[or-cvs] r18747: {website} Add some list items and clean up some text. (website/trunk/en)
phobos at seul.org
phobos at seul.org
Tue Mar 3 04:26:52 UTC 2009
Author: phobos
Date: 2009-03-02 23:26:52 -0500 (Mon, 02 Mar 2009)
New Revision: 18747
Modified:
website/trunk/en/30seconds.wml
Log:
Add some list items and clean up some text.
Modified: website/trunk/en/30seconds.wml
===================================================================
--- website/trunk/en/30seconds.wml 2009-03-03 04:26:26 UTC (rev 18746)
+++ website/trunk/en/30seconds.wml 2009-03-03 04:26:52 UTC (rev 18747)
@@ -17,9 +17,10 @@
<ul>
<li>Your Internet service provider</li>
<li>Your favorite website or online store</li>
+<li>Your favorite coffee shop or cafe with free wifi</li>
</ul>
-<p>These activities are commonly called traffic analysis and corporations,
+<p>These snooping activities are commonly called traffic analysis. Corporations,
marketing organizations, governments, and other parties are becoming
increasingly sophisticated at it.</p>
@@ -29,6 +30,7 @@
journals</li>
<li>Thieves, spammers, and phishers to launch progressively sophisticated and
personalized attacks</li>
+<li>Corporations can collect and aggregate online browsing and chatting behavior for better ad-targeting and profiling.</li>
</ul>
<p>For some people, this electronic spying is a nuisance that can affect their
@@ -37,11 +39,11 @@
<p>Since 2001, the Tor Project has been developing free and
open-source software that helps provide anonymity for Internet users. It works
by allowing users
-to travel the web on a circuitous route on a set of servers positioned
+to travel the web on a circuitous route over 1500 servers positioned
around the world. When you use Tor, your route on the Internet is indirect,
so snoops have a difficult time following your path and seizing vital
information. Tor also has special functionality, called hidden services,
-that allows users to run websites without revealing their location.</p>
+that allows you to run websites without revealing their location.</p>
<p>Tor is compatible with different operating systems, such as Microsoft
Windows, Apple Mac, and various versions of Linux. Tor works with most
@@ -53,7 +55,10 @@
<li>Journalists who need to protect their sources</li>
<li>Human rights workers</li>
<li>Dissidents in politically rigid countries</li>
+<li>Corporations who wish to protect their employees web traffic</li>
+
<li>Whistle blowers who fear retribution</li>
+<li>Governments wishing to protect their agents and employees traffic</li>
<li>Law enforcement officers on Internet sting operations</li>
<li>People wanting to post socially sensitive information in chat
rooms, like rape or abuse survivors and those with stigmatized illnesses.</li>
More information about the tor-commits
mailing list