[or-cvs] r13979: Misc typo cleanups for Torbutton+Torflow projects. (website/trunk/en)

mikeperry at seul.org mikeperry at seul.org
Tue Mar 11 19:12:18 UTC 2008


Author: mikeperry
Date: 2008-03-11 15:12:18 -0400 (Tue, 11 Mar 2008)
New Revision: 13979

Modified:
   website/trunk/en/volunteer.wml
Log:

Misc typo cleanups for Torbutton+Torflow projects.



Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml	2008-03-11 19:06:32 UTC (rev 13978)
+++ website/trunk/en/volunteer.wml	2008-03-11 19:12:18 UTC (rev 13979)
@@ -557,7 +557,7 @@
 </li>
 
 <li>
-<b>Tor Exit Scanner Improvements</b>
+<b>Tor Exit Scanner improvements</b>
 <br />
 Priority: <i>High</i>
 <br />
@@ -581,17 +581,17 @@
 robust html parser library (since the rest of Torflow is in Python,
 that would be nice, but not required), and calculate signatures only for
 tags and content likely to be targeted by a malicious attacker (script
-tags, object links, images). It should also be robust in the face of
+tags, object links, images, css). It should also be robust in the face of
 changes to content outside of Tor, and ultimately even GeoIP localized
 content.
 <br />
-This scanner would likely be run by the directory authorities and
+This scanner would likely be run by the Directory Authorities and
 report its results to the control port via the AuthDirBadExit config
 setting.
 <br />
 </li>
 <li>
-<b>Tor Node Scanner Improvements</b>
+<b>Tor Node Scanner improvements</b>
 <br />
 Priority: <i>Medium</i>
 <br />
@@ -620,7 +620,7 @@
 report if a circuit extend through the node succeeds or fails, and
 passive statistics can be gathered on both bandwidth and reliability
 of other nodes via a node-based monitor using these events. Such a
-scanner which would also report information on oddly-behaving nodes to
+scanner would also report information on oddly-behaving nodes to
 the Directory Authorities, but a communication channel for this
 currently does not exist and would need to be developed as well.
 </li>
@@ -651,9 +651,9 @@
 href="http://www.torproject.org/svn/trunk/doc/spec/proposals/115-two-hop-paths.txt">Two
 Hop Paths proposal</a> could be done as part of this (since it will
 likely touch the same code anyways), regardless of the adoption of
-that proposal. In particular, clients probably should avoid guards thatseem to
+that proposal. In particular, clients probably should avoid guards that seem to
 fail an excessive percentage of their circuits through them, and non-bridged
-clients should issue a warn if they are only able toconnect to a limited set
+clients should issue a warn if they are only able to connect to a limited set
 of guard nodes.
 </li>
 <li>
@@ -673,10 +673,11 @@
 href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">Torbutton
 flyspray section</a>. Good examples include: stripping off node.exit on http
 headers, more fine-grained control over formfill blocking, improved referrer
-spoofing based on the domain of the site (a-la refspoof extension), tighter
-integration with Vidalia for reporting Tor status, a New Identity button with
-Tor integration and multiple identity management, and anything else you might
-think of. 
+spoofing based on the domain of the site (a-la <a
+href="http://addons.mozilla.org/firefox/addon/4513">refspoof extension</a>),
+tighter integration with Vidalia for reporting Tor status, a New Identity
+button with Tor integration and multiple identity management, and anything
+else you might think of. 
 
 <br />
 



More information about the tor-commits mailing list