Browse code

change - to mdash

Roger Dingledine authored on10/10/2010 02:25:46
Showing1 changed files
... ...
@@ -311,11 +311,11 @@
311 311
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
312 312
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
313 313
     href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
314
-    just a good idea some of the time - it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
314
+    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
315 315
     <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
316 316
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
317 317
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
318
-    and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
318
+    and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
319 319
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
320 320
     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
321 321
     purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the