[or-cvs] r24212: {website} Use HTTPS when possible on the volunteer page (website/trunk/getinvolved/en)
Robert Ransom
rransom.8774 at gmail.com
Fri Feb 11 22:15:50 UTC 2011
Author: rransom
Date: 2011-02-11 22:15:50 +0000 (Fri, 11 Feb 2011)
New Revision: 24212
Modified:
website/trunk/getinvolved/en/volunteer.wml
Log:
Use HTTPS when possible on the volunteer page
Modified: website/trunk/getinvolved/en/volunteer.wml
===================================================================
--- website/trunk/getinvolved/en/volunteer.wml 2011-02-11 15:31:17 UTC (rev 24211)
+++ website/trunk/getinvolved/en/volunteer.wml 2011-02-11 22:15:50 UTC (rev 24212)
@@ -156,7 +156,7 @@
But Tor still needs better mechanisms for some parts of its
anti-censorship design.</p>
<p>One huge category of work is adding features to our <a
- href="http://gitweb.torproject.org/bridgedb.git?a=tree">BridgeDB</a>
+ href="https://gitweb.torproject.org/bridgedb.git?a=tree">BridgeDB</a>
service (Python). Tor aims to give out <a href="<page docs/bridges>">bridge
relay addresses</a> to users that can't reach the Tor network
directly, but there's an arms race between algorithms for distributing
@@ -490,7 +490,7 @@
IRC clients, knows how to talk to IRC servers, and has an additional
layer that requires the users to authenticate. Some work on this has
begun by other volunteers, see their progress at <a
- href="http://github.com/anonirc/orc">http://github.com/anonirc/orc</a>.
+ href="https://github.com/anonirc/orc">https://github.com/anonirc/orc</a>.
</p>
</li>
@@ -505,8 +505,8 @@
<br>
Likely Mentors: <i>?</i>
<p>
- <a href="http://code.google.com/p/torsocks/">Torsocks</a> and <a
- href="http://code.google.com/p/dsocks/">dsocks</a> are wrappers that will
+ <a href="https://code.google.com/p/torsocks/">Torsocks</a> and <a
+ href="https://code.google.com/p/dsocks/">dsocks</a> are wrappers that will
run applications, intercept their outgoing network connections, and push
those connections through Tor. The goal is to handle applications that
don't support proxies (or don't supporting them well). To get it right,
@@ -617,7 +617,7 @@
<p>Others are currently working on Tor clients for Java, Android, and Maemo
environments. The first step is to get a handle on the current state of
the project in which you are interested in helping; <a
- href="http://github.com/brl/JTor">Tor for Java</a>,
+ href="https://github.com/brl/JTor">Tor for Java</a>,
<a href="https://svn.torproject.org/svn/projects/android/trunk/">Android/Orbot</a>,
or <a href="<page docs/N900>">Tor for Maemo</a>. Check out the
repository and familiarize yourself
@@ -684,7 +684,7 @@
Tor if needed.</li>
<li>Perform a security analysis of Tor with <a
- href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determine
+ href="https://secure.wikimedia.org/wikipedia/en/wiki/Fuzz_testing">"fuzz"</a>. Determine
if there are good fuzzing libraries out there for what we want. Win fame by
getting credit when we put out a new release because of you!</li>
More information about the tor-commits
mailing list