Roger Dingledine commited on 2008-10-14 02:07:46
Zeige 1 geänderte Dateien mit 5 Einfügungen und 5 Löschungen.
... | ... |
@@ -10,10 +10,10 @@ |
10 | 10 |
<hr /> |
11 | 11 |
<p>Few issues affect the legitimacy of the Internet more than protecting |
12 | 12 |
people's personal data while they're online. Because the vast majority |
13 |
-of internet traffic passes along public routes, it is relatively easy |
|
14 |
-for prying eyes to view the comings and goings of internet users -- and |
|
13 |
+of Internet traffic passes along public routes, it is relatively easy |
|
14 |
+for prying eyes to view the comings and goings of Internet users -- and |
|
15 | 15 |
even gather some important financial or personal information. These |
16 |
-snoopers can get their information almost anywhere. Like your internet |
|
16 |
+snoopers can get their information almost anywhere. Like your Internet |
|
17 | 17 |
service provider. Or your favorite website, which may be disclosing your |
18 | 18 |
shopping patterns. Or maybe a politically rigid government is compiling |
19 | 19 |
a list of its citizens reading outlawed journals. </p> |
... | ... |
@@ -21,7 +21,7 @@ a list of its citizens reading outlawed journals. </p> |
21 | 21 |
<p>These activities are commonly called "traffic analysis" and |
22 | 22 |
corporations, governments and other parties are becoming increasingly |
23 | 23 |
sophisticated at it. While these organizations remain vague in their |
24 |
-intentions, their affect on Internet users is clear. For some people, |
|
24 |
+intentions, their effect on Internet users is clear. For some people, |
|
25 | 25 |
this electronic spying is a nuisance that can affect their pocketbook; |
26 | 26 |
for others, it could jeopardize their personal security.</p> |
27 | 27 |
|
... | ... |
@@ -35,7 +35,7 @@ functionality, called hidden services, that allows users to publish to |
35 | 35 |
websites without revealing their location.</p> |
36 | 36 |
|
37 | 37 |
<p>Tor is compatible with different operating systems, such as Microsoft |
38 |
-Windows, Apple Mac, and various versions of Linux Tor works with most |
|
38 |
+Windows, Apple Mac, and various versions of Linux. Tor works with most |
|
39 | 39 |
programs that connect your computer to the Internet.</p> |
40 | 40 |
|
41 | 41 |
<p>Today, Tor is used by hundreds of thousands of people to protect their |
42 | 42 |