diff --git a/how-does-ockam-work.md b/how-does-ockam-work.md
index aca4b1c4..3ea87fd8 100644
--- a/how-does-ockam-work.md
+++ b/how-does-ockam-work.md
@@ -124,4 +124,4 @@ All [access controls](reference/protocols/acces
NAT’s are traversed using a relay and outgoing tcp connections. Bank Corp. or Analysis Corp. don’t expose any listening endpoints on the Internet. Their networks are completely closed and protected from any attacks from the Internet. Ockam’s [routing](reference/protocols/routing.md) protocol enables multiple ways of traversing NAT’s with various tradeoffs, the relay approach is highly secure and always works.
-The above example gave us peek at how Ockam’s stack of [protocols](reference/protocols/) work together to ensure security, privacy, and trust in data. In this case we deployed Ockam as a companion next to a server and its clients. This approach can support a very large variety of use cases. Our programming libraries take this further and empower your to build trust in ways that are tailored to your business.
+The above example gave us peek at how Ockam’s stack of [protocols](reference/protocols/) work together to ensure security, privacy, and trust in data. In this case we deployed Ockam as a companion next to a server and its clients. This approach can support a very large variety of use cases. Our programming libraries take this further and empower you to build trust in ways that are tailored to your business.