From bf1c9a6680a7f6136690c01c3b43ecc6a36b3aec Mon Sep 17 00:00:00 2001 From: wiire-a Date: Tue, 26 Dec 2017 10:25:58 +0100 Subject: [PATCH] Updated FAQ (markdown) --- FAQ.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/FAQ.md b/FAQ.md index 2ea4695..6e004a7 100644 --- a/FAQ.md +++ b/FAQ.md @@ -30,7 +30,7 @@ The pixie-dust attack exploits the fact that on some devices these "secret numbe - Enrollee, Registrar? -If you want to go in depth of all the possible configurations, methods and nuances of the protocol read the specification. But to put it simple, the Enrollee is the Access Point, the Registrar the client or attacker. +If you want to go in depth of all the possible configurations, methods and nuances of the protocol read the specification. But to put it simple, the Enrollee is the Access Point, the Registrar is the client or attacker. - What methods are supported?