website fixes suggested by donna
Roger Dingledine

Roger Dingledine commited on 2004-12-14 08:20:20
Zeige 3 geänderte Dateien mit 26 Einfügungen und 25 Löschungen.

... ...
@@ -23,7 +23,7 @@
23 23
   </div><!-- #side -->
24 24
   <div class="main" id="main">
25 25
 
26
-<h2>Tor: How It Works</h2>
26
+<h2>Tor: How it works</h2>
27 27
 
28 28
 <p>
29 29
 <a href="overview.html">Basic Tor Overview</a>: what Tor provides, why it
... ...
@@ -23,7 +23,7 @@
23 23
   </div><!-- #side -->
24 24
   <div class="main" id="main">
25 25
 
26
-<h2>Tor: an anonymous Internet communication system</h2>
26
+<h2>Tor: An anonymous Internet communication system</h2>
27 27
 
28 28
 <p>
29 29
 Tor is a toolset for a wide range of organizations and people who want
... ...
@@ -40,7 +40,7 @@ are bounced around a distributed network of servers called <a
40 40
 href="howitworks.html">onion routers</a> -- this makes it hard for
41 41
 recipients, observers, and even the onion routers themselves to figure
42 42
 out who and where you are. Tor's technology aims to provide Internet
43
-users with protection against <em>traffic analysis</em>, a form of
43
+users with protection against "traffic analysis," a form of
44 44
 network surveillance that threatens personal anonymity and privacy,
45 45
 confidential business activities and relationships, and state security.
46 46
 </p>
... ...
@@ -49,7 +49,8 @@ confidential business activities and relationships, and state security.
49 49
 Traffic analysis is used every day by companies, governments, and
50 50
 individuals who want to keep track of where people and organizations go
51 51
 and what they do on the Internet.  Instead of looking at the content of
52
-your communications, traffic analysis tracks where they go. For example,
52
+your communications, traffic analysis tracks where your data goes and
53
+when, as well as how big it is. For example,
53 54
 online advertising company Doubleclick uses traffic analysis to record
54 55
 what webpages you've visited, and can build a profile of your interests
55 56
 from that. A pharmaceutical company could use traffic analysis to monitor
... ...
@@ -50,7 +50,7 @@ Tor's development as a mechanism for maintaining civil liberties online.
50 50
 Corporations are investigating Tor as a safe way to conduct competitive
51 51
 analysis, and are considering using Tor to test new experimental projects
52 52
 without associating their names with these projects. A branch of the
53
-US Navy uses Tor for open source intelligence gathering, and one of its
53
+U.S. Navy uses Tor for open source intelligence gathering, and one of its
54 54
 teams used Tor while deployed in the Middle East recently.
55 55
 </p>
56 56
 
... ...
@@ -70,16 +70,16 @@ and destination of your Internet traffic allows others to track your
70 70
 behavior and interests.  This can impact your checkbook if, for example,
71 71
 an e-commerce site uses price discrimination based on your country or
72 72
 institution of origin.  It can even threaten your job and physical safety
73
-by revealing who and where you are. For example, someone travelling
74
-abroad who connects to their employer's computers to check or send mail
75
-or for other reasons will reveal her national origin and professional
76
-affiliation to any local observing the network even if the connection
73
+by revealing who and where you are. For example, if you're travelling
74
+abroad and you connect to your employer's computers to check or send mail,
75
+you can inadvertently reveal your national origin and professional
76
+affiliation to any local observing the network, even if the connection
77 77
 is encrypted.
78 78
 </p>
79 79
 
80 80
 <p>
81 81
 How does traffic analysis work?  Internet data packets have two parts:
82
-a data payload, and a header used for routing.  The data payload is
82
+a data payload and a header used for routing.  The data payload is
83 83
 whatever is being sent, whether that's an email message, a web page, or an
84 84
 audio file.  Even if you encrypt the data payload of your communications,
85 85
 traffic analysis still reveals a great deal about what you're doing and,
... ...
@@ -88,8 +88,8 @@ which discloses source, destination, size, timing, and so on.
88 88
 </p>
89 89
 
90 90
 <p>
91
-A basic problem, for the privacy minded, is that the recipient of your
92
-communications can see who sent them by looking at headers.  So can
91
+A basic problem for the privacy minded is that the recipient of your
92
+communications can see that you sent it by looking at headers.  So can
93 93
 authorized intermediaries like Internet service providers, and sometimes
94 94
 unauthorized intermediaries as well.  A very simple form of traffic
95 95
 analysis might involve sitting somewhere between sender and recipient on
... ...
@@ -168,16 +168,16 @@ the site, and nobody who offered the site would know who was posting to it.
168 168
 Of course, Tor can't solve all anonymity problems.  It focuses only on
169 169
 protecting the transport of data.  You need to use protocol-specific
170 170
 support software if you don't want the sites you visit to see your
171
-identifying information.  For example, web proxies such as Privoxy can
172
-be used while web browsing to block cookies and withhold information
171
+identifying information. For example, you can use web proxies such as
172
+Privoxy while web browsing to block cookies and withhold information
173 173
 about your browser type.
174 174
 </p>
175 175
 
176 176
 <p>
177 177
 Also, to protect your anonymity, be smart.  Don't provide your name
178
-or other revealing information in web forms.  Be aware that like all
178
+or other revealing information in web forms.  Be aware that, like all
179 179
 anonymizing networks that are fast enough for web browsing, Tor does not
180
-provide protection against end-to-end timing attacks: if your attacker
180
+provide protection against end-to-end timing attacks: If your attacker
181 181
 can watch the traffic coming out of your computer, and also the traffic
182 182
 arriving at your chosen destination, he can use statistical analysis to
183 183
 discover that they are part of the same circuit.
... ...
@@ -186,16 +186,16 @@ discover that they are part of the same circuit.
186 186
 <h3>The Future of Tor</h3>
187 187
 
188 188
 <p>
189
-Providing a usable anonymizing network on the Internet today is
190
-an ongoing challenge. We want software that meets users' needs.
191
-And we also want to keep the network up and running in a way that
192
-handles as many users as possible. Security and usability don't have
193
-to be at odds: as Tor's usability increases, it will attract more
194
-users, which will increase the possible sources and destinations
195
-of each communication, thus increasing security for everyone.
189
+Providing a usable anonymizing network on the Internet today is an
190
+ongoing challenge. We want software that meets users' needs. We also
191
+want to keep the network up and running in a way that handles as many
192
+users as possible. Security and usability don't have to be at odds:
193
+As Tor's usability increases, it will attract more users, which will
194
+increase the possible sources and destinations of each communication,
195
+thus increasing security for everyone.
196 196
 We're making progress, but we need your help.  Please consider
197
-<a href="cvs/tor/doc/tor-doc.html#installing">installing</a>
198
-a <a href="cvs/tor/doc/tor-doc.html#server">server</a>
197
+<a href="cvs/tor/doc/tor-doc.html#installing">installing</a> a <a
198
+href="cvs/tor/doc/tor-doc.html#server">server</a>
199 199
 or <a href="contribute.html">volunteering</a> as a <a
200 200
 href="developers.html">developer</a>.
201 201
 </p>
202 202