Andrew Lewman commited on 2009-03-03 05:30:02
Zeige 1 geänderte Dateien mit 15 Einfügungen und 43 Löschungen.
| ... | ... |
@@ -16,7 +16,7 @@ |
| 16 | 16 |
<p> |
| 17 | 17 |
<p><a href="<page 30seconds>">What is Tor?</a></p> |
| 18 | 18 |
<p><a href="<page torusers>">Who uses Tor?</a></p> |
| 19 |
-<p><a href="<page overview>">How does Tor work in detail?</a></p> |
|
| 19 |
+<p><a href="<page overview>">Want more detail?</a></p> |
|
| 20 | 20 |
<hr /> |
| 21 | 21 |
<div class="downloadbutton"> |
| 22 | 22 |
<p><a href="<page easy-download>">Download Tor</a></p> |
| ... | ... |
@@ -29,65 +29,37 @@ |
| 29 | 29 |
|
| 30 | 30 |
<hr /> |
| 31 | 31 |
|
| 32 |
-<p>Tor is a software project that helps you defend against <a |
|
| 33 |
-href="<page overview>">traffic analysis</a>, a form of network |
|
| 32 |
+<p>Tor is free software and an open network that helps you defend against a form of network |
|
| 34 | 33 |
surveillance that threatens personal freedom and privacy, confidential |
| 35 |
-business activities and relationships, and state security. |
|
| 36 |
-Tor protects you by bouncing your communications around a distributed |
|
| 34 |
+business activities and relationships, and state security known as <a |
|
| 35 |
+href="<page overview>">traffic analysis</a>.</p> |
|
| 36 |
+<p>Tor protects you by bouncing your communications around a distributed |
|
| 37 | 37 |
network of relays run by volunteers all around the world: it prevents |
| 38 | 38 |
somebody watching your Internet connection from learning what sites you |
| 39 | 39 |
visit, and it prevents the sites you visit from learning your physical |
| 40 |
-location. |
|
| 41 |
-Tor works with many of your |
|
| 42 |
-existing applications, including web browsers, instant messaging |
|
| 43 |
-clients, remote login, and other applications based on the |
|
| 44 |
-TCP protocol. |
|
| 40 |
+location. Tor works with many of your existing applications, including web browsers, instant messaging |
|
| 41 |
+clients, remote login, and other applications based on the TCP protocol. |
|
| 45 | 42 |
</p> |
| 46 | 43 |
|
| 47 | 44 |
<p> Hundreds of thousands of people around the world use Tor for a |
| 48 |
-wide variety of reasons: journalists and |
|
| 49 |
-bloggers, human rights workers, law enforcement officers, soldiers, |
|
| 50 |
-corporations, citizens of repressive regimes, and just ordinary |
|
| 51 |
-citizens. See the <a href="<page torusers>">Who Uses Tor?</a> page for |
|
| 52 |
-examples of typical Tor users. |
|
| 53 |
-See the <a href="<page overview>">overview page</a> for a |
|
| 54 |
-more detailed explanation of what Tor does, why this diversity of |
|
| 55 |
-users is important, and how Tor works. |
|
| 45 |
+wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, |
|
| 46 |
+corporations, citizens of repressive regimes, and just ordinary citizens. See the <a href="<page torusers>">Who Uses Tor?</a> page for |
|
| 47 |
+examples of typical Tor users. See the <a href="<page overview>">overview page</a> for a |
|
| 48 |
+more detailed explanation of what Tor does, why this diversity of users is important, and how Tor works. |
|
| 56 | 49 |
</p> |
| 57 | 50 |
|
| 58 |
-<p> |
|
| 59 |
-There are three pieces of fine print you need to know about. |
|
| 60 |
-</p> |
|
| 61 |
-<ol> |
|
| 62 |
-<li>Tor does not protect you if you do not use it correctly. |
|
| 63 |
-Read <a href="<page download>#Warning">our list of warnings</a> and |
|
| 64 |
-make sure to follow the |
|
| 65 |
-<a href="<page documentation>#RunningTor">instructions for your platform</a> |
|
| 66 |
-carefully.</li> |
|
| 67 |
-<li> Even if you configure and use Tor correctly, there are still |
|
| 68 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks" |
|
| 69 |
-> |
|
| 70 |
-potential attacks that could compromise Tor's ability to protect |
|
| 71 |
-you</a>.</li> |
|
| 72 |
-<li>No anonymity system is perfect these days, and Tor is no exception: |
|
| 73 |
-you should not rely solely on the current Tor network if you really need |
|
| 74 |
-strong anonymity.</li> |
|
| 75 |
-</ol> |
|
| 76 |
- |
|
| 77 | 51 |
<p> |
| 78 | 52 |
Tor's security improves as its user |
| 79 | 53 |
base grows and as more people volunteer to |
| 80 | 54 |
<a href="<page docs/tor-doc-relay>">run relays</a>. (It isn't |
| 81 | 55 |
nearly as hard to set up as you might think, and can significantly |
| 82 | 56 |
<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity"> |
| 83 |
-enhance your own security against some attacks</a>.) |
|
| 57 |
+enhance your own security</a>.) |
|
| 84 | 58 |
If running a relay isn't for you, we need |
| 85 | 59 |
<a href="<page volunteer>">help with many other aspects of the project</a>, |
| 86 |
-and we need funds to <a |
|
| 87 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Funding">continue |
|
| 88 |
-making the Tor network faster and easier to use while maintaining good |
|
| 89 |
-security</a>. |
|
| 90 |
-<a href="<page donate>">Please donate.</a> |
|
| 60 |
+and we need funds to continue making the Tor network faster and easier to use while maintaining good |
|
| 61 |
+security</a>.</p> |
|
| 62 |
+<p>Tor is a registered 501(c)(3) non-profit whose mission is to allow you to protect your Internet traffic from analysis. Please make a <a href="<page donate>">tax-deductible donation.</a> |
|
| 91 | 63 |
</p> |
| 92 | 64 |
|
| 93 | 65 |
<a id="News"></a> |
| 94 | 66 |