Add a sidebar, clean up the image spacing, make each topic linkable.
Andrew Lewman

Andrew Lewman commited on 2009-03-03 05:27:31
Zeige 1 geänderte Dateien mit 30 Einfügungen und 9 Löschungen.

... ...
@@ -6,7 +6,22 @@
6 6
 
7 7
 <div class="main-column">
8 8
 
9
-<h2>Tor: Overview</h2>
9
+<a name="overview"></a>
10
+<h2><a class="anchor" href="#overview">Tor: Overview</a></h2>
11
+<!-- BEGIN SIDEBAR -->
12
+<div class="sidebar-left">
13
+<h3>Topics</h3>
14
+<ul>
15
+<li><a href="<page overview>#overview">Overview</a></li>
16
+<li><a href="<page overview>#whyweneedtor">Why we need Tor</a></li>
17
+<li><a href="<page overview>#thesolution">The Solution</a></li>
18
+<li><a href="<page overview>#hiddenservices">Hidden services</a></li>
19
+<li><a href="<page overview>#stayinganonymous">Staying anonymous</a></li>
20
+<li><a href="<page overview>#thefutureoftor">The future of Tor</a></li>
21
+</ul>
22
+</div>
23
+<!-- END SIDEBAR -->
24
+
10 25
 <hr />
11 26
 
12 27
 <p>
... ...
@@ -68,7 +83,8 @@ so the more populous and diverse the user base for Tor is, the more your
68 83
 anonymity will be protected.
69 84
 </p>
70 85
 
71
-<h3>Why we need Tor</h3>
86
+<a name="whyweneedtor"></a>
87
+<h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
72 88
 
73 89
 <p>
74 90
 Using Tor protects you against a common form of Internet surveillance
... ...
@@ -113,7 +129,8 @@ these attackers, since it only hides the content of Internet traffic, not
113 129
 the headers.
114 130
 </p>
115 131
 
116
-<h3>The solution: a distributed, anonymous network</h3>
132
+<a name="thesolution"></a>
133
+<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
117 134
 
118 135
 <p>
119 136
 Tor helps to reduce the risks of both simple and sophisticated traffic
... ...
@@ -127,7 +144,7 @@ through several relays that cover your tracks so no observer at any
127 144
 single point can tell where the data came from or where it's going.
128 145
 </p>
129 146
 
130
-<img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" />
147
+<p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p>
131 148
 
132 149
 <p>
133 150
 To create a private network pathway with Tor, the user's software or
... ...
@@ -140,7 +157,7 @@ separate set of encryption keys for each hop along the circuit to ensure
140 157
 that each hop can't trace these connections as they pass through.
141 158
 </p>
142 159
 
143
-<img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" />
160
+<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p>
144 161
 
145 162
 <p>
146 163
 Once a circuit has been established, many kinds of data can be exchanged
... ...
@@ -159,9 +176,11 @@ new circuit, to keep people from linking your earlier actions to the new
159 176
 ones.
160 177
 </p>
161 178
 
162
-<img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" />
179
+<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p>
180
+
163 181
 
164
-<h3>Hidden services</h3>
182
+<a name="hiddenservices"></a>
183
+<h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
165 184
 
166 185
 <p>
167 186
 Tor also makes it possible for users to hide their locations while
... ...
@@ -177,7 +196,8 @@ hidden services</a> and how the <a href="<page hidden-services>">hidden
177 196
 service protocol</a> works.
178 197
 </p>
179 198
 
180
-<h3>Staying anonymous</h3>
199
+<a name="stayinganonymous"></a>
200
+<h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
181 201
 
182 202
 <p>
183 203
 Tor can't solve all anonymity problems.  It focuses only on
... ...
@@ -198,7 +218,8 @@ arriving at your chosen destination, he can use statistical analysis to
198 218
 discover that they are part of the same circuit.
199 219
 </p>
200 220
 
201
-<h3>The future of Tor</h3>
221
+<a name="thefutureoftor"></a>
222
+<h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
202 223
 
203 224
 <p>
204 225
 Providing a usable anonymizing network on the Internet today is an
205 226