diff --git a/3.3-Overrides-[To-RFP-or-Not].md b/3.3-Overrides-[To-RFP-or-Not].md
index 6e1afec..11fe118 100644
--- a/3.3-Overrides-[To-RFP-or-Not].md
+++ b/3.3-Overrides-[To-RFP-or-Not].md
@@ -84,7 +84,7 @@ Due to it's nature, which is effectively breaking web standards whilst protectin
If you can live with that, and you should have a secondary browser for the occasional site glitch, then use RFP as the best solution possible. Otherwise, if you think the threat fits your wheelhouse, use CanvasBlocker with canvas and audio randomizing (the rest is not really needed and will add perf costs). Note that extensions lack APIs to fully protect metrics, but naive scripts are likely not that sophisticated.
-1 Assuming it is even fingerprinting and widespread, this does not compromise your fingerprint - it is a single metric and only on those sites you exempt.
+1 Assuming it is even fingerprinting and the _exact same canvas test_ is widespread, this does not compromise your fingerprint - it is a single metric and only on those sites you exempt.
---