diff --git a/bip-0053.mediawiki b/bip-0053.mediawiki
index b2dd9c81..ccc3f2fd 100644
--- a/bip-0053.mediawiki
+++ b/bip-0053.mediawiki
@@ -38,11 +38,11 @@ This has been mitigated by Bitcoin Core's relay policy and the RPC interface sin
64-byte transactions introduce block malleability. Malicious peers can construct consensus valid and invalid 64-byte
transactions that have the same serialization as the concatenation of 2 hashes in the Merkle tree.
-Assume we have a valid Bitcoin block with 2 transactions in it that have transaction ids of T0 and T1.
-The Merkle root for this block is H(T0||T1).
-A malicious user could find a 64-byte transaction Tm that serializes to T0||T1.
+Assume we have a valid Bitcoin block with 2 transactions in it with Txid0 and Txid1.
+The Merkle root for this block is H(Txid0||Txid1).
+A malicious user could find a 64-byte transaction Tm that serializes to Txid0||Txid1.
Next that user relays the block containing the malicious Tm rather than the
-valid Bitcoin transactions that correspond with T0 and T1.
+valid Bitcoin transactions that correspond to Txid0 and Txid1.
==== Block malleability with consensus INVALID transactions ====