commit b563db366d1275550166f8bf46b099ac5d83c10b Author: Sebastian Hahn sebastian@torproject.org Date: Sat Mar 14 13:36:45 2015 +0100
Don't put all sections with pictures on top on torusers page --- about/en/torusers.wml | 76 ++++++++++++++++++++++++------------------------- 1 file changed, 38 insertions(+), 38 deletions(-)
diff --git a/about/en/torusers.wml b/about/en/torusers.wml index 24516c7..2ec4f2e 100644 --- a/about/en/torusers.wml +++ b/about/en/torusers.wml @@ -29,7 +29,7 @@ href="https://blog.torproject.org/blog/we-need-your-good-tor-stories%22%3Egood Tor stories</a>! What do you use Tor for? Why do you need it? What has Tor done for you? We need your stories.</p> - + <a name="normalusers"></a> <img src="$(IMGROOT)/family.jpg" alt="Normal People"> <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2> @@ -64,35 +64,7 @@ </li> <li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li> </ul> - - <a name="military"></a> - <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> - <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> - <hr> - <ul> - - <li> - <strong>Field agents:</strong> - It is not difficult for insurgents to monitor Internet traffic and - discover all the hotels and other locations from which people are - connecting to known military servers. - Military field agents deployed away from home use Tor to - mask the sites they are visiting, protecting military interests and - operations, as well as protecting themselves from physical harm. - </li> - - <li><strong>Hidden services:</strong> - When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of - local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to - reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and - control to be physically secure from discovery and takedown. - </li> - <li><strong>Intelligence gathering:</strong> - Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website - to record a military address, thereby revealing the surveillance. - </li> - </ul> - + <a name="journalist"></a> <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media"> <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> @@ -118,7 +90,7 @@ avoid risking the personal consequences of intellectual curiosity. </li> </ul> - + <a name="lawenforcement"></a> <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2> <hr> @@ -144,7 +116,7 @@ do not encourage anonymity are limiting the sources of their tips. </li> </ul> - + <a name="activists"></a> <img src="$(IMGROOT)/activists.jpg" alt="Activists & Whistleblowers"> <h2><a class="anchor" href="#activists">Activists & Whistleblowers use Tor</a></h2> @@ -212,7 +184,7 @@ to help organize a strike. </li> </ul> - + <a name="spotlight"></a> <h2><a class="anchor" href="#spotlight">High & low profile people use Tor</a></h2> <hr> @@ -241,7 +213,7 @@ this continuing into the future. </li> </ul> - + <a name="executives"></a> <img src="$(IMGROOT)/consumers.jpg" alt="Businesses"> <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2> @@ -279,7 +251,7 @@ into whistleblowing. </li> </ul> - + <a name="bloggers"></a> <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2> <hr> @@ -291,7 +263,35 @@ <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li> <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li> </ul> - + + <a name="military"></a> + <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> + <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> + <hr> + <ul> + + <li> + <strong>Field agents:</strong> + It is not difficult for insurgents to monitor Internet traffic and + discover all the hotels and other locations from which people are + connecting to known military servers. + Military field agents deployed away from home use Tor to + mask the sites they are visiting, protecting military interests and + operations, as well as protecting themselves from physical harm. + </li> + + <li><strong>Hidden services:</strong> + When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of + local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to + reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and + control to be physically secure from discovery and takedown. + </li> + <li><strong>Intelligence gathering:</strong> + Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website + to record a military address, thereby revealing the surveillance. + </li> + </ul> + <a name="itprofessionals"></a> <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2> <hr> @@ -302,7 +302,7 @@ <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li> <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li> </ul> - + <p> Please do send us your success stories. They are very important because Tor provides anonymity. While it is thrilling to speculate about <a @@ -312,7 +312,7 @@ counterproductive. For example, we talked to an FBI officer who explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide details or mention his name.</p> - + <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
tor-commits@lists.torproject.org