[or-cvs] website fixes suggested by donna
Roger Dingledine
arma at seul.org
Tue Dec 14 07:20:22 UTC 2004
Update of /home2/or/cvsroot/website
In directory moria.mit.edu:/home2/arma/work/onion/cvs/website
Modified Files:
howitworks.html index.html overview.html
Log Message:
website fixes suggested by donna
Index: howitworks.html
===================================================================
RCS file: /home2/or/cvsroot/website/howitworks.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -d -r1.9 -r1.10
--- howitworks.html 9 Dec 2004 21:33:03 -0000 1.9
+++ howitworks.html 14 Dec 2004 07:20:20 -0000 1.10
@@ -23,7 +23,7 @@
</div><!-- #side -->
<div class="main" id="main">
-<h2>Tor: How It Works</h2>
+<h2>Tor: How it works</h2>
<p>
<a href="overview.html">Basic Tor Overview</a>: what Tor provides, why it
Index: index.html
===================================================================
RCS file: /home2/or/cvsroot/website/index.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -d -r1.28 -r1.29
--- index.html 13 Dec 2004 03:56:29 -0000 1.28
+++ index.html 14 Dec 2004 07:20:20 -0000 1.29
@@ -23,7 +23,7 @@
</div><!-- #side -->
<div class="main" id="main">
-<h2>Tor: an anonymous Internet communication system</h2>
+<h2>Tor: An anonymous Internet communication system</h2>
<p>
Tor is a toolset for a wide range of organizations and people who want
@@ -40,7 +40,7 @@
href="howitworks.html">onion routers</a> -- this makes it hard for
recipients, observers, and even the onion routers themselves to figure
out who and where you are. Tor's technology aims to provide Internet
-users with protection against <em>traffic analysis</em>, a form of
+users with protection against "traffic analysis," a form of
network surveillance that threatens personal anonymity and privacy,
confidential business activities and relationships, and state security.
</p>
@@ -49,7 +49,8 @@
Traffic analysis is used every day by companies, governments, and
individuals who want to keep track of where people and organizations go
and what they do on the Internet. Instead of looking at the content of
-your communications, traffic analysis tracks where they go. For example,
+your communications, traffic analysis tracks where your data goes and
+when, as well as how big it is. For example,
online advertising company Doubleclick uses traffic analysis to record
what webpages you've visited, and can build a profile of your interests
from that. A pharmaceutical company could use traffic analysis to monitor
Index: overview.html
===================================================================
RCS file: /home2/or/cvsroot/website/overview.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -d -r1.14 -r1.15
--- overview.html 13 Dec 2004 19:16:23 -0000 1.14
+++ overview.html 14 Dec 2004 07:20:20 -0000 1.15
@@ -50,7 +50,7 @@
Corporations are investigating Tor as a safe way to conduct competitive
analysis, and are considering using Tor to test new experimental projects
without associating their names with these projects. A branch of the
-US Navy uses Tor for open source intelligence gathering, and one of its
+U.S. Navy uses Tor for open source intelligence gathering, and one of its
teams used Tor while deployed in the Middle East recently.
</p>
@@ -70,16 +70,16 @@
behavior and interests. This can impact your checkbook if, for example,
an e-commerce site uses price discrimination based on your country or
institution of origin. It can even threaten your job and physical safety
-by revealing who and where you are. For example, someone travelling
-abroad who connects to their employer's computers to check or send mail
-or for other reasons will reveal her national origin and professional
-affiliation to any local observing the network even if the connection
+by revealing who and where you are. For example, if you're travelling
+abroad and you connect to your employer's computers to check or send mail,
+you can inadvertently reveal your national origin and professional
+affiliation to any local observing the network, even if the connection
is encrypted.
</p>
<p>
How does traffic analysis work? Internet data packets have two parts:
-a data payload, and a header used for routing. The data payload is
+a data payload and a header used for routing. The data payload is
whatever is being sent, whether that's an email message, a web page, or an
audio file. Even if you encrypt the data payload of your communications,
traffic analysis still reveals a great deal about what you're doing and,
@@ -88,8 +88,8 @@
</p>
<p>
-A basic problem, for the privacy minded, is that the recipient of your
-communications can see who sent them by looking at headers. So can
+A basic problem for the privacy minded is that the recipient of your
+communications can see that you sent it by looking at headers. So can
authorized intermediaries like Internet service providers, and sometimes
unauthorized intermediaries as well. A very simple form of traffic
analysis might involve sitting somewhere between sender and recipient on
@@ -168,16 +168,16 @@
Of course, Tor can't solve all anonymity problems. It focuses only on
protecting the transport of data. You need to use protocol-specific
support software if you don't want the sites you visit to see your
-identifying information. For example, web proxies such as Privoxy can
-be used while web browsing to block cookies and withhold information
+identifying information. For example, you can use web proxies such as
+Privoxy while web browsing to block cookies and withhold information
about your browser type.
</p>
<p>
Also, to protect your anonymity, be smart. Don't provide your name
-or other revealing information in web forms. Be aware that like all
+or other revealing information in web forms. Be aware that, like all
anonymizing networks that are fast enough for web browsing, Tor does not
-provide protection against end-to-end timing attacks: if your attacker
+provide protection against end-to-end timing attacks: If your attacker
can watch the traffic coming out of your computer, and also the traffic
arriving at your chosen destination, he can use statistical analysis to
discover that they are part of the same circuit.
@@ -186,16 +186,16 @@
<h3>The Future of Tor</h3>
<p>
-Providing a usable anonymizing network on the Internet today is
-an ongoing challenge. We want software that meets users' needs.
-And we also want to keep the network up and running in a way that
-handles as many users as possible. Security and usability don't have
-to be at odds: as Tor's usability increases, it will attract more
-users, which will increase the possible sources and destinations
-of each communication, thus increasing security for everyone.
+Providing a usable anonymizing network on the Internet today is an
+ongoing challenge. We want software that meets users' needs. We also
+want to keep the network up and running in a way that handles as many
+users as possible. Security and usability don't have to be at odds:
+As Tor's usability increases, it will attract more users, which will
+increase the possible sources and destinations of each communication,
+thus increasing security for everyone.
We're making progress, but we need your help. Please consider
-<a href="cvs/tor/doc/tor-doc.html#installing">installing</a>
-a <a href="cvs/tor/doc/tor-doc.html#server">server</a>
+<a href="cvs/tor/doc/tor-doc.html#installing">installing</a> a <a
+href="cvs/tor/doc/tor-doc.html#server">server</a>
or <a href="contribute.html">volunteering</a> as a <a
href="developers.html">developer</a>.
</p>
More information about the tor-commits
mailing list