put some technical gibberish back on the frontpage rather than the mixed metaphors
Roger Dingledine

Roger Dingledine commited on 2007-10-23 02:58:57
Zeige 1 geänderte Dateien mit 4 Einfügungen und 15 Löschungen.

... ...
@@ -25,21 +25,10 @@
25 25
 <hr />
26 26
 
27 27
 <p>
28
-Tor covers your tracks on the web. When you connect to the Internet from
29
-your computer, you leave a return address that's like a calling card,
30
-everywhere you go. Even if you don't log into a site with a username and
31
-password, you leave information on what IP address you came from and when.
32
-</p>
33
-
34
-<p>
35
-Since this is all the information that is usually needed to find out
36
-who was on the other end of the wire, marketers, governments, and other
37
-curious parties can trace you by tracing the activity associated with
38
-your IP address.
39
-</p>
40
-
41
-<p>
42
-Tor hides your IP address. It's like blocking your caller ID.
28
+Tor aims to defend against <a href="<page overview>">traffic analysis</a>,
29
+a form of network surveillance that threatens personal anonymity and
30
+privacy, confidential business activities and relationships, and state
31
+security.
43 32
 </p>
44 33
 
45 34
 <p>
46 35