presents would-be vandals and abusers with an opportunity to hide
the origins of their activities. Attackers can harm the Tor network by
implicating exit servers for their abuse. Also, applications that commonly
-use IP-based authentication (such as institutional mail or web servers)
+use IP-based authentication (such as institutional mail or webservers)
can be fooled by the fact that anonymous connections appear to originate
at the exit OR.
the German government successfully ordered them to add a backdoor to
all of their nodes \cite{jap-backdoor}.
-\emph{Run a recipient.} By running a Web server, an adversary
+\emph{Run a recipient.} By running a webserver, an adversary
trivially learns the timing patterns of users connecting to it, and
can introduce arbitrary patterns in its responses. This can greatly
facilitate end-to-end attacks: If the adversary can induce