Website tweaks from sjmurdoch; make spaces on the sides of mdash consistent.
Nick Mathewson

Nick Mathewson commited on 2007-10-24 19:16:06
Zeige 3 geänderte Dateien mit 12 Einfügungen und 10 Löschungen.

... ...
@@ -83,7 +83,9 @@ href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension.
83 83
 
84 84
 <li>Browser plugins such as Java, Flash, ActiveX, RealPlayer,
85 85
 Quicktime, Adobe's PDF plugin, and others can be manipulated
86
-into revealing your IP address. You should probably uninstall your plugins
86
+into revealing your IP address. You should probably
87
+<a href="http://plugindoc.mozdev.org/faqs/uninstall.html">uninstall your
88
+plugins</a>
87 89
 (go to "about:plugins" to see what is installed), or investigate <a
88 90
 href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a
89 91
 href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and
... ...
@@ -107,7 +109,7 @@ href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">i
107 109
 can't encrypt your traffic between the Tor network and its final
108 110
 destination.</a>
109 111
 If you are communicating sensitive information, you should use as much
110
-care as you would on the normal scary Internet &mdash; use SSL or other
112
+care as you would on the normal scary Internet &mdash; use HTTPS or other
111 113
 end-to-end encryption and authentication.
112 114
 </li>
113 115
 
... ...
@@ -49,7 +49,7 @@ users is important, and how Tor works.
49 49
 <p>
50 50
 (There are three pieces of fine print you need to know about.
51 51
 First, Tor does not protect you if you do not use it correctly.
52
-Read <a href="<page download>#Warnings">our list of warnings</a> and
52
+Read <a href="<page download>#Warning">our list of warnings</a> and
53 53
 make sure to follow the
54 54
 <a href="<page documentation>#RunningTor">instructions for your platform</a>
55 55
 carefully. Second, even if you configure and use Tor correctly,
... ...
@@ -20,8 +20,8 @@ great for users, but not so good for us, since publishing success
20 20
 stories about how people or organizations are staying anonymous could be
21 21
 counterproductive.
22 22
 As an example, we talked
23
-to an FBI officer who explained that he uses Tor every day for his work
24
-&mdash;but he quickly followed up
23
+to an FBI officer who explained that he uses Tor every day for his
24
+work &mdash; but he quickly followed up
25 25
 with a request not to provide details or mention his name.
26 26
 </p>
27 27
 
... ...
@@ -92,8 +92,8 @@ jailed or harmed journalists all over the world.</p>
92 92
 <li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
93 93
 
94 94
 <p>The US <a href="http://www.ibb.gov/">International Broadcasting
95
-Bureau</a> supports Tor development Internet users in countries
96
-that can't get
95
+Bureau</a> supports Tor development Internet to help users in countries
96
+where they can't get
97 97
 safe access to free media.  Tor not only protects freedom of expression,
98 98
 but preserves the ability of persons behind national firewalls or under
99 99
 the surveillance of repressive regimes to view information that gives
... ...
@@ -170,7 +170,7 @@ web site.</a></p>
170 170
 Africa reports that his nonprofit must budget 10% to cover various
171 171
 sorts of corruption, mostly bribes and such.  When that percentage
172 172
 rises steeply, not only can they not afford the money, but they can
173
-not afford to complain -- this is the point at which open objection can
173
+not afford to complain &mdash; this is the point at which open objection can
174 174
 become dangerous.  So his nonprofit has been working to use
175 175
 Tor to safely whistleblow on governmental corruption in order to continue
176 176
 their work more effectively and safely.</p>
... ...
@@ -256,8 +256,6 @@ of Command and Control servers.</p>
256 256
 
257 257
 <li>Hidden services</li>
258 258
 
259
-</ul>
260
-
261 259
 <p>When the Internet was designed by DARPA, its primary purpose was to
262 260
 be able to facilitate distributed, robust communications in case of
263 261
 local strikes.  However, some functions must be centralized, such as
... ...
@@ -266,6 +264,8 @@ reveal the geographic location of any server that is reachable online,
266 264
 however Tor's hidden services capacity allows military command and
267 265
 control to be physically secure from discovery and takedown.</p>
268 266
 
267
+</ul>
268
+
269 269
 <h2>Law enforcement officers use Tor</h2>
270 270
 
271 271
 <p>Undercover officers use Tor to conceal their IP address during
272 272