minor changes to make po4a happy
Runa A. Sandvik

Runa A. Sandvik commited on 2010-11-21 22:00:05
Zeige 1 geänderte Dateien mit 45 Einfügungen und 11 Löschungen.

... ...
@@ -125,17 +125,51 @@
125 125
     <a id="Torisdifferent"></a>
126 126
     <h3><a class="anchor" href="#Torisdifferent">How is Tor different from other proxies?</a></h3>
127 127
     <p>
128
-    A typical proxy provider sets up a server somewhere on the Internet and allows you to use it to relay your traffic.  This creates a simple, easy to maintain architecture.  The users all enter and leave through the same server.  The provider may charge for use of the proxy, or fund their costs through advertisements on the server.  In the simplest configuration, you don't have to install anything.  You just have to point your browser at their proxy server.  Simple proxy providers are fine solutions if you do not want protections for your privacy and anonymity online and you trust the provider from doing bad things.  Some simple proxy providers use SSL to secure your connection to them.  This may protect you against local eavesdroppers, such as those at a cafe with free wifi Internet.
129
-    </p>
130
-    <p>
131
-    Simple proxy providers also create a single point of failure.  The provider knows who you are and where you browse on the Internet.  They can see your traffic as it passes through their server.  In some cases, they can see your encrypted traffic as they relay it to your banking site or to ecommerce stores.  You have to trust the provider isn't doing any number of things, such as watching your traffic, injecting their own advertisements into your traffic stream, and isn't recording your personal details.
132
-    </p>
133
-    <p>
134
-    Tor passes your traffic through at least 3 different servers before sending it on to the destination.  Tor does not modify, or even know, what you are sending into it.  It merely relays your traffic, completely encrypted through the Tor network and has it pop out somewhere else in the world, completely intact.  The Tor client is required because we assume you trust your local computer.  The Tor client manages the encryption and the path chosen through the network.  The relays located all over the world merely pass encrypted packets between themselves.</p>
128
+    A typical proxy provider sets up a server somewhere on the Internet and
129
+allows you to use it to relay your traffic.  This creates a simple, easy to
130
+maintain architecture.  The users all enter and leave through the same server.
131
+The provider may charge for use of the proxy, or fund their costs through
132
+advertisements on the server.  In the simplest configuration, you don't have to
133
+install anything.  You just have to point your browser at their proxy server.
134
+Simple proxy providers are fine solutions if you do not want protections for
135
+your privacy and anonymity online and you trust the provider from doing bad
136
+things.  Some simple proxy providers use SSL to secure your connection to them.
137
+This may protect you against local eavesdroppers, such as those at a cafe with
138
+free wifi Internet.
139
+    </p>
140
+    <p>
141
+    Simple proxy providers also create a single point of failure.  The provider
142
+knows who you are and where you browse on the Internet.  They can see your
143
+traffic as it passes through their server.  In some cases, they can see your
144
+encrypted traffic as they relay it to your banking site or to ecommerce stores.
145
+You have to trust the provider isn't doing any number of things, such as
146
+watching your traffic, injecting their own advertisements into your traffic
147
+stream, and isn't recording your personal details.
148
+    </p>
149
+    <p>
150
+    Tor passes your traffic through at least 3 different servers before sending
151
+it on to the destination.  Tor does not modify, or even know, what you are
152
+sending into it.  It merely relays your traffic, completely encrypted through
153
+the Tor network and has it pop out somewhere else in the world, completely
154
+intact.  The Tor client is required because we assume you trust your local
155
+computer.  The Tor client manages the encryption and the path chosen through
156
+the network.  The relays located all over the world merely pass encrypted
157
+packets between themselves.</p>
135 158
     <p>
136 159
     <dl>
137
-    <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of three servers can see encrypted Tor traffic coming from your computer.  It still doesn't know who you are and what you are doing over Tor.  It merely sees "This IP address is using Tor".  Tor is not illegal anywhere in the world, so using Tor by itself is fine.  You are still protected from this node figuring out who you are and where you are going on the Internet.</dd>
138
-    <dt>Can't the third server see my traffic?</dt><dd>Possibly.  A bad third of three servers can see the traffic you sent into Tor.  It won't know who sent this traffic.  If you're using encryption, such as visiting a bank or e-commerce website, or encrypted mail connections, etc, it will only know the destination.  It won't be able to see the data inside the traffic stream.  You are still protected from this node figuring out who you are and if using encryption, what data you're sending to the destination.</dd>
160
+    <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of
161
+three servers can see encrypted Tor traffic coming from your computer.  It
162
+still doesn't know who you are and what you are doing over Tor.  It merely sees
163
+"This IP address is using Tor".  Tor is not illegal anywhere in the world, so
164
+using Tor by itself is fine.  You are still protected from this node figuring
165
+out who you are and where you are going on the Internet.</dd>
166
+    <dt>Can't the third server see my traffic?</dt><dd>Possibly.  A bad third
167
+of three servers can see the traffic you sent into Tor.  It won't know who sent
168
+this traffic.  If you're using encryption, such as visiting a bank or
169
+e-commerce website, or encrypted mail connections, etc, it will only know the
170
+destination.  It won't be able to see the data inside the traffic stream.  You
171
+are still protected from this node figuring out who you are and if using
172
+encryption, what data you're sending to the destination.</dd>
139 173
     </dl>
140 174
     </p>
141 175
     
... ...
@@ -305,7 +339,7 @@
305 339
     <h3><a class="anchor" href="#SupportMail">How can I get an answer to my
306 340
     Tor support mail?</a></h3>
307 341
 
308
-    <p>There is no official support for Tor. Your best bet is to try the following:
342
+    <p>There is no official support for Tor. Your best bet is to try the following:</p>
309 343
     <ol>
310 344
     <li>Read through this <a href="<page docs/faq>">FAQ</a>.</li>
311 345
     <li>Read through the <a href="<page docs/documentation>">documentation</a>.</li>
... ...
@@ -758,7 +792,7 @@ traffic through Tor. Try the <a href="https://check.torproject.org/">Tor
758 792
 Check</a> site and see whether it thinks you are using Tor. See <a
759 793
 href="<wikifaq>#HowcanItellifTorisworkingandthatmyconnectionsreallyareanonymizedArethereexternalserversthatwilltestmyconnection">the
760 794
 Tor Check FAQ entry</a> for details.
761
-<p>
795
+</p>
762 796
 
763 797
 <p>
764 798
 If it thinks you're not using Tor, here are some hints:
765 799