Apply strunk&white, clarify a few points, convert em dashes.
Nick Mathewson

Nick Mathewson commited on 2004-12-21 05:48:55
Zeige 5 geänderte Dateien mit 24 Einfügungen und 20 Löschungen.

... ...
@@ -78,7 +78,7 @@ so we can go in the system tray?</li>
78 78
 </ul>
79 79
 </p>
80 80
 
81
-<p>People who want to donate to Tor:
81
+<p>Donors:
82 82
 <ul>
83 83
 <li>Go take a look at the <a href="http://www.eff.org/">Electronic
84 84
 Frontier Foundation</a>. More EFF donations means more Tor development.</li>
... ...
@@ -31,10 +31,10 @@ directory</a>. It should run on Linux, BSD, OS X, Win32, Solaris,
31 31
 and more.
32 32
 <ul>
33 33
 <!--
34
-<li>Latest experimental: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a>
34
+<li>Latest experimental source: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a>
35 35
 (<a href="dist/tor-0.0.9.tar.gz.asc">sig</a>)</li>
36 36
 -->
37
-<li>Latest stable: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a>
37
+<li>Latest stable source: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a>
38 38
 (<a href="dist/tor-0.0.9.1.tar.gz.asc">sig</a>)</li>
39 39
 <li>Win32 installer (experimental):
40 40
 <a href="dist/win32/tor-0.0.9.1-win32.exe">0.0.9.1</a> (<a
... ...
@@ -48,7 +48,7 @@ href="cvs/tor/doc/tor-doc.html#installing">here</a>.
48 48
 </p>
49 49
 
50 50
 <p>See the <a href="developers.html">developers page</a> for instructions
51
-on fetching Tor CVS.
51
+on fetching Tor from CVS.
52 52
 </p>
53 53
 
54 54
 <p>
... ...
@@ -66,7 +66,7 @@ features.
66 66
 <p>
67 67
 Your traffic is safer when you use Tor because communications
68 68
 are bounced around a distributed network of servers called <a
69
-href="howitworks.html">onion routers</a> -- this makes it hard for
69
+href="howitworks.html">onion routers</a>&mdash;this makes it hard for
70 70
 recipients, observers, and even the onion routers themselves to figure
71 71
 out who and where you are. Tor's technology aims to provide Internet
72 72
 users with protection against "traffic analysis," a form of
... ...
@@ -108,7 +108,7 @@ href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then
108 108
 <p>
109 109
 Tor is an important piece of building more safety, privacy, and anonymity
110 110
 online, but it is not a complete solution.
111
-And remember that this is development code -- it's not a good idea to rely
111
+And remember that this is development code&mdash;it's not a good idea to rely
112 112
 on the current Tor network if you really need strong anonymity.
113 113
 </p>
114 114
 
... ...
@@ -29,16 +29,17 @@
29 29
 <p>
30 30
 Tor is a network-within-a-network that allows people and groups to
31 31
 improve their privacy and security on the Internet.  It also enables
32
-future software developers to create new kinds of communication tools
33
-that have built-in privacy features.  Tor can provide the foundation for
34
-a whole range of applications that allow organizations and individuals
32
+software developers to create new communication tools
33
+with built-in privacy features.  Tor provides the foundation for
34
+a range of applications that allow organizations and individuals
35 35
 to share information over public networks without compromising their
36 36
 privacy.
37 37
 </p>
38 38
 
39 39
 <p>
40
-Individuals can use Tor to shield themselves and their family members
41
-from being tracked by remote websites.  They can also use it to connect
40
+Individuals can use Tor to keep remote websites from tracking them and their
41
+family members.
42
+They can also use it to connect
42 43
 to resources such as news sites or instant messaging services that are
43 44
 blocked by their local Internet service providers (ISPs).
44 45
 </p>
... ...
@@ -57,7 +58,8 @@ teams used Tor while deployed in the Middle East recently.
57 58
 
58 59
 <p>
59 60
 The variety of people who use Tor is actually part of what makes it
60
-so secure.  The more populous and diverse the user base for Tor is,
61
+so secure.  Tor hides you among the other users on the network, so the more
62
+populous and diverse the user base for Tor is,
61 63
 the more your anonymity will be protected.
62 64
 </p>
63 65
 
... ...
@@ -74,7 +76,7 @@ institution of origin.  It can even threaten your job and physical safety
74 76
 by revealing who and where you are. For example, if you're travelling
75 77
 abroad and you connect to your employer's computers to check or send mail,
76 78
 you can inadvertently reveal your national origin and professional
77
-affiliation to any local observing the network, even if the connection
79
+affiliation to anyone observing the network, even if the connection
78 80
 is encrypted.
79 81
 </p>
80 82
 
... ...
@@ -101,7 +103,9 @@ the network, looking at headers.
101 103
 But there are also more powerful kinds of traffic analysis.  Some
102 104
 attackers spy on multiple parts of the Internet and use sophisticated
103 105
 statistical techniques to track the communications patterns of many
104
-different organizations and individuals.
106
+different organizations and individuals.  Encryption does not help against
107
+these attackers, since it only hides the content of Internet traffic, not
108
+the headers.
105 109
 </p>
106 110
 
107 111
 <h3>The solution: a distributed, anonymous network</h3>
... ...
@@ -111,7 +115,7 @@ Tor helps to reduce the risks of both simple and sophisticated traffic
111 115
 analysis by distributing your transactions over several places on the
112 116
 Internet, so no single point can link you to your destination.  The idea
113 117
 is similar to using a twisty, hard-to-follow route in order to throw off
114
-somebody who is tailing you -- and then periodically erasing your
118
+somebody who is tailing you&mdash;and then periodically erasing your
115 119
 footprints.  Instead of taking a direct route from source to
116 120
 destination, data packets on the Tor network take a random pathway
117 121
 through several servers that cover your tracks so no observer at any
... ...
@@ -126,10 +130,10 @@ To create a private network pathway with Tor, the user's software or
126 130
 client incrementally builds a circuit of encrypted connections through
127 131
 servers on the network.  The circuit is extended one hop at a time, and
128 132
 each server along the way knows only which server gave it data and which
129
-server it is giving data to.  No individual server will ever know the
133
+server it is giving data to.  No individual server ever knows the
130 134
 complete path that a data packet has taken.  The client negotiates a
131 135
 separate set of encryption keys for each hop along the circuit to ensure
132
-that each hop can't see what these connections are as they pass through.
136
+that each hop can't trace these connections as they pass through.
133 137
 </p>
134 138
 
135 139
 <img alt="tor circuit step three" src="img/htw3.png" />
... ...
@@ -169,7 +173,7 @@ the site, and nobody who offered the site would know who was posting to it.
169 173
 <h3>Staying anonymous</h3>
170 174
 
171 175
 <p>
172
-Of course, Tor can't solve all anonymity problems.  It focuses only on
176
+Tor can't solve all anonymity problems.  It focuses only on
173 177
 protecting the transport of data.  You need to use protocol-specific
174 178
 support software if you don't want the sites you visit to see your
175 179
 identifying information. For example, you can use web proxies such as
... ...
@@ -27,7 +27,7 @@
27 27
 <h2>Tor: People</h2>
28 28
 
29 29
 <p>Tor is managed by <a href="http://freehaven.net/">The Free
30
-Haven Project</a> as one of the building blocks necessary for
30
+Haven Project</a> as a building block for
31 31
 a robust censorship-resistant data haven. It is developed by <a
32 32
 href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a
33 33
 href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from
... ...
@@ -39,7 +39,7 @@ href="http://www.syverson.org/">Paul Syverson</a> and based on the
39 39
 original <a href="http://www.onion-router.net/">onion routing</a> idea
40 40
 developed there.</p>
41 41
 
42
-<p>As of November 2004, Tor development is now supported by the <a
42
+<p>Since November 2004, Tor development has been supported by the <a
43 43
 href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p>
44 44
 
45 45
   </div><!-- #main -->
46 46