Roger Dingledine commited on 2008-10-17 00:13:00
Zeige 1 geänderte Dateien mit 8 Einfügungen und 7 Löschungen.
| ... | ... |
@@ -11,7 +11,7 @@ |
| 11 | 11 |
people's personal data while they're online. Because the vast majority |
| 12 | 12 |
of Internet traffic passes along public routes, it is relatively easy |
| 13 | 13 |
for prying eyes to view the comings and goings of Internet users -- and |
| 14 |
-even gather some important financial or personal information. These |
|
| 14 |
+even link some important financial or personal information to you. These |
|
| 15 | 15 |
snoopers can get their information almost anywhere. Like your Internet |
| 16 | 16 |
service provider. Or your favorite website, which may be disclosing your |
| 17 | 17 |
shopping patterns. Or maybe a politically rigid government is compiling |
| ... | ... |
@@ -28,9 +28,9 @@ for others, it could jeopardize their personal security.</p> |
| 28 | 28 |
software that helps provide anonymity for Internet users. It works by |
| 29 | 29 |
allowing users to travel the web on a circuitous route on a set of |
| 30 | 30 |
servers positioned around the world. When you use Tor, your route on |
| 31 |
-the Internet appears haphazard, so snoops have a difficult time |
|
| 31 |
+the Internet is indirect, so snoops have a difficult time |
|
| 32 | 32 |
following your path and seizing vital information. Tor also has special |
| 33 |
-functionality, called hidden services, that allows users to publish to |
|
| 33 |
+functionality, called hidden services, that allows users to run |
|
| 34 | 34 |
websites without revealing their location.</p> |
| 35 | 35 |
|
| 36 | 36 |
<p>Tor is compatible with different operating systems, such as Microsoft |
| ... | ... |
@@ -38,10 +38,10 @@ Windows, Apple Mac, and various versions of Linux. Tor works with most |
| 38 | 38 |
programs that connect your computer to the Internet.</p> |
| 39 | 39 |
|
| 40 | 40 |
<p>Today, Tor is used by hundreds of thousands of people to protect their |
| 41 |
-activities online. This could be journalists or human rights workers in |
|
| 41 |
+activities online. These include journalists and human rights workers in |
|
| 42 | 42 |
politically rigid countries communicating with whistle blowers and |
| 43 | 43 |
dissidents. Law enforcement officers on Internet sting operations stay |
| 44 |
-anonymous with Tor. As do people wanting to post socially sensitive |
|
| 44 |
+anonymous with Tor, as do people wanting to post socially sensitive |
|
| 45 | 45 |
information in chat rooms, like rape or abuse survivors and those with |
| 46 | 46 |
illnesses. The Tor Network also provides protection for people looking |
| 47 | 47 |
for another layer of privacy from the millions of websites bent on |
| ... | ... |
@@ -53,14 +53,15 @@ collecting private information and tracking their moves online.</p> |
| 53 | 53 |
volunteers. To help keep Tor's worldwide server network running and its |
| 54 | 54 |
open source software up-to-date, the Tor project is looking for new |
| 55 | 55 |
sponsors and funding. Join organizations like Google, Bell Security |
| 56 |
-Solutions, Cyber Threat-Analytics, the National Science Foundation, the |
|
| 56 |
+Solutions, SRI International, the National Science Foundation, the |
|
| 57 | 57 |
NLnet Foundation from the Netherlands, Human Rights Watch, and more than |
| 58 | 58 |
500 individuals who have donated funds to the Tor Project.</p> |
| 59 | 59 |
|
| 60 | 60 |
<p>We guarantee your money will be put to good use. For every dollar |
| 61 | 61 |
donated to the Tor Project, 75 cents goes directly into development. We |
| 62 | 62 |
also promise good service. Sponsors receive personal attention, better |
| 63 |
-support and the chance to influence the direction of Tor.</p> |
|
| 63 |
+support, and the chance to help us choose which of our priorities we |
|
| 64 |
+should focus on next.</p> |
|
| 64 | 65 |
|
| 65 | 66 |
<p>The Tor Project is a registered 501(c)(3) non-profit, making donations |
| 66 | 67 |
tax deductible for those living in the United States or those paying |
| 67 | 68 |