2c05b6367f5668912f8982e98033531f1b6f9244
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

1) ## translation metadata
2) # Revision: $Revision: 16919 $
3) 
4) #include "head.wmi" TITLE="Tor Summary" CHARSET="UTF-8"
5) 
6) <div class="main-column">
7) 
8) <h2>Why You Need Tor</h2>
9) <hr />
10) <p>Few issues affect the legitimacy of the Internet more than protecting
11) people's personal data while they're online. Because the vast majority
Roger Dingledine fix punctuation, capitaliza...

Roger Dingledine authored 16 years ago

12) of Internet traffic passes along public routes, it is relatively easy
13) for prying eyes to view the comings and goings of Internet users -- and
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

14) even gather some important financial or personal information. These
Roger Dingledine fix punctuation, capitaliza...

Roger Dingledine authored 16 years ago

15) snoopers can get their information almost anywhere. Like your Internet
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

16) service provider. Or your favorite website, which may be disclosing your
17) shopping patterns. Or maybe a politically rigid government is compiling
18) a list of its citizens reading outlawed journals. </p>
19) 
20) <p>These activities are commonly called "traffic analysis" and
21) corporations, governments and other parties are becoming increasingly
22) sophisticated at it. While these organizations remain vague in their
Roger Dingledine fix punctuation, capitaliza...

Roger Dingledine authored 16 years ago

23) intentions, their effect on Internet users is clear. For some people,
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

24) this electronic spying is a nuisance that can affect their pocketbook;
25) for others, it could jeopardize their personal security.</p> 
26) 
27) <p>Since 2001, the Tor Project has been developing free and open-source
28) software that helps provide anonymity for Internet users. It works by
29) allowing users to travel the web on a circuitous route on a set of
30) servers positioned around the world.  When you use Tor, your route on
31) the Internet appears haphazard, so snoops have a difficult time
32) following your path and seizing vital information. Tor also has special
33) functionality, called hidden services, that allows users to publish to
34) websites without revealing their location.</p> 
35) 
36) <p>Tor is compatible with different operating systems, such as  Microsoft
Roger Dingledine fix punctuation, capitaliza...

Roger Dingledine authored 16 years ago

37) Windows, Apple Mac, and various versions of Linux. Tor works with most