Browse code

Don't put all sections with pictures on top on torusers page

Sebastian Hahn authored on 14/03/2015 13:36:45
Showing 1 changed files
... ...
@@ -29,7 +29,7 @@
29 29
     href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
30 30
     Tor stories</a>! What do you use Tor for? Why do you need it? What
31 31
     has Tor done for you? We need your stories.</p>
32
-    
32
+
33 33
     <a name="normalusers"></a>
34 34
     <img src="$(IMGROOT)/family.jpg" alt="Normal People">
35 35
     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
... ...
@@ -64,35 +64,7 @@
64 64
 </li>
65 65
 <li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
66 66
     </ul>
67
-    
68
-    <a name="military"></a>
69
-    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
70
-    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
71
-    <hr>
72
-    <ul>
73
-    
74
-    <li>
75
-    <strong>Field agents:</strong>
76
-    It is not difficult for insurgents to monitor Internet traffic and
77
-    discover all the hotels and other locations from which people are
78
-    connecting to known military servers.
79
-    Military field agents deployed away from home use Tor to
80
-    mask the sites they are visiting, protecting military interests and
81
-    operations, as well as protecting themselves from physical harm.
82
-    </li>
83
-    
84
-    <li><strong>Hidden services:</strong>
85
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
86
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
87
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
88
-    control to be physically secure from discovery and takedown.
89
-    </li>
90
-    <li><strong>Intelligence gathering:</strong>
91
-    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
92
-    to record a military address, thereby revealing the surveillance.
93
-    </li>
94
-    </ul>
95
-    
67
+
96 68
     <a name="journalist"></a>
97 69
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
98 70
     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
... ...
@@ -118,7 +90,7 @@
118 90
     avoid risking the personal consequences of intellectual curiosity.
119 91
     </li>
120 92
     </ul>
121
-    
93
+
122 94
     <a name="lawenforcement"></a>
123 95
     <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
124 96
     <hr>
... ...
@@ -144,7 +116,7 @@
144 116
     do not encourage anonymity are limiting the sources of their tips.
145 117
     </li>
146 118
     </ul>
147
-    
119
+
148 120
     <a name="activists"></a>
149 121
     <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers">
150 122
     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
... ...
@@ -212,7 +184,7 @@
212 184
     to help organize a strike.
213 185
     </li>
214 186
     </ul>
215
-    
187
+
216 188
     <a name="spotlight"></a>
217 189
     <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
218 190
     <hr>
... ...
@@ -241,7 +213,7 @@
241 213
     this continuing into the future.
242 214
     </li>
243 215
     </ul>
244
-    
216
+
245 217
     <a name="executives"></a>
246 218
     <img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
247 219
     <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
... ...
@@ -279,7 +251,7 @@
279 251
     into whistleblowing.
280 252
     </li>
281 253
     </ul>
282
-    
254
+
283 255
     <a name="bloggers"></a>
284 256
     <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
285 257
     <hr>
... ...
@@ -291,7 +263,35 @@
291 263
     <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
292 264
     <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
293 265
     </ul>
294
-    
266
+
267
+    <a name="military"></a>
268
+    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
269
+    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
270
+    <hr>
271
+    <ul>
272
+
273
+    <li>
274
+    <strong>Field agents:</strong>
275
+    It is not difficult for insurgents to monitor Internet traffic and
276
+    discover all the hotels and other locations from which people are
277
+    connecting to known military servers.
278
+    Military field agents deployed away from home use Tor to
279
+    mask the sites they are visiting, protecting military interests and
280
+    operations, as well as protecting themselves from physical harm.
281
+    </li>
282
+
283
+    <li><strong>Hidden services:</strong>
284
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
285
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
286
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
287
+    control to be physically secure from discovery and takedown.
288
+    </li>
289
+    <li><strong>Intelligence gathering:</strong>
290
+    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
291
+    to record a military address, thereby revealing the surveillance.
292
+    </li>
293
+    </ul>
294
+
295 295
     <a name="itprofessionals"></a>
296 296
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
297 297
     <hr>
... ...
@@ -302,7 +302,7 @@
302 302
     <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
303 303
     <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
304 304
     </ul>
305
-    
305
+
306 306
     <p>
307 307
     Please do send us your success stories. They are very important because
308 308
     Tor provides anonymity. While it is thrilling to speculate about <a
... ...
@@ -312,7 +312,7 @@
312 312
     counterproductive.  For example, we talked to an FBI officer who
313 313
     explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
314 314
     details or mention his name.</p>
315
-    
315
+
316 316
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
317 317
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
318 318
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a