streamline the frontpage
Roger Dingledine

Roger Dingledine commited on 2006-02-14 20:20:28
Zeige 1 geänderte Dateien mit 10 Einfügungen und 15 Löschungen.

... ...
@@ -36,29 +36,24 @@ built-in anonymity, safety, and privacy features.
36 36
 </p>
37 37
 
38 38
 <p>
39
-Your traffic is safer when you use Tor, because communications
40
-are bounced around a distributed network of servers, called
41
-<a href="<page overview>">onion routers</a>.
42
-Tor's technology aims to provide Internet users with protection against
43
-"traffic analysis," a form of network surveillance that threatens personal
39
+Tor defends against <a href="<page overview>">traffic analysis</a>,
40
+a form of network surveillance that threatens personal
44 41
 anonymity and privacy, confidential business activities and relationships,
45 42
 and state security.
46
-</p>
47
-
48
-<p>
49
-Instead of looking at the content of your communications, traffic analysis
50
-tracks where your data goes and when, as well as how much is sent.
51
-Tor aims to make traffic analysis more difficult by preventing websites,
52
-eavesdroppers, and even the onion routers themselves from tracing your
53
-communications online. This means Tor lets you decide whether to identify
54
-yourself when you communicate.
43
+Communications are bounced around a distributed network of servers called
44
+onion routers, <a
45
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#WhatProtections">protecting you</a>
46
+from websites that build profiles of your interests,
47
+local eavesdroppers that read your data or learn what sites you visit,
48
+and even the onion routers themselves</a>.
55 49
 </p>
56 50
 
57 51
 <p>
58 52
 Tor's security is improved as its user base grows and as
59 53
 more people volunteer to run servers.  Please consider
60 54
 <a href="<page volunteer>">volunteering your time</a> or
61
-<a href="<cvssandbox>tor/doc/tor-doc-server.html">volunteering your bandwidth</a>.
55
+<a href="<cvssandbox>tor/doc/tor-doc-server.html">volunteering your
56
+bandwidth</a>.
62 57
 And remember that this is development code&mdash;it's not a good idea to rely
63 58
 on the current Tor network if you really need strong anonymity.
64 59
 </p>
65 60