From f22559112ac402a982659aab0f5ee5ed3a6aea71 Mon Sep 17 00:00:00 2001 From: Theresa Date: Tue, 7 Apr 2020 09:51:34 +0200 Subject: [PATCH] EBID -> EphID --- FAQ.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/FAQ.md b/FAQ.md index 63e744d..b76fd75 100644 --- a/FAQ.md +++ b/FAQ.md @@ -40,10 +40,10 @@ using efficient representations (e.g., a cuckoo filter) this would take at least Sending observed contacts also increases the likelihood that a tech-savvy user creates fake contact events, which in turn can lead to unnecessary anxiety. To -fake at-risk contacts, an infected user simply inserts additional EBIDs from +fake at-risk contacts, an infected user simply inserts additional EphIDs from other users to his local storage. In DP3T, in which an infected user shares -their own EBIDs, the barrier to fake contact events is much higher. The infected -user would have to actively broadcast their own EBIDs via another device to fake +their own EphIDs, the barrier to fake contact events is much higher. The infected +user would have to actively broadcast their own EphIDs via another device to fake contacts with other users.