Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

penumbra(docs): fix typos #4957

Merged
merged 1 commit into from
Dec 12, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/padr/PADR-001_Dutch_Auctions.md
Original file line number Diff line number Diff line change
Expand Up @@ -197,7 +197,7 @@ message ActionDutchAuctionScheduleView {
#### `ActionDutchAuctionEnd`

```proto
// Ends a Dutch auction using protocol-controlled liquiidty.
// Ends a Dutch auction using protocol-controlled liquidity.
message ActionDutchAuctionEnd {
// The auction to end.
AuctionId auction_id = 1;
Expand Down
2 changes: 1 addition & 1 deletion docs/protocol/src/crypto/flow/ideal.md
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ value integrity proceeds in a number of steps:
1. Application-specific logic proves that each user's contribution value $v_i$ conserves value according to the application rules, by proving statements about the commitment $C_{i}$ to $v_{i}$.
2. The encryption proof $\pi_{\operatorname{Enc}}$ extends integrity from $C_{i}$ to $E_{i}$.
3. Integrity extends to the aggregation $E = \sum_i E_i$ automatically, since the aggregation can be publicly recomputed by anyone with access to the ledger.
4. The decryption share integrity proofs extend integrity from $E$ to $w$. This requires that, if $w$ is the result of decryption using valid decryption shares, than $E = \operatorname{Enc}(w)$.
4. The decryption share integrity proofs extend integrity from $E$ to $w$. This requires that, if $w$ is the result of decryption using valid decryption shares, then $E = \operatorname{Enc}(w)$.
5. Publication of (any) decryption transcript allows any participant to check the end-to-end property that $w = \sum_i v_i$ for (application-)valid $v_i$.

###### Decryption Robustness
Expand Down
2 changes: 1 addition & 1 deletion docs/protocol/src/crypto/fmd/system_mapping.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# S-FMD in Penumbra

In the secions that follow we describe how S-FMD clue keys, detection keys, and
In the sections that follow we describe how S-FMD clue keys, detection keys, and
clues are integrated into the Penumbra system.

## Clue Keys
Expand Down
2 changes: 1 addition & 1 deletion docs/protocol/src/stake/action/undelegate_claim.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ The body of a `UndelegateClaim` has four parts:

#### Local Invariants

1. You cannot claim undelegations that have not finishing unbonding.
1. You cannot claim undelegations that have not finished unbonding.

2. Slashing penalties must be applied when unbonding.

Expand Down
Loading