diff --git a/content/docs/attacks/css-tricks.md b/content/docs/attacks/css-tricks.md index 8a2c8a51a..dbf63c5b6 100644 --- a/content/docs/attacks/css-tricks.md +++ b/content/docs/attacks/css-tricks.md @@ -33,7 +33,7 @@ Multiple bugs were reported about this issue: [^bug-1](https://bugs.chromium.org Using CSS, it’s possible to take an embed out of context. An example of this is pretending it’s a captcha as seen in [^leak-2] This works by setting the width and hight of an embed so that only the target characters are shown, -this may use multiple embeds to change the order of the characters being displayed so that its harder for a user to know what infomation they're providing. +this may use multiple embeds to change the order of the characters being displayed so that its harder for a user to know what information they're providing. ## Abusing autocomplete If a website uses text inputs and does not opt-out of [autocomplete](https://developer.mozilla.org/en-US/docs/Web/HTML/Attributes/autocomplete) using ```autocomplete="off"``` it may be possible to leak data such as email addresses by tricking the user into pressing the keys to navigate the autocomplete UI for a javascript focused text input.