Incorporate changes from Shari. Web pages is two words. Audit first-person prounouns.
Nick Mathewson

Nick Mathewson commited on 2004-12-21 20:37:10
Zeige 3 geänderte Dateien mit 18 Einfügungen und 12 Löschungen.

... ...
@@ -45,11 +45,12 @@ width="110" height="79"></a>
45 45
 
46 46
 <p>Users:
47 47
 <ul>
48
-<li>Try Tor out, and let us know about bugs you find or features you
48
+<li>Try Tor out, and let the Tor developers know about bugs you find or
49
+features you
49 50
 don't find.</li>
50 51
 <li>Please consider <a
51 52
 href="cvs/tor/doc/tor-doc.html#server">running a
52
-server</a> to help us with development and scalability.</li>
53
+server</a> to help with development and scalability.</li>
53 54
 <li>Does somebody want to help maintain this website, or help with
54 55
 documentation, or help with managing our TODO and handling bug reports?</li>
55 56
 <li>Please fix up <a
... ...
@@ -102,8 +103,8 @@ Frontier Foundation</a>. More EFF donations means more Tor development.</li>
102 103
 </ul>
103 104
 </p>
104 105
 
105
-<a href="mailto:tor-volunteer@freehaven.net">Let us know</a> if you want
106
-to help out!
106
+<a href="mailto:tor-volunteer@freehaven.net">Email
107
+tor-volunteer@freehaven.net</a> if you want to help out!
107 108
 
108 109
 </div><!-- #main -->
109 110
 </div>
... ...
@@ -100,7 +100,8 @@ href="mailto:weasel@debian.org">demand</a>.
100 100
 </p>
101 101
 
102 102
 <p><b>Other packages</b> are available for Gentoo Linux, NetBSD,
103
-and OpenBSD. If somebody sends me details for these I'll put them here.
103
+and OpenBSD. If somebody sends details for these to the Tor developers, we'll
104
+put them here.
104 105
 </p>
105 106
 
106 107
 <!--
... ...
@@ -123,7 +124,7 @@ href="http://archives.seul.org/or/announce/Dec-2004/msg00000.html">a
123 124
 win32 installer, better
124 125
 circuit building algorithms, bandwidth accounting and hibernation,
125 126
 more efficient directory fetching, and support for a separate Tor GUI
126
-controller program (once somebody writes one for us)</a>.
127
+controller program (once somebody writes one)</a>.
127 128
 </p>
128 129
 
129 130
 <p class="date">2004-10-14</p>
... ...
@@ -56,7 +56,7 @@ alt="How Tor Works"></a>
56 56
 <h2>Tor: An anonymous Internet communication system</h2>
57 57
 
58 58
 <p>
59
-Tor is a toolset for a wide range of organizations and people who want
59
+Tor is a toolset for a wide range of organizations and people that want
60 60
 to improve their safety and security on the Internet. Using Tor can help
61 61
 you anonymize web browsing and publishing, instant messaging, IRC, SSH,
62 62
 and more. Tor also provides a platform on which software developers can
... ...
@@ -65,9 +65,13 @@ features.
65 65
 </p>
66 66
 
67 67
 <p>
68
-Your traffic is safer when you use Tor because communications
69
-are bounced around a distributed network of servers called <a
70
-href="howitworks.html">onion routers</a>&mdash;this makes it hard for
68
+Your traffic is safer when you use Tor, because communications
69
+are bounced around a distributed network of servers, called <a
70
+href="overview.html">onion routers</a>.  Instead of taking a direct
71
+route from source to destination, data packets on the Tor network take a
72
+random pathway through several servers that cover your tracks so no observer
73
+at any single point can tell where the data came from or where it's going.
74
+This makes it hard for
71 75
 recipients, observers, and even the onion routers themselves to figure
72 76
 out who and where you are. Tor's technology aims to provide Internet
73 77
 users with protection against "traffic analysis," a form of
... ...
@@ -77,7 +81,7 @@ confidential business activities and relationships, and state security.
77 81
 
78 82
 <p>
79 83
 Traffic analysis is used every day by companies, governments, and
80
-individuals who want to keep track of where people and organizations go
84
+individuals that want to keep track of where people and organizations go
81 85
 and what they do on the Internet.  Instead of looking at the content of
82 86
 your communications, traffic analysis tracks where your data goes and
83 87
 when, as well as how big it is. For example,
... ...
@@ -85,7 +89,7 @@ online advertising company Doubleclick uses traffic analysis to record
85 89
 what web pages you've visited, and can build a profile of your interests
86 90
 from that. A pharmaceutical company could use traffic analysis to monitor
87 91
 when the research wing of a competitor visits its website, and track
88
-what pages or products the competitor is interested in. IBM hosts a
92
+what pages or products that interest the competitor. IBM hosts a
89 93
 searchable patent index, and it could keep a list of every query your
90 94
 company makes. A stalker could use traffic analysis to learn whether
91 95
 you're in a certain Internet cafe.
92 96