some typos and capitalization
Roger Dingledine

Roger Dingledine commited on 2008-01-05 22:54:37
Zeige 2 geänderte Dateien mit 8 Einfügungen und 7 Löschungen.

... ...
@@ -45,7 +45,8 @@ wide variety of reasons: journalists and
45 45
 bloggers, human rights workers, law enforcement officers, soldiers,
46 46
 corporations, citizens of repressive regimes, and just ordinary
47 47
 citizens.  See the <a href="<page torusers>">Who Uses Tor?</a> page for
48
-examples of typical tor users.  See the <a href="<page overview>">overview page</a> for a
48
+examples of typical Tor users.
49
+See the <a href="<page overview>">overview page</a> for a
49 50
 more detailed explanation of what Tor does, why this diversity of
50 51
 users is important, and how Tor works.
51 52
 </p>
... ...
@@ -65,7 +65,7 @@ or world religions is behind a national firewall.
65 65
 
66 66
 <li>
67 67
 <strong>Field Agents:</strong>
68
-It is not difficult for insurgents to monitor internet traffic and
68
+It is not difficult for insurgents to monitor Internet traffic and
69 69
 discover all the hotels and other locations from which people are
70 70
 connecting to known military servers.
71 71
 Military field agents deployed away from home use Tor to
... ...
@@ -89,7 +89,7 @@ to record a military address, thereby revealing the surveillance.
89 89
 <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
90 90
 <ul>
91 91
 <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
92
-tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
92
+tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
93 93
 journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
94 94
 </li>
95 95
 <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> 
... ...
@@ -103,7 +103,7 @@ local events to encourage social change and political reform.
103 103
 </li>
104 104
 <li><strong>Citizens and journalists in <a
105 105
 href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
106
-holes</a></strong> use Tor to research state propoganda and opposing
106
+holes</a></strong> use Tor to research state propaganda and opposing
107 107
 viewpoints, to file stories with non-State controlled media, and to
108 108
 avoid risking the personal consequences of intellectual curiosity.
109 109
 </li>
... ...
@@ -165,7 +165,7 @@ See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-l
165 165
 report</a> on China Internet issues.
166 166
 </li>
167 167
 <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
168
-recommends Tor, especially for <strong>anonynomous blogging</strong>,
168
+recommends Tor, especially for <strong>anonymous blogging</strong>,
169 169
 throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
170 170
 web site.</a>
171 171
 </li>
... ...
@@ -220,7 +220,7 @@ To support this, <strong>Tor currently has an open Americorps/VISTA position</st
220 220
 government grant will cover a full time stipend for a volunteer to create
221 221
 curricula to <strong>show low-income populations how to use anonymity online for
222 222
 safer civic engagement</strong>.  Although it's often said that the poor do not use
223
-online access for civic engagment, failing to act in their self-interests,
223
+online access for civic engagement, failing to act in their self-interests,
224 224
 it is our hypothesis (based on personal conversations and anecdotal
225 225
 information) that it is precisely the &ldquo;permanent record &rdquo;
226 226
 left online that keeps many of the poor from speaking out on the Internet.
... ...
@@ -299,7 +299,7 @@ just a good idea some of the time - it is a requirement for a free and functioni
299 299
 and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
300 300
 are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
301 301
 the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
302
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
302
+purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
303 303
 <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
304 304
 you have better options than Tor. While not dismissing the potential abuses of Tor,
305 305
 this page shows a few of the many important ways anonymity is used online today.</p>
306 306