Author: arma Date: 2011-02-22 20:08:33 +0000 (Tue, 22 Feb 2011) New Revision: 24254
Modified: website/trunk/about/en/overview.wml Log: karen noticed we were duplicating the first "how tor works" picture on our overview page.
Modified: website/trunk/about/en/overview.wml =================================================================== --- website/trunk/about/en/overview.wml 2011-02-22 03:30:33 UTC (rev 24253) +++ website/trunk/about/en/overview.wml 2011-02-22 20:08:33 UTC (rev 24254) @@ -148,8 +148,6 @@ single point can tell where the data came from or where it's going. </p>
- <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png"></p> - <p> To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through