and stop linking to tor-doc.html
Roger Dingledine

Roger Dingledine commited on 2005-09-12 12:33:13
Zeige 3 geänderte Dateien mit 15 Einfügungen und 8 Löschungen.

... ...
@@ -57,14 +57,13 @@
57 57
 <a id="RunningTor"></a>
58 58
 <h2><a class="anchor" href="#RunningTor">Running Tor</a></h2>
59 59
 <ul>
60
-<li><a href="/cvs/tor/doc/tor-doc.html">Why should I run Tor?</a></li>
60
+<li><a href="/overview.html">Why should I run Tor?</a></li>
61 61
 <li><a href="/cvs/tor/doc/tor-doc-win32.html">Installing Tor on Win32</a></li>
62 62
 <li><a href="/cvs/tor/doc/tor-doc-osx.html">Installing Tor on Mac OS X</a></li>
63 63
 <li><a href="/cvs/tor/doc/tor-doc-unix.html">Installing Tor on Linux/BSD/Unix</a></li>
64 64
 <li><a href="/cvs/tor/doc/tor-switchproxy.html">Installing SwitchProxy for Tor</a></li>
65 65
 <li><a href="/cvs/tor/doc/tor-doc-server.html">Configuring a Tor server</a></li>
66 66
 <li><a href="/cvs/tor/doc/tor-hidden-service.html">Configuring a Tor hidden service</a></li>
67
-<li><a href="/cvs/tor/doc/tor-doc.html#own-network">Setting up your own Tor network</a></li>
68 67
 </ul>
69 68
 
70 69
 <a id="DesignDoc"></a>
... ...
@@ -144,7 +144,7 @@ with exit abuse complaints," so we hope our network is more sustainable
144 144
 than past attempts at anonymity networks. </p>
145 145
 
146 146
 <p>Since Tor has <a
147
-href="/cvs/tor/doc/tor-doc.html">many good uses as
147
+href="/overview.html">many good uses as
148 148
 well</a>, we feel that we're doing pretty well at striking a balance
149 149
 currently. </p>
150 150
 
... ...
@@ -82,11 +82,19 @@ online privacy and security. Activist groups like the Electronic Frontier
82 82
 Foundation (EFF) are supporting Tor's development as a mechanism for
83 83
 maintaining civil liberties online. Corporations use Tor as a safe way
84 84
 to conduct competitive analysis, and to protect sensitive procurement
85
-patterns from eavesdroppers.  A branch of the U.S. Navy uses Tor for
86
-open source intelligence gathering, and one of its teams used Tor
87
-while deployed in the Middle East recently. Law enforcement uses Tor
88
-for visiting or surveilling web sites without leaving government IP
89
-addresses in their web logs.
85
+patterns from eavesdroppers. They also use it to replace traditional
86
+VPNs, which reveal the exact amount and timing of communication. Which
87
+locations have employees working late? Which locations have employees
88
+consulting job-hunting websites? Which research divisions are communicating
89
+with the company's patent lawyers?
90
+</p>
91
+
92
+<p>
93
+A branch of the U.S. Navy uses Tor for open source intelligence
94
+gathering, and one of its teams used Tor while deployed in the Middle
95
+East recently. Law enforcement uses Tor for visiting or surveilling
96
+web sites without leaving government IP addresses in their web logs,
97
+and for security during sting operations.
90 98
 </p>
91 99
 
92 100
 <p>
93 101