From 61900ff30390ca64b8704329fcedaa13be341630 Mon Sep 17 00:00:00 2001 From: AtHeartEngineer <1675654+AtHeartEngineer@users.noreply.github.com> Date: Fri, 7 Oct 2022 01:32:02 -0500 Subject: [PATCH] Him->Them --- src/protocol_spec.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/protocol_spec.md b/src/protocol_spec.md index 523835f..e19726d 100644 --- a/src/protocol_spec.md +++ b/src/protocol_spec.md @@ -36,7 +36,7 @@ Thus, if the same epoch user sends more than one message, their polynomial and, Of course, we somehow must prove that our `share = (x, y)` is valid (that this is really a point on our `polynomial = A(x)`), as well as we must prove other things are valid too, that's why we use zkSNARK. An explanation of the zk-circuits can be found in the next topic. ## Slashing -As it's been said, if a user sends more than one message, everyone else will be able to recover his secret, slash him and take his stake. +As it's been said, if a user sends more than one message, everyone else will be able to recover his secret, slash them and take their stake. ## Some important notes There are also `nullifier` and `rln_identifier`, which can be found in the **RLN** protocol/circuits.