diff --git a/theories/tree_borrows/README.md b/theories/tree_borrows/README.md
index 3b57584d544fe80fa4610f674a424252d1dac59e..c984d8a191dc73737ad61a3ef212e710b3655e2d 100644
--- a/theories/tree_borrows/README.md
+++ b/theories/tree_borrows/README.md
@@ -23,7 +23,7 @@ Of course, that end-to-end proof uses Simuliris' definition of refinement, but t
 
 ### Development
 
-* `defs.v` contains some more logical definitions, notably that of well-formed states (`state_wf`).
+* `defs.v` contains basic logical definitions, notably that of well-formed states (`state_wf`).
 * `tactics.v` and `class_instances.v` are some more Simuliris-related infrastructure.
 * `tree_lemmas.v`, `bor_lemmas.v`, `steps_foreach.v`, `steps_inv.v`, and `steps_preserve.v` contain basic lemmas to help with the manipulation of trees.
 * `steps_wf.v` proves that all OpSem steps preserve state well-foundedness.
@@ -31,8 +31,7 @@ Of course, that end-to-end proof uses Simuliris' definition of refinement, but t
 * `steps_progress.v` states success conditions for the various borrow steps so that we can prove absence of UB or exploit presence of UB.
 * `tkmap_view.v` defines views (partial ownership) of the global maps we use to remember the kind of each tag.
 * `trees_equal/` contains a number of files related to a `trees_equal` binary relation between trees.
-  In Stacked Borrows the source stack and the target stack are always identical.
-  In Tree Borrows that is no longer the case, and this relation describes the extent to which they are allowed to differ.
+  Our simulation relation has to allow small differences between the trees in the source and target program; this relation describes the extent to which they are allowed to differ.
 * `logical_state.v` defines the invariants and instantiates the simulation relation,
   using among others a notion of when trees are similar in `trees_equal/`.
 * `tag_protected_laws.v` contains reasoning principles about protectors.
@@ -48,10 +47,8 @@ Of course, that end-to-end proof uses Simuliris' definition of refinement, but t
   - `impossible/` optimizations used to hold under Stacked Borrows,
     but we know of counter-examples under Tree Borrows.
 
-In addition, `read_read_reorder/` provides proofs of simple reorderings
-(swapping adjacent operations in a sequential setting)
-directly against the operational semantics.
-You can find more details in the associated `README.md`.
+In addition, `read_read_reorder/` provides proofs of simple reorderings (swapping adjacent operations in a sequential setting) directly against the operational semantics.
+You can find more details in the associated [`README.md`](read_read_reorder/README.md).
 
 ## Correspondence with Sections 2 and 3
 
@@ -92,7 +89,7 @@ It is coupled to the main operational semantics by a series of "events".
 For example, a read (called "copy" here) causes a `CopyEvt`, which is picked up by the `CopyIS` rule.
 This will ensure the tag exists, and then cause a read event.
 
-Also of interests to reviewers is like 1000-1038. This defines a "unit test" for the `rel_dec` and `create_child` functions.
+Also of interests to reviewers are lines 1000-1038. This defines a "unit test" for the `rel_dec` and `create_child` functions.
 Since `rel_dec` is not commutative, it can be difficult to remember which node is which and whether an output of e.g. "Child" means that the first node is a child of the second or the other way around.
 The "unit test" makes it clear that an output of "Child" indeed means that the first node is a child of the second.
 
@@ -104,7 +101,7 @@ Section 5 has three examples, one for deleting reads, one for deleting writes, a
 
 This example corresponds to the one in  `examples/unprotected/shared_delete_read_escaped.v`.
 The Coq example is very close to the one in the paper.
-The only difference is that `f` has an extra argument in Coq, which corresponds to the implicit environment that closures have in Rust.
+To model the environment of the closure in the Rust code, we use an explicit argument passed to `f`.
 
 In the justification in the paper (around line 818), we say that a protected Reserved cousing of a tag can be conflicted in one side,
 but not in the other. In Coq, this is achieved using the `pseudo_conflicted` case of `perm_eq_up_to_C` in line 88 of `trees_equal_base.v`.
@@ -113,7 +110,7 @@ but not in the other. In Coq, this is achieved using the `pseudo_conflicted` cas
 
 This example corresponds to the one in `examples/protected/mutable_reorder_write_up_activated_paper.v`.
 This Coq example corresponds very closely to the one in the paper.
-The only difference is that `f` and `g` have an extra argument in Coq, which corresponds to the implicit environment that closures have in Rust.
+Again, closure environments are modeled with extra arguments.
 
 This is also where we need (and the paper finally explains) protector end semantics.
 Protector end semantics ensure that two states remain `trees_equal` even when a protector is removed.
@@ -124,8 +121,9 @@ which shows that after the protector end access, `trees_equal` is preserved even
 
 This is proven in `read_read_reorder`, particularly in `read_reorder.v`.
 These proofs do not use the `simuliris` library, but instead they do a much simpler equivalence proof directly against the operational semantics.
-This is because these proofs only hold for a non-concurrent language.
-We suspect that they also hold in a concurrent setting, but this would require data race reasoning, and thus we have not proven that.
+This is possible because there is no unknown code involved in this transformation (the reordered instructions are immediately adjacent).
+We also cannot use `simuliris` since the transformation does not hold in our concurrent semantics.
+We suspect that they also hold in a realistic concurrent setting where data races are Undefined Behavior, but this would be very challenging to prove so we consider it out-of-scope.
 
 Specifically, the simple notion of "equivalence after a few steps" is in `equivalence_def.v`.
 The proof that the two reads can be reordered is in `read_reorder.v`.
@@ -154,7 +152,7 @@ Here, we explain the resources that you will encounter when stepping through the
 The `$$` resource associates a "tag" with a "tag kind." Remember that each tag corresponds to a specific node in the borrow tree.
 The tag kind is a very coarse over-approximation of the shape of the tree from that specific node.
 
-The simplemost kind is `tk_local`, which says that the tree here is a singleton, and this tag is the only tag in the tree.
+The simplest kind is `tk_local`, which says that the tree here is a singleton, and this tag is the only tag in the tree.
 `tk_local` tags are used for new fresh allocations that do not have their address taken, and allows treating them as local variables.
 
 To talk about the value of such a local tag, the "heaplet points-to" `l ↦t∗[tk_local]{t} vs` is used.
@@ -184,7 +182,7 @@ This allows passing a shared reference to another function and later still knowi
 
 At this point, we should mention that all heaplets represent "conditional" knowledge: They basically say that the given value is stored in memory, or that alternatively the corresponding tag has since become `Disabled`.
 This allows proving rules like lockstep reads (`sim_copy` in `step_laws/steps_unique.v`), based on the argument that either the source has UB when the tag is `Disabled`, or we know that the heaplet is still alive and hence the read is possible.
-This means that lockstep rules are typically easy to prove with our setup, but proving anything about single-sided reads is much more difficult, which is why we can only prove read removal optimizations without protectors.
+This means that lockstep rules are typically easy to prove with our setup, but proving anything about single-sided reads is much more difficult, which is why without protectors,  we can only prove read removal optimizations.
 
 ### Protectors
 
diff --git a/theories/tree_borrows/read_read_reorder/README.md b/theories/tree_borrows/read_read_reorder/README.md
index 39f1b8bea5fe519815c2e760c3e3a1e4bc261511..ccb79a99ed375c65236cb2f4442144d482769dd6 100644
--- a/theories/tree_borrows/read_read_reorder/README.md
+++ b/theories/tree_borrows/read_read_reorder/README.md
@@ -12,13 +12,13 @@ they require one of
 - ability to reason about data races.
 The latter has been demonstrated to be *possible* in simuliris (see `theories/simulang`),
 but combining this with Tree Borrows is outside of our current scope.
-Instead we opt for the former: this subdirectory has only sequential semantics,
+Instead we opt for the former: this subdirectory only considers the sequential semantics,
 no concurrency.
 
 The main theorem for this proof is `read_reorder` in `read_reorder.v`,
 which states that the two example programs given that differ in the ordering
 of two reads are equivalent according to the notion defined in `equivalence_def.v`.
-In addition the intermediate lemmas in `low_level.v` should give confidence
+In addition, the intermediate lemmas in `low_level.v` should give confidence
 that this reordering is indeed a more general property of the model and not
 merely applicable to only this simple example.