Roger Dingledine commited on 2008-10-17 00:13:00
Zeige 1 geänderte Dateien mit 8 Einfügungen und 7 Löschungen.
... | ... |
@@ -11,7 +11,7 @@ |
11 | 11 |
people's personal data while they're online. Because the vast majority |
12 | 12 |
of Internet traffic passes along public routes, it is relatively easy |
13 | 13 |
for prying eyes to view the comings and goings of Internet users -- and |
14 |
-even gather some important financial or personal information. These |
|
14 |
+even link some important financial or personal information to you. These |
|
15 | 15 |
snoopers can get their information almost anywhere. Like your Internet |
16 | 16 |
service provider. Or your favorite website, which may be disclosing your |
17 | 17 |
shopping patterns. Or maybe a politically rigid government is compiling |
... | ... |
@@ -28,9 +28,9 @@ for others, it could jeopardize their personal security.</p> |
28 | 28 |
software that helps provide anonymity for Internet users. It works by |
29 | 29 |
allowing users to travel the web on a circuitous route on a set of |
30 | 30 |
servers positioned around the world. When you use Tor, your route on |
31 |
-the Internet appears haphazard, so snoops have a difficult time |
|
31 |
+the Internet is indirect, so snoops have a difficult time |
|
32 | 32 |
following your path and seizing vital information. Tor also has special |
33 |
-functionality, called hidden services, that allows users to publish to |
|
33 |
+functionality, called hidden services, that allows users to run |
|
34 | 34 |
websites without revealing their location.</p> |
35 | 35 |
|
36 | 36 |
<p>Tor is compatible with different operating systems, such as Microsoft |
... | ... |
@@ -38,10 +38,10 @@ Windows, Apple Mac, and various versions of Linux. Tor works with most |
38 | 38 |
programs that connect your computer to the Internet.</p> |
39 | 39 |
|
40 | 40 |
<p>Today, Tor is used by hundreds of thousands of people to protect their |
41 |
-activities online. This could be journalists or human rights workers in |
|
41 |
+activities online. These include journalists and human rights workers in |
|
42 | 42 |
politically rigid countries communicating with whistle blowers and |
43 | 43 |
dissidents. Law enforcement officers on Internet sting operations stay |
44 |
-anonymous with Tor. As do people wanting to post socially sensitive |
|
44 |
+anonymous with Tor, as do people wanting to post socially sensitive |
|
45 | 45 |
information in chat rooms, like rape or abuse survivors and those with |
46 | 46 |
illnesses. The Tor Network also provides protection for people looking |
47 | 47 |
for another layer of privacy from the millions of websites bent on |
... | ... |
@@ -53,14 +53,15 @@ collecting private information and tracking their moves online.</p> |
53 | 53 |
volunteers. To help keep Tor's worldwide server network running and its |
54 | 54 |
open source software up-to-date, the Tor project is looking for new |
55 | 55 |
sponsors and funding. Join organizations like Google, Bell Security |
56 |
-Solutions, Cyber Threat-Analytics, the National Science Foundation, the |
|
56 |
+Solutions, SRI International, the National Science Foundation, the |
|
57 | 57 |
NLnet Foundation from the Netherlands, Human Rights Watch, and more than |
58 | 58 |
500 individuals who have donated funds to the Tor Project.</p> |
59 | 59 |
|
60 | 60 |
<p>We guarantee your money will be put to good use. For every dollar |
61 | 61 |
donated to the Tor Project, 75 cents goes directly into development. We |
62 | 62 |
also promise good service. Sponsors receive personal attention, better |
63 |
-support and the chance to influence the direction of Tor.</p> |
|
63 |
+support, and the chance to help us choose which of our priorities we |
|
64 |
+should focus on next.</p> |
|
64 | 65 |
|
65 | 66 |
<p>The Tor Project is a registered 501(c)(3) non-profit, making donations |
66 | 67 |
tax deductible for those living in the United States or those paying |
67 | 68 |