Updated 30seconds with 100% more whitespace and easier to read text from rebecca coseboom.
Andrew Lewman

Andrew Lewman commited on 2008-10-22 04:51:17
Zeige 1 geänderte Dateien mit 74 Einfügungen und 52 Löschungen.

... ...
@@ -7,71 +7,93 @@
7 7
 
8 8
 <h2>Why You Need Tor</h2>
9 9
 <hr />
10
-<p>Few issues affect the legitimacy of the Internet more than protecting
11
-people's personal data while they're online. Because the vast majority
12
-of Internet traffic passes along public routes, it is relatively easy
13
-for prying eyes to view the comings and goings of Internet users -- and
14
-even link some important financial or personal information to you. These
15
-snoopers can get their information almost anywhere. Like your Internet
16
-service provider. Or your favorite website, which may be disclosing your
17
-shopping patterns. Or maybe a politically rigid government is compiling
18
-a list of its citizens reading outlawed journals. </p>
19
-
20
-<p>These activities are commonly called "traffic analysis" and
21
-corporations, governments and other parties are becoming increasingly
22
-sophisticated at it. While these organizations remain vague in their
23
-intentions, their effect on Internet users is clear. For some people,
24
-this electronic spying is a nuisance that can affect their pocketbook;
25
-for others, it could jeopardize their personal security.</p>
26
-
27
-<p>Since 2001, the Tor Project has been developing free and open-source
28
-software that helps provide anonymity for Internet users. It works by
29
-allowing users to travel the web on a circuitous route on a set of
30
-servers positioned around the world.  When you use Tor, your route on
31
-the Internet is indirect, so snoops have a difficult time
32
-following your path and seizing vital information. Tor also has special
33
-functionality, called hidden services, that allows users to run
34
-websites without revealing their location.</p>
10
+
11
+<p>The vast majority of Internet traffic passes along public routes, making it
12
+relatively easy for prying eyes to view your comings and goings -- and even
13
+link some important financial or personal information to you!</p>
14
+
15
+<p>Snoopers can get your information almost anywhere:</p>
16
+<ul>
17
+<li>Your Internet service provider</li>
18
+<li>Your favorite website or online store</li>
19
+</ul>
20
+
21
+<p>These activities are commonly called traffic analysis and corporations,
22
+marketing organizations, governments, and other parties are becoming
23
+increasingly sophisticated at it.</p>
24
+
25
+<p>Traffic Analysis enables: </p>
26
+<ul>
27
+<li>Politically rigid governments to compile lists of citizens reading outlawed
28
+journals</li>
29
+<li>Thieves, spammers, and phishers to launch progressively sophisticated and
30
+personalized attacks</li>
31
+</ul>
32
+
33
+<p>For some people, this electronic spying is a nuisance that can affect their
34
+pocketbook; for others, it jeopardizes their personal security.</p>
35
+
36
+<p>Since 2001, the Tor Project has been developing free and
37
+ open-source software that helps provide anonymity for Internet users. It works
38
+by allowing users
39
+to travel the web on a circuitous route on a set of servers positioned
40
+around the world. When you use Tor, your route on the Internet is indirect,
41
+so snoops have a difficult time following your path and seizing vital
42
+information. Tor also has special functionality, called hidden services,
43
+that allows users to run websites without revealing their location.</p>
35 44
 
36 45
 <p>Tor is compatible with different operating systems, such as Microsoft
37 46
 Windows, Apple Mac, and various versions of Linux. Tor works with most
38 47
 programs that connect your computer to the Internet.</p>
39 48
 
40
-<p>Today, Tor is used by hundreds of thousands of people to protect their
41
-activities online. These include journalists and human rights workers in
42
-politically rigid countries communicating with whistle blowers and
43
-dissidents. Law enforcement officers on Internet sting operations stay
44
-anonymous with Tor, as do people wanting to post socially sensitive
45
-information in chat rooms, like rape or abuse survivors and those with
46
-illnesses. The Tor Network also provides protection for people looking
47
-for another layer of privacy from the millions of websites bent on
48
-collecting private information and tracking their moves online.</p>
49
+<p>Tor is used by hundreds of thousands of people to protect their activities
50
+online:</p>
51
+<ul>
52
+<li>Journalists who need to protect their sources</li>
53
+<li>Human rights workers</li>
54
+<li>Dissidents in politically rigid countries</li>
55
+<li>Whistle blowers who fear retribution</li>
56
+<li>Law enforcement officers on Internet sting operations</li>
57
+<li>People wanting to post socially sensitive information in chat
58
+rooms, like rape or abuse survivors and those with stigmatized illnesses.</li>
59
+</ul>
60
+
61
+<p>The Tor Network also provides protection for people looking for another
62
+layer of privacy from the millions of websites bent on collecting private
63
+information and tracking their moves online.</p>
49 64
 
50 65
 <h2>Why Tor Needs You</h2>
51 66
 <hr />
52
-<p>Other than a few developers, the Tor Project is largely run by
53
-volunteers. To help keep Tor's worldwide server network running and its
54
-open source software up-to-date, the Tor project is looking for new
55
-sponsors and funding.  Join organizations like Google, Bell Security
56
-Solutions, SRI International, the National Science Foundation, the
57
-NLnet Foundation from the Netherlands, Human Rights Watch, and more than
58
-500 individuals who have donated funds to the Tor Project.</p>
59
-
60
-<p>We guarantee your money will be put to good use. For every dollar
61
-donated to the Tor Project, 75 cents goes directly into development. We
62
-also promise good service. Sponsors receive personal attention, better
67
+<p>Other than a few developers, the Tor Project is largely run by volunteers.
68
+To help keep Tor's worldwide server network running and its open source
69
+software up-to-date, the Tor project is looking for new sponsors and
70
+funding.</p>
71
+
72
+<p>We guarantee your money will be put to good use. For every dollar donated
73
+to the Tor Project, 75 cents goes directly into development.</p>
74
+
75
+<p>Sponsors receive personal attention, better
63 76
 support, and the chance to help us choose which of our priorities we
64 77
 should focus on next.</p>
65 78
 
66
-<p>The Tor Project is a registered 501(c)(3) non-profit, making donations
67
-tax deductible for those living in the United States or those paying
68
-taxes with charitable donation reciprocity with the U.S.</p>
79
+<p>Your contribution is tax deductible!  The Tor Project is a registered
80
+501(c)(3) non-profit, making donations tax deductible for those living in
81
+the United States or those paying taxes with charitable donation reciprocity
82
+with the U.S.</p>
69 83
 
70
-<p>In this day and age, Tor provides a vital layer of protection for you
71
-and your data. Your donations will help keep this project on the cutting
72
-edge. If you have any questions about funding the Tor Project, please
73
-contact: donations@torproject.org</p>
84
+<p>You'll be in good company!  Our sponsors include Google, Bell Security
85
+Solutions, SRI International, The National Science Foundation, The
86
+Netherlands' NLnet Foundation, Human Rights Watch and more than 500
87
+individuals who have donated funds to the Tor Project.</p>
74 88
 
89
+<p>You'll feel good because you're protecting your information and your
90
+rights.  In this day and age, Tor provides a vital layer of protection for
91
+you and your data.</p>
92
+
93
+<p>Please join us!  Your donations will help keep this important project on the
94
+cutting edge.  If you have any questions about funding the Tor Project, please
95
+contact:
96
+donations@torproject.org</p>
75 97
 </div><!-- #main -->
76 98
 
77 99
 #include <foot.wmi>
78 100
\ No newline at end of file
79 101