin{center} - Without this, an evil exchange could renege on the deposit + Without this, a malicious exchange could renege on the deposit confirmation and claim double-spending if a coin were deposited twice, and then not pay either merchant! \end{center} @@ -2353,7 +2353,7 @@ online signing keys, if we find they have been compromised. that the exchange did not honor the (faked) deposit confirmations. \end{itemize} The auditor can then detect the double-spending, but cannot tell who is to blame, -and (likely) would presume an evil exchange, forcing it to pay both merchants. +and (likely) would presume a malicious exchange, forcing it to pay both merchants. \end{frame}