summaryrefslogtreecommitdiffstats
path: root/wiki/src/doc/about/warning.mdwn
diff options
context:
space:
mode:
Diffstat (limited to 'wiki/src/doc/about/warning.mdwn')
-rw-r--r--wiki/src/doc/about/warning.mdwn2
1 files changed, 1 insertions, 1 deletions
diff --git a/wiki/src/doc/about/warning.mdwn b/wiki/src/doc/about/warning.mdwn
index 54b97f6..2c7fdc3 100644
--- a/wiki/src/doc/about/warning.mdwn
+++ b/wiki/src/doc/about/warning.mdwn
@@ -113,7 +113,7 @@ Compromise](http://blogs.comodo.com/it-security/data-security/the-recent-ra-comp
Later in 2011, DigiNotar, a Dutch SSL certificate company, incorrectly issued
certificates to a malicious party or parties. Later on, it came to light that
they were apparently compromised months before or perhaps even in May of 2009 if
-not earlier. Rogues certificates were issued for domains such as google.com,
+not earlier. Rogue certificates were issued for domains such as google.com,
mozilla.org, torproject.org, login.yahoo.com and many more. See, [The Tor
Project: The DigiNotar Debacle, and what you should do about
it](https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it).