Browse code

closed a tag in docs/en/faq-abuse.wml

Runa A. Sandvik authored on 18/04/2011 11:35:38
Showing 1 changed files
... ...
@@ -77,11 +77,9 @@
77 77
     and other privacy measures can <em>fight</em> identity theft, physical
78 78
     crimes like stalking, and so on. </p>
79 79
     
80
-    <!--
81
-    <a id="Pervasive"></a>
82
-    <h3><a class="anchor" href="#Pervasive">If the whole world starts using
83
-    Tor, won't civilization collapse?</a></h3>
84
-    -->
80
+    #<a id="Pervasive"></a>
81
+    #<h3><a class="anchor" href="#Pervasive">If the whole world starts using
82
+    #Tor, won't civilization collapse?</a></h3>
85 83
     
86 84
     <a id="DDoS"></a>
87 85
     <h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3>
... ...
@@ -178,7 +176,7 @@
178 176
     href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates
179 177
     on the Tor wiki</a>. You can also proactively reduce the amount of abuse you
180 178
     get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips
181
-    for running an exit node with minimal harassment</a>.
179
+    for running an exit node with minimal harassment</a>.</p>
182 180
     
183 181
     <p>You might also find that your Tor relay's IP is blocked from accessing
184 182
     some Internet sites/services. This might happen regardless of your exit