Roger Dingledine commited on 2008-10-14 02:07:46
Zeige 1 geänderte Dateien mit 5 Einfügungen und 5 Löschungen.
| ... | ... |
@@ -10,10 +10,10 @@ |
| 10 | 10 |
<hr /> |
| 11 | 11 |
<p>Few issues affect the legitimacy of the Internet more than protecting |
| 12 | 12 |
people's personal data while they're online. Because the vast majority |
| 13 |
-of internet traffic passes along public routes, it is relatively easy |
|
| 14 |
-for prying eyes to view the comings and goings of internet users -- and |
|
| 13 |
+of Internet traffic passes along public routes, it is relatively easy |
|
| 14 |
+for prying eyes to view the comings and goings of Internet users -- and |
|
| 15 | 15 |
even gather some important financial or personal information. These |
| 16 |
-snoopers can get their information almost anywhere. Like your internet |
|
| 16 |
+snoopers can get their information almost anywhere. Like your Internet |
|
| 17 | 17 |
service provider. Or your favorite website, which may be disclosing your |
| 18 | 18 |
shopping patterns. Or maybe a politically rigid government is compiling |
| 19 | 19 |
a list of its citizens reading outlawed journals. </p> |
| ... | ... |
@@ -21,7 +21,7 @@ a list of its citizens reading outlawed journals. </p> |
| 21 | 21 |
<p>These activities are commonly called "traffic analysis" and |
| 22 | 22 |
corporations, governments and other parties are becoming increasingly |
| 23 | 23 |
sophisticated at it. While these organizations remain vague in their |
| 24 |
-intentions, their affect on Internet users is clear. For some people, |
|
| 24 |
+intentions, their effect on Internet users is clear. For some people, |
|
| 25 | 25 |
this electronic spying is a nuisance that can affect their pocketbook; |
| 26 | 26 |
for others, it could jeopardize their personal security.</p> |
| 27 | 27 |
|
| ... | ... |
@@ -35,7 +35,7 @@ functionality, called hidden services, that allows users to publish to |
| 35 | 35 |
websites without revealing their location.</p> |
| 36 | 36 |
|
| 37 | 37 |
<p>Tor is compatible with different operating systems, such as Microsoft |
| 38 |
-Windows, Apple Mac, and various versions of Linux Tor works with most |
|
| 38 |
+Windows, Apple Mac, and various versions of Linux. Tor works with most |
|
| 39 | 39 |
programs that connect your computer to the Internet.</p> |
| 40 | 40 |
|
| 41 | 41 |
<p>Today, Tor is used by hundreds of thousands of people to protect their |
| 42 | 42 |