try to make 30seconds less wrong and/or less misleading. also get rid of some of the incomplete sentences.
Roger Dingledine

Roger Dingledine commited on 2008-10-17 00:13:00
Zeige 1 geänderte Dateien mit 8 Einfügungen und 7 Löschungen.

... ...
@@ -11,7 +11,7 @@
11 11
 people's personal data while they're online. Because the vast majority
12 12
 of Internet traffic passes along public routes, it is relatively easy
13 13
 for prying eyes to view the comings and goings of Internet users -- and
14
-even gather some important financial or personal information. These
14
+even link some important financial or personal information to you. These
15 15
 snoopers can get their information almost anywhere. Like your Internet
16 16
 service provider. Or your favorite website, which may be disclosing your
17 17
 shopping patterns. Or maybe a politically rigid government is compiling
... ...
@@ -28,9 +28,9 @@ for others, it could jeopardize their personal security.</p>
28 28
 software that helps provide anonymity for Internet users. It works by
29 29
 allowing users to travel the web on a circuitous route on a set of
30 30
 servers positioned around the world.  When you use Tor, your route on
31
-the Internet appears haphazard, so snoops have a difficult time
31
+the Internet is indirect, so snoops have a difficult time
32 32
 following your path and seizing vital information. Tor also has special
33
-functionality, called hidden services, that allows users to publish to
33
+functionality, called hidden services, that allows users to run
34 34
 websites without revealing their location.</p>
35 35
 
36 36
 <p>Tor is compatible with different operating systems, such as Microsoft
... ...
@@ -38,10 +38,10 @@ Windows, Apple Mac, and various versions of Linux. Tor works with most
38 38
 programs that connect your computer to the Internet.</p>
39 39
 
40 40
 <p>Today, Tor is used by hundreds of thousands of people to protect their
41
-activities online. This could be journalists or human rights workers in
41
+activities online. These include journalists and human rights workers in
42 42
 politically rigid countries communicating with whistle blowers and
43 43
 dissidents. Law enforcement officers on Internet sting operations stay
44
-anonymous with Tor. As do people wanting to post socially sensitive
44
+anonymous with Tor, as do people wanting to post socially sensitive
45 45
 information in chat rooms, like rape or abuse survivors and those with
46 46
 illnesses. The Tor Network also provides protection for people looking
47 47
 for another layer of privacy from the millions of websites bent on
... ...
@@ -53,14 +53,15 @@ collecting private information and tracking their moves online.</p>
53 53
 volunteers. To help keep Tor's worldwide server network running and its
54 54
 open source software up-to-date, the Tor project is looking for new
55 55
 sponsors and funding.  Join organizations like Google, Bell Security
56
-Solutions, Cyber Threat-Analytics, the National Science Foundation, the
56
+Solutions, SRI International, the National Science Foundation, the
57 57
 NLnet Foundation from the Netherlands, Human Rights Watch, and more than
58 58
 500 individuals who have donated funds to the Tor Project.</p>
59 59
 
60 60
 <p>We guarantee your money will be put to good use. For every dollar
61 61
 donated to the Tor Project, 75 cents goes directly into development. We
62 62
 also promise good service. Sponsors receive personal attention, better
63
-support and the chance to influence the direction of Tor.</p>
63
+support, and the chance to help us choose which of our priorities we
64
+should focus on next.</p>
64 65
 
65 66
 <p>The Tor Project is a registered 501(c)(3) non-profit, making donations
66 67
 tax deductible for those living in the United States or those paying
67 68