VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/html/Security Requirements for Hidden Volumes.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/html/Security Requirements for Hidden Volumes.html')
-rw-r--r--doc/html/Security Requirements for Hidden Volumes.html2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/html/Security Requirements for Hidden Volumes.html b/doc/html/Security Requirements for Hidden Volumes.html
index 3b5dbdb3..7ac28c40 100644
--- a/doc/html/Security Requirements for Hidden Volumes.html
+++ b/doc/html/Security Requirements for Hidden Volumes.html
@@ -46,3 +46,3 @@ hidden VeraCrypt volume</a>, you must follow the security requirements and preca
<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
-If an adversary has access to a (dismounted) VeraCrypt volume at several points over time, he may be able to determine which sectors of the volume are changing. If you change the contents of a
+If an adversary has access to a (unmounted) VeraCrypt volume at several points over time, he may be able to determine which sectors of the volume are changing. If you change the contents of a
<a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none.html">