Add some list items and clean up some text.
Andrew Lewman

Andrew Lewman commited on 2009-03-03 05:26:52
Zeige 1 geänderte Dateien mit 8 Einfügungen und 3 Löschungen.

... ...
@@ -17,9 +17,10 @@ link some important financial or personal information to you!</p>
17 17
 <ul>
18 18
 <li>Your Internet service provider</li>
19 19
 <li>Your favorite website or online store</li>
20
+<li>Your favorite coffee shop or cafe with free wifi</li>
20 21
 </ul>
21 22
 
22
-<p>These activities are commonly called traffic analysis and corporations,
23
+<p>These snooping activities are commonly called traffic analysis. Corporations,
23 24
 marketing organizations, governments, and other parties are becoming
24 25
 increasingly sophisticated at it.</p>
25 26
 
... ...
@@ -29,6 +30,7 @@ increasingly sophisticated at it.</p>
29 30
 journals</li>
30 31
 <li>Thieves, spammers, and phishers to launch progressively sophisticated and
31 32
 personalized attacks</li>
33
+<li>Corporations can collect and aggregate online browsing and chatting behavior for better ad-targeting and profiling.</li>
32 34
 </ul>
33 35
 
34 36
 <p>For some people, this electronic spying is a nuisance that can affect their
... ...
@@ -37,11 +39,11 @@ pocketbook; for others, it jeopardizes their personal security.</p>
37 39
 <p>Since 2001, the Tor Project has been developing free and
38 40
  open-source software that helps provide anonymity for Internet users. It works
39 41
 by allowing users
40
-to travel the web on a circuitous route on a set of servers positioned
42
+to travel the web on a circuitous route over 1500 servers positioned
41 43
 around the world. When you use Tor, your route on the Internet is indirect,
42 44
 so snoops have a difficult time following your path and seizing vital
43 45
 information. Tor also has special functionality, called hidden services,
44
-that allows users to run websites without revealing their location.</p>
46
+that allows you to run websites without revealing their location.</p>
45 47
 
46 48
 <p>Tor is compatible with different operating systems, such as Microsoft
47 49
 Windows, Apple Mac, and various versions of Linux. Tor works with most
... ...
@@ -53,7 +55,10 @@ online:</p>
53 55
 <li>Journalists who need to protect their sources</li>
54 56
 <li>Human rights workers</li>
55 57
 <li>Dissidents in politically rigid countries</li>
58
+<li>Corporations who wish to protect their employees web traffic</li>
59
+
56 60
 <li>Whistle blowers who fear retribution</li>
61
+<li>Governments wishing to protect their agents and employees traffic</li>
57 62
 <li>Law enforcement officers on Internet sting operations</li>
58 63
 <li>People wanting to post socially sensitive information in chat
59 64
 rooms, like rape or abuse survivors and those with stigmatized illnesses.</li>
60 65