diff --git a/source/summary.rst b/source/summary.rst index 7bc076e..b74de0f 100644 --- a/source/summary.rst +++ b/source/summary.rst @@ -108,7 +108,7 @@ We observe the following issues with these schemes: - Users often fail to distinguish Lost/Reinstalled Device events from Machine-in-the-Middle (MITM) attacks, see for example `When Signal hits the Fan - `_. + `_. Integrating key verification with general workflows