Roger Dingledine commited on 2009-03-03 07:42:18
Zeige 1 geänderte Dateien mit 3 Einfügungen und 3 Löschungen.
| ... | ... |
@@ -39,7 +39,7 @@ pocketbook; for others, it jeopardizes their personal security.</p> |
| 39 | 39 |
<p>Since 2001, the Tor Project has been developing free and |
| 40 | 40 |
open-source software that helps provide anonymity for Internet users. It works |
| 41 | 41 |
by allowing users |
| 42 |
-to travel the web on a circuitous route over 1500 servers positioned |
|
| 42 |
+to travel the web on a circuitous route over more than 1000 servers positioned |
|
| 43 | 43 |
around the world. When you use Tor, your route on the Internet is indirect, |
| 44 | 44 |
so snoops have a difficult time following your path and seizing vital |
| 45 | 45 |
information. Tor also has special functionality, called hidden services, |
| ... | ... |
@@ -55,10 +55,10 @@ online:</p> |
| 55 | 55 |
<li>Journalists who need to protect their sources</li> |
| 56 | 56 |
<li>Human rights workers</li> |
| 57 | 57 |
<li>Dissidents in politically rigid countries</li> |
| 58 |
-<li>Corporations who wish to protect their employees web traffic</li> |
|
| 58 |
+<li>Corporations who wish to protect their employees' web traffic</li> |
|
| 59 | 59 |
|
| 60 | 60 |
<li>Whistle blowers who fear retribution</li> |
| 61 |
-<li>Governments wishing to protect their agents and employees traffic</li> |
|
| 61 |
+<li>Governments wishing to protect their agents' and employees' traffic</li> |
|
| 62 | 62 |
<li>Law enforcement officers on Internet sting operations</li> |
| 63 | 63 |
<li>People wanting to post socially sensitive information in chat |
| 64 | 64 |
rooms, like rape or abuse survivors and those with stigmatized illnesses.</li> |
| 65 | 65 |