Andrew Lewman commited on 2009-03-03 05:26:52
              Zeige 1 geänderte Dateien mit 8 Einfügungen und 3 Löschungen.
            
| ... | ... | 
                      @@ -17,9 +17,10 @@ link some important financial or personal information to you!</p>  | 
                  
| 17 | 17 | 
                        <ul>  | 
                    
| 18 | 18 | 
                        <li>Your Internet service provider</li>  | 
                    
| 19 | 19 | 
                        <li>Your favorite website or online store</li>  | 
                    
| 20 | 
                        +<li>Your favorite coffee shop or cafe with free wifi</li>  | 
                    |
| 20 | 21 | 
                        </ul>  | 
                    
| 21 | 22 | 
                         | 
                    
| 22 | 
                        -<p>These activities are commonly called traffic analysis and corporations,  | 
                    |
| 23 | 
                        +<p>These snooping activities are commonly called traffic analysis. Corporations,  | 
                    |
| 23 | 24 | 
                        marketing organizations, governments, and other parties are becoming  | 
                    
| 24 | 25 | 
                        increasingly sophisticated at it.</p>  | 
                    
| 25 | 26 | 
                         | 
                    
| ... | ... | 
                      @@ -29,6 +30,7 @@ increasingly sophisticated at it.</p>  | 
                  
| 29 | 30 | 
                        journals</li>  | 
                    
| 30 | 31 | 
                        <li>Thieves, spammers, and phishers to launch progressively sophisticated and  | 
                    
| 31 | 32 | 
                        personalized attacks</li>  | 
                    
| 33 | 
                        +<li>Corporations can collect and aggregate online browsing and chatting behavior for better ad-targeting and profiling.</li>  | 
                    |
| 32 | 34 | 
                        </ul>  | 
                    
| 33 | 35 | 
                         | 
                    
| 34 | 36 | 
                        <p>For some people, this electronic spying is a nuisance that can affect their  | 
                    
| ... | ... | 
                      @@ -37,11 +39,11 @@ pocketbook; for others, it jeopardizes their personal security.</p>  | 
                  
| 37 | 39 | 
                        <p>Since 2001, the Tor Project has been developing free and  | 
                    
| 38 | 40 | 
                        open-source software that helps provide anonymity for Internet users. It works  | 
                    
| 39 | 41 | 
                        by allowing users  | 
                    
| 40 | 
                        -to travel the web on a circuitous route on a set of servers positioned  | 
                    |
| 42 | 
                        +to travel the web on a circuitous route over 1500 servers positioned  | 
                    |
| 41 | 43 | 
                        around the world. When you use Tor, your route on the Internet is indirect,  | 
                    
| 42 | 44 | 
                        so snoops have a difficult time following your path and seizing vital  | 
                    
| 43 | 45 | 
                        information. Tor also has special functionality, called hidden services,  | 
                    
| 44 | 
                        -that allows users to run websites without revealing their location.</p>  | 
                    |
| 46 | 
                        +that allows you to run websites without revealing their location.</p>  | 
                    |
| 45 | 47 | 
                         | 
                    
| 46 | 48 | 
                        <p>Tor is compatible with different operating systems, such as Microsoft  | 
                    
| 47 | 49 | 
                        Windows, Apple Mac, and various versions of Linux. Tor works with most  | 
                    
| ... | ... | 
                      @@ -53,7 +55,10 @@ online:</p>  | 
                  
| 53 | 55 | 
                        <li>Journalists who need to protect their sources</li>  | 
                    
| 54 | 56 | 
                        <li>Human rights workers</li>  | 
                    
| 55 | 57 | 
                        <li>Dissidents in politically rigid countries</li>  | 
                    
| 58 | 
                        +<li>Corporations who wish to protect their employees web traffic</li>  | 
                    |
| 59 | 
                        +  | 
                    |
| 56 | 60 | 
                        <li>Whistle blowers who fear retribution</li>  | 
                    
| 61 | 
                        +<li>Governments wishing to protect their agents and employees traffic</li>  | 
                    |
| 57 | 62 | 
                        <li>Law enforcement officers on Internet sting operations</li>  | 
                    
| 58 | 63 | 
                        <li>People wanting to post socially sensitive information in chat  | 
                    
| 59 | 64 | 
                        rooms, like rape or abuse survivors and those with stigmatized illnesses.</li>  | 
                    
| 60 | 65 |