--- a/spec/Overview-WebCryptoAPI.xml Sun Nov 30 22:52:52 2014 +0100
+++ b/spec/Overview-WebCryptoAPI.xml Sun Nov 30 23:03:57 2014 +0100
@@ -82,7 +82,7 @@
Implementors should be aware that this specification is not stable.
<strong>Implementors who are not taking part in the discussions are likely to find the
specification changing out from under them in incompatible ways.</strong> Vendors interested
- in implementing this specification before it eventually reaches the Candidate Recommendation
+ in implementing this specification before it eventually reaches the Proposed Recommendation
stage should join the mailing lists that follow and take part in the discussions.
</p>
<p>
@@ -3312,7 +3312,7 @@
<p class="note">
Application developers and script authors should not interpret this table as a
recommendation for the use of particular algorithms. Instead, it simply documents what
- methods areA supported. Authors should refer to the <a
+ methods are supported. Authors should refer to the <a
href="#security-developers">Security considerations for authors</a> section of this
document to better understand the risks and concerns that may arise when using certain
algorithms.