Don't put all sections with pictures on top on torusers page
Sebastian Hahn

Sebastian Hahn commited on 2015-03-14 13:38:27
Zeige 1 geänderte Dateien mit 28 Einfügungen und 28 Löschungen.

... ...
@@ -65,34 +65,6 @@
65 65
 <li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
66 66
     </ul>
67 67
 
68
-    <a name="military"></a>
69
-    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
70
-    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
71
-    <hr>
72
-    <ul>
73
-    
74
-    <li>
75
-    <strong>Field agents:</strong>
76
-    It is not difficult for insurgents to monitor Internet traffic and
77
-    discover all the hotels and other locations from which people are
78
-    connecting to known military servers.
79
-    Military field agents deployed away from home use Tor to
80
-    mask the sites they are visiting, protecting military interests and
81
-    operations, as well as protecting themselves from physical harm.
82
-    </li>
83
-    
84
-    <li><strong>Hidden services:</strong>
85
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
86
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
87
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
88
-    control to be physically secure from discovery and takedown.
89
-    </li>
90
-    <li><strong>Intelligence gathering:</strong>
91
-    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
92
-    to record a military address, thereby revealing the surveillance.
93
-    </li>
94
-    </ul>
95
-    
96 68
     <a name="journalist"></a>
97 69
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
98 70
     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
... ...
@@ -292,6 +264,34 @@
292 264
     <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
293 265
     </ul>
294 266
 
267
+    <a name="military"></a>
268
+    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
269
+    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
270
+    <hr>
271
+    <ul>
272
+
273
+    <li>
274
+    <strong>Field agents:</strong>
275
+    It is not difficult for insurgents to monitor Internet traffic and
276
+    discover all the hotels and other locations from which people are
277
+    connecting to known military servers.
278
+    Military field agents deployed away from home use Tor to
279
+    mask the sites they are visiting, protecting military interests and
280
+    operations, as well as protecting themselves from physical harm.
281
+    </li>
282
+
283
+    <li><strong>Hidden services:</strong>
284
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
285
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
286
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
287
+    control to be physically secure from discovery and takedown.
288
+    </li>
289
+    <li><strong>Intelligence gathering:</strong>
290
+    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
291
+    to record a military address, thereby revealing the surveillance.
292
+    </li>
293
+    </ul>
294
+
295 295
     <a name="itprofessionals"></a>
296 296
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
297 297
     <hr>
298 298