Nick Mathewson commited on 2004-12-21 20:37:10
Zeige 3 geänderte Dateien mit 18 Einfügungen und 12 Löschungen.
... | ... |
@@ -45,11 +45,12 @@ width="110" height="79"></a> |
45 | 45 |
|
46 | 46 |
<p>Users: |
47 | 47 |
<ul> |
48 |
-<li>Try Tor out, and let us know about bugs you find or features you |
|
48 |
+<li>Try Tor out, and let the Tor developers know about bugs you find or |
|
49 |
+features you |
|
49 | 50 |
don't find.</li> |
50 | 51 |
<li>Please consider <a |
51 | 52 |
href="cvs/tor/doc/tor-doc.html#server">running a |
52 |
-server</a> to help us with development and scalability.</li> |
|
53 |
+server</a> to help with development and scalability.</li> |
|
53 | 54 |
<li>Does somebody want to help maintain this website, or help with |
54 | 55 |
documentation, or help with managing our TODO and handling bug reports?</li> |
55 | 56 |
<li>Please fix up <a |
... | ... |
@@ -102,8 +103,8 @@ Frontier Foundation</a>. More EFF donations means more Tor development.</li> |
102 | 103 |
</ul> |
103 | 104 |
</p> |
104 | 105 |
|
105 |
-<a href="mailto:tor-volunteer@freehaven.net">Let us know</a> if you want |
|
106 |
-to help out! |
|
106 |
+<a href="mailto:tor-volunteer@freehaven.net">Email |
|
107 |
+tor-volunteer@freehaven.net</a> if you want to help out! |
|
107 | 108 |
|
108 | 109 |
</div><!-- #main --> |
109 | 110 |
</div> |
... | ... |
@@ -100,7 +100,8 @@ href="mailto:weasel@debian.org">demand</a>. |
100 | 100 |
</p> |
101 | 101 |
|
102 | 102 |
<p><b>Other packages</b> are available for Gentoo Linux, NetBSD, |
103 |
-and OpenBSD. If somebody sends me details for these I'll put them here. |
|
103 |
+and OpenBSD. If somebody sends details for these to the Tor developers, we'll |
|
104 |
+put them here. |
|
104 | 105 |
</p> |
105 | 106 |
|
106 | 107 |
<!-- |
... | ... |
@@ -123,7 +124,7 @@ href="http://archives.seul.org/or/announce/Dec-2004/msg00000.html">a |
123 | 124 |
win32 installer, better |
124 | 125 |
circuit building algorithms, bandwidth accounting and hibernation, |
125 | 126 |
more efficient directory fetching, and support for a separate Tor GUI |
126 |
-controller program (once somebody writes one for us)</a>. |
|
127 |
+controller program (once somebody writes one)</a>. |
|
127 | 128 |
</p> |
128 | 129 |
|
129 | 130 |
<p class="date">2004-10-14</p> |
... | ... |
@@ -56,7 +56,7 @@ alt="How Tor Works"></a> |
56 | 56 |
<h2>Tor: An anonymous Internet communication system</h2> |
57 | 57 |
|
58 | 58 |
<p> |
59 |
-Tor is a toolset for a wide range of organizations and people who want |
|
59 |
+Tor is a toolset for a wide range of organizations and people that want |
|
60 | 60 |
to improve their safety and security on the Internet. Using Tor can help |
61 | 61 |
you anonymize web browsing and publishing, instant messaging, IRC, SSH, |
62 | 62 |
and more. Tor also provides a platform on which software developers can |
... | ... |
@@ -65,9 +65,13 @@ features. |
65 | 65 |
</p> |
66 | 66 |
|
67 | 67 |
<p> |
68 |
-Your traffic is safer when you use Tor because communications |
|
69 |
-are bounced around a distributed network of servers called <a |
|
70 |
-href="howitworks.html">onion routers</a>—this makes it hard for |
|
68 |
+Your traffic is safer when you use Tor, because communications |
|
69 |
+are bounced around a distributed network of servers, called <a |
|
70 |
+href="overview.html">onion routers</a>. Instead of taking a direct |
|
71 |
+route from source to destination, data packets on the Tor network take a |
|
72 |
+random pathway through several servers that cover your tracks so no observer |
|
73 |
+at any single point can tell where the data came from or where it's going. |
|
74 |
+This makes it hard for |
|
71 | 75 |
recipients, observers, and even the onion routers themselves to figure |
72 | 76 |
out who and where you are. Tor's technology aims to provide Internet |
73 | 77 |
users with protection against "traffic analysis," a form of |
... | ... |
@@ -77,7 +81,7 @@ confidential business activities and relationships, and state security. |
77 | 81 |
|
78 | 82 |
<p> |
79 | 83 |
Traffic analysis is used every day by companies, governments, and |
80 |
-individuals who want to keep track of where people and organizations go |
|
84 |
+individuals that want to keep track of where people and organizations go |
|
81 | 85 |
and what they do on the Internet. Instead of looking at the content of |
82 | 86 |
your communications, traffic analysis tracks where your data goes and |
83 | 87 |
when, as well as how big it is. For example, |
... | ... |
@@ -85,7 +89,7 @@ online advertising company Doubleclick uses traffic analysis to record |
85 | 89 |
what web pages you've visited, and can build a profile of your interests |
86 | 90 |
from that. A pharmaceutical company could use traffic analysis to monitor |
87 | 91 |
when the research wing of a competitor visits its website, and track |
88 |
-what pages or products the competitor is interested in. IBM hosts a |
|
92 |
+what pages or products that interest the competitor. IBM hosts a |
|
89 | 93 |
searchable patent index, and it could keep a list of every query your |
90 | 94 |
company makes. A stalker could use traffic analysis to learn whether |
91 | 95 |
you're in a certain Internet cafe. |
92 | 96 |