Andrew Lewman commited on 2008-01-10 15:21:22
Zeige 1 geänderte Dateien mit 2 Einfügungen und 6 Löschungen.
... | ... |
@@ -3,10 +3,6 @@ |
3 | 3 |
|
4 | 4 |
#include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8" |
5 | 5 |
|
6 |
-# Note to translators: this file is still under construction, and |
|
7 |
-# will probably change a whole lot before we link to it. So it's |
|
8 |
-# probably best to not translate it yet. |
|
9 |
- |
|
10 | 6 |
<div class="main-column"> |
11 | 7 |
<h1>Who uses Tor?</h1> |
12 | 8 |
<ul> |
... | ... |
@@ -281,7 +277,7 @@ we recommend using Tor. |
281 | 277 |
<p> |
282 | 278 |
Please do send us your success stories. They are very important because |
283 | 279 |
Tor provides anonymity. While it is thrilling speculate about <a |
284 |
-href="<page contact>">undesired effects of Tor</a>, when it succeeds, nobody notices. This is |
|
280 |
+href="<page faq-abuse>">undesired effects of Tor</a>, when it succeeds, nobody notices. This is |
|
285 | 281 |
great for users, but not so good for us, since publishing success |
286 | 282 |
stories about how people or organizations are staying anonymous could be |
287 | 283 |
counterproductive. For example, we talked to an FBI officer who |
... | ... |
@@ -297,7 +293,7 @@ just a good idea some of the time - it is a requirement for a free and functioni |
297 | 293 |
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
298 | 294 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
299 | 295 |
and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there |
300 |
-are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of |
|
296 |
+are plenty of other places where this information can be found. We do have a <a href="<page faq-abuse>">Tor abuse</a> page describing some of |
|
301 | 297 |
the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
302 | 298 |
purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the |
303 | 299 |
<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
304 | 300 |