[or-cvs] r12011: minor grammar and name tweaks for trademark faq (website/trunk/en)
arma at seul.org
arma at seul.org
Thu Oct 18 08:15:46 UTC 2007
Author: arma
Date: 2007-10-18 04:15:46 -0400 (Thu, 18 Oct 2007)
New Revision: 12011
Modified:
website/trunk/en/trademark-faq.wml
Log:
minor grammar and name tweaks for trademark faq
Modified: website/trunk/en/trademark-faq.wml
===================================================================
--- website/trunk/en/trademark-faq.wml 2007-10-18 08:03:27 UTC (rev 12010)
+++ website/trunk/en/trademark-faq.wml 2007-10-18 08:15:46 UTC (rev 12011)
@@ -13,14 +13,14 @@
<p>The Tor Project encourages developers to use the name Tor in ways that
do not confuse the public about the source of anonymity software and
services. If you are building open-source non-commercial software or
-services that incorporate or work with the Tor Project's code, you may
+services that incorporate or work with The Tor Project's code, you may
use the name “Tor” in an accurate description of your work. We ask you
-to include a link to the official Tor website,
+to include a link to the official Tor website
<a href="https://www.torproject.org/">https://www.torproject.org</a> so users can verify the original source of
Tor for themselves, and a note indicating that your project is not
-sponsored by the Tor Project. For example, “This product is produced
+sponsored by The Tor Project. For example, “This product is produced
independently from the Tor™ anonymity software and carries no guarantee
-from the Tor Project about quality, suitability or anything else.”</p>
+from The Tor Project about quality, suitability or anything else.”</p>
<a id="onionlogo"></a>
<h2>Can I use the Tor onion logo?</h2>
@@ -38,7 +38,7 @@
trademark bullies, but we will use trademark to protect the public's
ability to recognize Tor Project software. Trademark helps us to assure
that the name is used only in connection with genuine Tor anonymity
-software and for accurate description of software and services.
+software and for accurate description of software and services.
After all, to protect their anonymity securely, computer users must be
able to identify the software they are using, so they can account
properly for its strengths and weaknesses. Tor has become well-known as
@@ -53,3 +53,4 @@
</div><!-- #main -->
#include <foot.wmi>
+
More information about the tor-commits
mailing list