Skip to content
This repository was archived by the owner on Aug 15, 2025. It is now read-only.

Commit 95f6e91

Browse files
committed
fix wrong chapter number for chapter 4.3
1 parent d02f268 commit 95f6e91

File tree

1 file changed

+2
-2
lines changed
  • docs/Protocol Specifications

1 file changed

+2
-2
lines changed

docs/Protocol Specifications/core.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ weight: 0
5151
- [4.1.2 Sensitive actions](#412-sensitive-actions)
5252
- [4.1.1 Sensitive Solutions](#411-sensitive-solutions)
5353
- [4.2 Key trials](#42-key-trials)
54-
- [4.4 Protection against misuse by malicious home servers](#44-protection-against-misuse-by-malicious-home-servers)
54+
- [4.3 Protection against misuse by malicious home servers](#43-protection-against-misuse-by-malicious-home-servers)
5555
- [5. Federation IDs (FIDs)](#5-federation-ids-fids)
5656
- [6. Cryptography and ID-Certs](#6-cryptography-and-id-certs)
5757
- [6.1 Home server signed certificates for public client identity keys (ID-Cert)](#61-home-server-signed-certificates-for-public-client-identity-keys-id-cert)
@@ -1013,7 +1013,7 @@ have different signatures, preventing malicious servers from successfully replay
10131013
Accessing a key-trial protected route is done by supplying the key trial solution(s) in the `X-P2-core-keytrial`
10141014
HTTP header. The value of this header is a JSON-Array, containing the key-trial solution object or objects.
10151015

1016-
### 4.4 Protection against misuse by malicious home servers
1016+
### 4.3 Protection against misuse by malicious home servers
10171017

10181018
To protect users from misuse by malicious home servers, a mechanism is needed to prevent home
10191019
servers from generating federation tokens for users without their consent and knowledge.

0 commit comments

Comments
 (0)