[or-cvs] Apply strunk&white, clarify a few points, convert em dashes.
Nick Mathewson
nickm at seul.org
Tue Dec 21 04:48:58 UTC 2004
Update of /home/or/cvsroot/website
In directory moria.mit.edu:/tmp/cvs-serv32614
Modified Files:
contribute.html download.html index.html overview.html
people.html
Log Message:
Apply strunk&white, clarify a few points, convert em dashes.
Index: contribute.html
===================================================================
RCS file: /home/or/cvsroot/website/contribute.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -d -r1.16 -r1.17
--- contribute.html 20 Dec 2004 04:56:16 -0000 1.16
+++ contribute.html 21 Dec 2004 04:48:55 -0000 1.17
@@ -78,7 +78,7 @@
</ul>
</p>
-<p>People who want to donate to Tor:
+<p>Donors:
<ul>
<li>Go take a look at the <a href="http://www.eff.org/">Electronic
Frontier Foundation</a>. More EFF donations means more Tor development.</li>
Index: download.html
===================================================================
RCS file: /home/or/cvsroot/website/download.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -d -r1.39 -r1.40
--- download.html 19 Dec 2004 23:35:01 -0000 1.39
+++ download.html 21 Dec 2004 04:48:55 -0000 1.40
@@ -31,10 +31,10 @@
and more.
<ul>
<!--
-<li>Latest experimental: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a>
+<li>Latest experimental source: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a>
(<a href="dist/tor-0.0.9.tar.gz.asc">sig</a>)</li>
-->
-<li>Latest stable: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a>
+<li>Latest stable source: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a>
(<a href="dist/tor-0.0.9.1.tar.gz.asc">sig</a>)</li>
<li>Win32 installer (experimental):
<a href="dist/win32/tor-0.0.9.1-win32.exe">0.0.9.1</a> (<a
@@ -48,7 +48,7 @@
</p>
<p>See the <a href="developers.html">developers page</a> for instructions
-on fetching Tor CVS.
+on fetching Tor from CVS.
</p>
<p>
Index: index.html
===================================================================
RCS file: /home/or/cvsroot/website/index.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -d -r1.35 -r1.36
--- index.html 21 Dec 2004 04:22:44 -0000 1.35
+++ index.html 21 Dec 2004 04:48:55 -0000 1.36
@@ -66,7 +66,7 @@
<p>
Your traffic is safer when you use Tor because communications
are bounced around a distributed network of servers called <a
-href="howitworks.html">onion routers</a> -- this makes it hard for
+href="howitworks.html">onion routers</a>—this makes it hard for
recipients, observers, and even the onion routers themselves to figure
out who and where you are. Tor's technology aims to provide Internet
users with protection against "traffic analysis," a form of
@@ -108,7 +108,7 @@
<p>
Tor is an important piece of building more safety, privacy, and anonymity
online, but it is not a complete solution.
-And remember that this is development code -- it's not a good idea to rely
+And remember that this is development code—it's not a good idea to rely
on the current Tor network if you really need strong anonymity.
</p>
Index: overview.html
===================================================================
RCS file: /home/or/cvsroot/website/overview.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -d -r1.19 -r1.20
--- overview.html 19 Dec 2004 23:35:01 -0000 1.19
+++ overview.html 21 Dec 2004 04:48:55 -0000 1.20
@@ -29,16 +29,17 @@
<p>
Tor is a network-within-a-network that allows people and groups to
improve their privacy and security on the Internet. It also enables
-future software developers to create new kinds of communication tools
-that have built-in privacy features. Tor can provide the foundation for
-a whole range of applications that allow organizations and individuals
+software developers to create new communication tools
+with built-in privacy features. Tor provides the foundation for
+a range of applications that allow organizations and individuals
to share information over public networks without compromising their
privacy.
</p>
<p>
-Individuals can use Tor to shield themselves and their family members
-from being tracked by remote websites. They can also use it to connect
+Individuals can use Tor to keep remote websites from tracking them and their
+family members.
+They can also use it to connect
to resources such as news sites or instant messaging services that are
blocked by their local Internet service providers (ISPs).
</p>
@@ -57,7 +58,8 @@
<p>
The variety of people who use Tor is actually part of what makes it
-so secure. The more populous and diverse the user base for Tor is,
+so secure. Tor hides you among the other users on the network, so the more
+populous and diverse the user base for Tor is,
the more your anonymity will be protected.
</p>
@@ -74,7 +76,7 @@
by revealing who and where you are. For example, if you're travelling
abroad and you connect to your employer's computers to check or send mail,
you can inadvertently reveal your national origin and professional
-affiliation to any local observing the network, even if the connection
+affiliation to anyone observing the network, even if the connection
is encrypted.
</p>
@@ -101,7 +103,9 @@
But there are also more powerful kinds of traffic analysis. Some
attackers spy on multiple parts of the Internet and use sophisticated
statistical techniques to track the communications patterns of many
-different organizations and individuals.
+different organizations and individuals. Encryption does not help against
+these attackers, since it only hides the content of Internet traffic, not
+the headers.
</p>
<h3>The solution: a distributed, anonymous network</h3>
@@ -111,7 +115,7 @@
analysis by distributing your transactions over several places on the
Internet, so no single point can link you to your destination. The idea
is similar to using a twisty, hard-to-follow route in order to throw off
-somebody who is tailing you -- and then periodically erasing your
+somebody who is tailing you—and then periodically erasing your
footprints. Instead of taking a direct route from source to
destination, data packets on the Tor network take a random pathway
through several servers that cover your tracks so no observer at any
@@ -126,10 +130,10 @@
client incrementally builds a circuit of encrypted connections through
servers on the network. The circuit is extended one hop at a time, and
each server along the way knows only which server gave it data and which
-server it is giving data to. No individual server will ever know the
+server it is giving data to. No individual server ever knows the
complete path that a data packet has taken. The client negotiates a
separate set of encryption keys for each hop along the circuit to ensure
-that each hop can't see what these connections are as they pass through.
+that each hop can't trace these connections as they pass through.
</p>
<img alt="tor circuit step three" src="img/htw3.png" />
@@ -169,7 +173,7 @@
<h3>Staying anonymous</h3>
<p>
-Of course, Tor can't solve all anonymity problems. It focuses only on
+Tor can't solve all anonymity problems. It focuses only on
protecting the transport of data. You need to use protocol-specific
support software if you don't want the sites you visit to see your
identifying information. For example, you can use web proxies such as
Index: people.html
===================================================================
RCS file: /home/or/cvsroot/website/people.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -d -r1.9 -r1.10
--- people.html 19 Dec 2004 23:35:01 -0000 1.9
+++ people.html 21 Dec 2004 04:48:55 -0000 1.10
@@ -27,7 +27,7 @@
<h2>Tor: People</h2>
<p>Tor is managed by <a href="http://freehaven.net/">The Free
-Haven Project</a> as one of the building blocks necessary for
+Haven Project</a> as a building block for
a robust censorship-resistant data haven. It is developed by <a
href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a
href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from
@@ -39,7 +39,7 @@
original <a href="http://www.onion-router.net/">onion routing</a> idea
developed there.</p>
-<p>As of November 2004, Tor development is now supported by the <a
+<p>Since November 2004, Tor development has been supported by the <a
href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p>
</div><!-- #main -->
More information about the tor-commits
mailing list