Andrew Lewman commited on 2009-03-03 05:30:02
Zeige 1 geänderte Dateien mit 15 Einfügungen und 43 Löschungen.
... | ... |
@@ -16,7 +16,7 @@ |
16 | 16 |
<p> |
17 | 17 |
<p><a href="<page 30seconds>">What is Tor?</a></p> |
18 | 18 |
<p><a href="<page torusers>">Who uses Tor?</a></p> |
19 |
-<p><a href="<page overview>">How does Tor work in detail?</a></p> |
|
19 |
+<p><a href="<page overview>">Want more detail?</a></p> |
|
20 | 20 |
<hr /> |
21 | 21 |
<div class="downloadbutton"> |
22 | 22 |
<p><a href="<page easy-download>">Download Tor</a></p> |
... | ... |
@@ -29,65 +29,37 @@ |
29 | 29 |
|
30 | 30 |
<hr /> |
31 | 31 |
|
32 |
-<p>Tor is a software project that helps you defend against <a |
|
33 |
-href="<page overview>">traffic analysis</a>, a form of network |
|
32 |
+<p>Tor is free software and an open network that helps you defend against a form of network |
|
34 | 33 |
surveillance that threatens personal freedom and privacy, confidential |
35 |
-business activities and relationships, and state security. |
|
36 |
-Tor protects you by bouncing your communications around a distributed |
|
34 |
+business activities and relationships, and state security known as <a |
|
35 |
+href="<page overview>">traffic analysis</a>.</p> |
|
36 |
+<p>Tor protects you by bouncing your communications around a distributed |
|
37 | 37 |
network of relays run by volunteers all around the world: it prevents |
38 | 38 |
somebody watching your Internet connection from learning what sites you |
39 | 39 |
visit, and it prevents the sites you visit from learning your physical |
40 |
-location. |
|
41 |
-Tor works with many of your |
|
42 |
-existing applications, including web browsers, instant messaging |
|
43 |
-clients, remote login, and other applications based on the |
|
44 |
-TCP protocol. |
|
40 |
+location. Tor works with many of your existing applications, including web browsers, instant messaging |
|
41 |
+clients, remote login, and other applications based on the TCP protocol. |
|
45 | 42 |
</p> |
46 | 43 |
|
47 | 44 |
<p> Hundreds of thousands of people around the world use Tor for a |
48 |
-wide variety of reasons: journalists and |
|
49 |
-bloggers, human rights workers, law enforcement officers, soldiers, |
|
50 |
-corporations, citizens of repressive regimes, and just ordinary |
|
51 |
-citizens. See the <a href="<page torusers>">Who Uses Tor?</a> page for |
|
52 |
-examples of typical Tor users. |
|
53 |
-See the <a href="<page overview>">overview page</a> for a |
|
54 |
-more detailed explanation of what Tor does, why this diversity of |
|
55 |
-users is important, and how Tor works. |
|
45 |
+wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, |
|
46 |
+corporations, citizens of repressive regimes, and just ordinary citizens. See the <a href="<page torusers>">Who Uses Tor?</a> page for |
|
47 |
+examples of typical Tor users. See the <a href="<page overview>">overview page</a> for a |
|
48 |
+more detailed explanation of what Tor does, why this diversity of users is important, and how Tor works. |
|
56 | 49 |
</p> |
57 | 50 |
|
58 |
-<p> |
|
59 |
-There are three pieces of fine print you need to know about. |
|
60 |
-</p> |
|
61 |
-<ol> |
|
62 |
-<li>Tor does not protect you if you do not use it correctly. |
|
63 |
-Read <a href="<page download>#Warning">our list of warnings</a> and |
|
64 |
-make sure to follow the |
|
65 |
-<a href="<page documentation>#RunningTor">instructions for your platform</a> |
|
66 |
-carefully.</li> |
|
67 |
-<li> Even if you configure and use Tor correctly, there are still |
|
68 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks" |
|
69 |
-> |
|
70 |
-potential attacks that could compromise Tor's ability to protect |
|
71 |
-you</a>.</li> |
|
72 |
-<li>No anonymity system is perfect these days, and Tor is no exception: |
|
73 |
-you should not rely solely on the current Tor network if you really need |
|
74 |
-strong anonymity.</li> |
|
75 |
-</ol> |
|
76 |
- |
|
77 | 51 |
<p> |
78 | 52 |
Tor's security improves as its user |
79 | 53 |
base grows and as more people volunteer to |
80 | 54 |
<a href="<page docs/tor-doc-relay>">run relays</a>. (It isn't |
81 | 55 |
nearly as hard to set up as you might think, and can significantly |
82 | 56 |
<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity"> |
83 |
-enhance your own security against some attacks</a>.) |
|
57 |
+enhance your own security</a>.) |
|
84 | 58 |
If running a relay isn't for you, we need |
85 | 59 |
<a href="<page volunteer>">help with many other aspects of the project</a>, |
86 |
-and we need funds to <a |
|
87 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Funding">continue |
|
88 |
-making the Tor network faster and easier to use while maintaining good |
|
89 |
-security</a>. |
|
90 |
-<a href="<page donate>">Please donate.</a> |
|
60 |
+and we need funds to continue making the Tor network faster and easier to use while maintaining good |
|
61 |
+security</a>.</p> |
|
62 |
+<p>Tor is a registered 501(c)(3) non-profit whose mission is to allow you to protect your Internet traffic from analysis. Please make a <a href="<page donate>">tax-deductible donation.</a> |
|
91 | 63 |
</p> |
92 | 64 |
|
93 | 65 |
<a id="News"></a> |
94 | 66 |