2c75ca166ec3f0cf83fbb7baf26d469993943645
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

1) ## translation metadata
Roger Dingledine fix more propsets

Roger Dingledine authored 16 years ago

2) # Revision: $Revision$
Roger Dingledine reevaluate our translation...

Roger Dingledine authored 15 years ago

3) # Translation-Priority: 1-high
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

4) 
5) #include "head.wmi" TITLE="Tor Summary" CHARSET="UTF-8"
6) 
7) <div class="main-column">
8) 
9) <h2>Why You Need Tor</h2>
10) <hr />
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

11) 
12) <p>The vast majority of Internet traffic passes along public routes, making it
13) relatively easy for prying eyes to view your comings and goings -- and even
14) link some important financial or personal information to you!</p>
15) 
16) <p>Snoopers can get your information almost anywhere:</p>
17) <ul>
18) <li>Your Internet service provider</li>
19) <li>Your favorite website or online store</li>
Andrew Lewman Add some list items and cle...

Andrew Lewman authored 15 years ago

20) <li>Your favorite coffee shop or cafe with free wifi</li>
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

21) </ul>
22) 
Andrew Lewman Add some list items and cle...

Andrew Lewman authored 15 years ago

23) <p>These snooping activities are commonly called traffic analysis. Corporations,
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

24) marketing organizations, governments, and other parties are becoming
25) increasingly sophisticated at it.</p>
26) 
27) <p>Traffic Analysis enables: </p>
28) <ul>
29) <li>Politically rigid governments to compile lists of citizens reading outlawed
30) journals</li>
31) <li>Thieves, spammers, and phishers to launch progressively sophisticated and
32) personalized attacks</li>
Andrew Lewman Add some list items and cle...

Andrew Lewman authored 15 years ago

33) <li>Corporations can collect and aggregate online browsing and chatting behavior for better ad-targeting and profiling.</li>
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

34) </ul>
35) 
36) <p>For some people, this electronic spying is a nuisance that can affect their
37) pocketbook; for others, it jeopardizes their personal security.</p>
38) 
39) <p>Since 2001, the Tor Project has been developing free and
40)  open-source software that helps provide anonymity for Internet users. It works
41) by allowing users
Andrew Lewman Add some list items and cle...

Andrew Lewman authored 15 years ago

42) to travel the web on a circuitous route over 1500 servers positioned
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

43) around the world. When you use Tor, your route on the Internet is indirect,
44) so snoops have a difficult time following your path and seizing vital
45) information. Tor also has special functionality, called hidden services,
Andrew Lewman Add some list items and cle...

Andrew Lewman authored 15 years ago

46) that allows you to run websites without revealing their location.</p>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

47) 
Roger Dingledine try to make 30seconds less...

Roger Dingledine authored 16 years ago

48) <p>Tor is compatible with different operating systems, such as Microsoft
Roger Dingledine fix punctuation, capitaliza...

Roger Dingledine authored 16 years ago

49) Windows, Apple Mac, and various versions of Linux. Tor works with most
Roger Dingledine try to make 30seconds less...

Roger Dingledine authored 16 years ago

50) programs that connect your computer to the Internet.</p>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

51) 
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

52) <p>Tor is used by hundreds of thousands of people to protect their activities
53) online:</p>
54) <ul>
55) <li>Journalists who need to protect their sources</li>
56) <li>Human rights workers</li>
57) <li>Dissidents in politically rigid countries</li>
Andrew Lewman Add some list items and cle...

Andrew Lewman authored 15 years ago

58) <li>Corporations who wish to protect their employees web traffic</li>
59) 
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

60) <li>Whistle blowers who fear retribution</li>
Andrew Lewman Add some list items and cle...

Andrew Lewman authored 15 years ago

61) <li>Governments wishing to protect their agents and employees traffic</li>
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

62) <li>Law enforcement officers on Internet sting operations</li>
63) <li>People wanting to post socially sensitive information in chat
64) rooms, like rape or abuse survivors and those with stigmatized illnesses.</li>
65) </ul>
66) 
67) <p>The Tor Network also provides protection for people looking for another
68) layer of privacy from the millions of websites bent on collecting private
69) information and tracking their moves online.</p>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

70) 
Roger Dingledine try to make 30seconds less...

Roger Dingledine authored 16 years ago

71) <h2>Why Tor Needs You</h2>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

72) <hr />
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

73) <p>Other than a few developers, the Tor Project is largely run by volunteers.
74) To help keep Tor's worldwide server network running and its open source
75) software up-to-date, the Tor project is looking for new sponsors and
76) funding.</p>
77) 
78) <p>We guarantee your money will be put to good use. For every dollar donated
Andrew Lewman Clean up the alternate link...

Andrew Lewman authored 16 years ago

79) to the Tor Project, 85 cents goes directly into development.</p>
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

80) 
81) <p>Sponsors receive personal attention, better
Roger Dingledine try to make 30seconds less...

Roger Dingledine authored 16 years ago

82) support, and the chance to help us choose which of our priorities we
83) should focus on next.</p>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

84) 
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

85) <p>Your contribution is tax deductible!  The Tor Project is a registered
86) 501(c)(3) non-profit, making donations tax deductible for those living in
87) the United States or those paying taxes with charitable donation reciprocity
88) with the U.S.</p>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

89) 
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

90) <p>You'll be in good company!  Our sponsors include Google, Bell Security
91) Solutions, SRI International, The National Science Foundation, The
92) Netherlands' NLnet Foundation, Human Rights Watch and more than 500
93) individuals who have donated funds to the Tor Project.</p>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

94) 
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

95) <p>You'll feel good because you're protecting your information and your
96) rights.  In this day and age, Tor provides a vital layer of protection for
97) you and your data.</p>
Andrew Lewman update the css sidebar, add...

Andrew Lewman authored 16 years ago

98) 
Andrew Lewman Updated 30seconds with 100%...

Andrew Lewman authored 16 years ago

99) <p>Please join us!  Your donations will help keep this important project on the
100) cutting edge.  If you have any questions about funding the Tor Project, please
101) contact:
102) donations@torproject.org</p>
103) </div><!-- #main -->
Roger Dingledine try to make 30seconds less...

Roger Dingledine authored 16 years ago

104)