[or-cvs] r12156: Website tweaks from sjmurdoch; make spaces on the sides of m (website/trunk/en)
nickm at seul.org
nickm at seul.org
Wed Oct 24 17:16:06 UTC 2007
Author: nickm
Date: 2007-10-24 13:16:06 -0400 (Wed, 24 Oct 2007)
New Revision: 12156
Modified:
website/trunk/en/download.wml
website/trunk/en/index.wml
website/trunk/en/overview.wml
website/trunk/en/whousestor.wml
Log:
Website tweaks from sjmurdoch; make spaces on the sides of mdash consistent.
Modified: website/trunk/en/download.wml
===================================================================
--- website/trunk/en/download.wml 2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/download.wml 2007-10-24 17:16:06 UTC (rev 12156)
@@ -83,7 +83,9 @@
<li>Browser plugins such as Java, Flash, ActiveX, RealPlayer,
Quicktime, Adobe's PDF plugin, and others can be manipulated
-into revealing your IP address. You should probably uninstall your plugins
+into revealing your IP address. You should probably
+<a href="http://plugindoc.mozdev.org/faqs/uninstall.html">uninstall your
+plugins</a>
(go to "about:plugins" to see what is installed), or investigate <a
href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a
href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and
@@ -107,7 +109,7 @@
can't encrypt your traffic between the Tor network and its final
destination.</a>
If you are communicating sensitive information, you should use as much
-care as you would on the normal scary Internet — use SSL or other
+care as you would on the normal scary Internet — use HTTPS or other
end-to-end encryption and authentication.
</li>
Modified: website/trunk/en/index.wml
===================================================================
--- website/trunk/en/index.wml 2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/index.wml 2007-10-24 17:16:06 UTC (rev 12156)
@@ -49,7 +49,7 @@
<p>
(There are three pieces of fine print you need to know about.
First, Tor does not protect you if you do not use it correctly.
-Read <a href="<page download>#Warnings">our list of warnings</a> and
+Read <a href="<page download>#Warning">our list of warnings</a> and
make sure to follow the
<a href="<page documentation>#RunningTor">instructions for your platform</a>
carefully. Second, even if you configure and use Tor correctly,
Modified: website/trunk/en/overview.wml
===================================================================
--- website/trunk/en/overview.wml 2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/overview.wml 2007-10-24 17:16:06 UTC (rev 12156)
@@ -119,7 +119,7 @@
analysis by distributing your transactions over several places on the
Internet, so no single point can link you to your destination. The idea
is similar to using a twisty, hard-to-follow route in order to throw off
-somebody who is tailing you—and then periodically erasing your
+somebody who is tailing you — and then periodically erasing your
footprints. Instead of taking a direct route from source to
destination, data packets on the Tor network take a random pathway
through several relays that cover your tracks so no observer at any
Modified: website/trunk/en/whousestor.wml
===================================================================
--- website/trunk/en/whousestor.wml 2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/whousestor.wml 2007-10-24 17:16:06 UTC (rev 12156)
@@ -20,8 +20,8 @@
stories about how people or organizations are staying anonymous could be
counterproductive.
As an example, we talked
-to an FBI officer who explained that he uses Tor every day for his work
-—but he quickly followed up
+to an FBI officer who explained that he uses Tor every day for his
+work — but he quickly followed up
with a request not to provide details or mention his name.
</p>
@@ -92,8 +92,8 @@
<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
<p>The US <a href="http://www.ibb.gov/">International Broadcasting
-Bureau</a> supports Tor development Internet users in countries
-that can't get
+Bureau</a> supports Tor development Internet to help users in countries
+where they can't get
safe access to free media. Tor not only protects freedom of expression,
but preserves the ability of persons behind national firewalls or under
the surveillance of repressive regimes to view information that gives
@@ -170,7 +170,7 @@
Africa reports that his nonprofit must budget 10% to cover various
sorts of corruption, mostly bribes and such. When that percentage
rises steeply, not only can they not afford the money, but they can
-not afford to complain -- this is the point at which open objection can
+not afford to complain — this is the point at which open objection can
become dangerous. So his nonprofit has been working to use
Tor to safely whistleblow on governmental corruption in order to continue
their work more effectively and safely.</p>
@@ -256,8 +256,6 @@
<li>Hidden services</li>
-</ul>
-
<p>When the Internet was designed by DARPA, its primary purpose was to
be able to facilitate distributed, robust communications in case of
local strikes. However, some functions must be centralized, such as
@@ -266,6 +264,8 @@
however Tor's hidden services capacity allows military command and
control to be physically secure from discovery and takedown.</p>
+</ul>
+
<h2>Law enforcement officers use Tor</h2>
<p>Undercover officers use Tor to conceal their IP address during
More information about the tor-commits
mailing list