-Before changing to the user ID given in the --user option, chroot to that user's home
-directory, i.e. make the kernel pretend to the Privoxy process that the directory tree
-starts there. If set up carefully, this can limit the impact of possible vulnerabilities
-in Privoxy to the files contained in that hierarchy.
+Before changing to the user ID given in the --user option, chroot to
+that user's home directory, i.e. make the kernel pretend to the
+\fBPrivoxy\fR process that the directory tree starts
+there. If set up carefully, this can limit the impact of possible
+vulnerabilities in \fBPrivoxy\fR to the files contained in
+that hierarchy.