diff --git a/docs/user/site.rst b/docs/user/site.rst
index 6adba8c09a5d509be38e550e57fda86e7a02becc..23098d2fab02d4ad45c26f025c0078e887f00a95 100644
--- a/docs/user/site.rst
+++ b/docs/user/site.rst
@@ -297,7 +297,7 @@ mesh_vpn
   data; this prevents malicious ISPs from correlating VPN sessions with specific mesh
   nodes via public respondd data. If this is of no concern in your threat model,
   this behaviour can be disabled (and thus announcing the public key be enabled) by
-  setting `pubkey_privacy` to `false`. At the moment, this option only affects fastd.
+  setting `pubkey_privacy` to `false`.
 
   The `fastd` section configures settings specific to the *fastd* VPN
   implementation.