[or-cvs] website fixes suggested by donna

Roger Dingledine arma at seul.org
Tue Dec 14 07:20:22 UTC 2004


Update of /home2/or/cvsroot/website
In directory moria.mit.edu:/home2/arma/work/onion/cvs/website

Modified Files:
	howitworks.html index.html overview.html 
Log Message:
website fixes suggested by donna


Index: howitworks.html
===================================================================
RCS file: /home2/or/cvsroot/website/howitworks.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -d -r1.9 -r1.10
--- howitworks.html	9 Dec 2004 21:33:03 -0000	1.9
+++ howitworks.html	14 Dec 2004 07:20:20 -0000	1.10
@@ -23,7 +23,7 @@
   </div><!-- #side -->
   <div class="main" id="main">
 
-<h2>Tor: How It Works</h2>
+<h2>Tor: How it works</h2>
 
 <p>
 <a href="overview.html">Basic Tor Overview</a>: what Tor provides, why it

Index: index.html
===================================================================
RCS file: /home2/or/cvsroot/website/index.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -d -r1.28 -r1.29
--- index.html	13 Dec 2004 03:56:29 -0000	1.28
+++ index.html	14 Dec 2004 07:20:20 -0000	1.29
@@ -23,7 +23,7 @@
   </div><!-- #side -->
   <div class="main" id="main">
 
-<h2>Tor: an anonymous Internet communication system</h2>
+<h2>Tor: An anonymous Internet communication system</h2>
 
 <p>
 Tor is a toolset for a wide range of organizations and people who want
@@ -40,7 +40,7 @@
 href="howitworks.html">onion routers</a> -- this makes it hard for
 recipients, observers, and even the onion routers themselves to figure
 out who and where you are. Tor's technology aims to provide Internet
-users with protection against <em>traffic analysis</em>, a form of
+users with protection against "traffic analysis," a form of
 network surveillance that threatens personal anonymity and privacy,
 confidential business activities and relationships, and state security.
 </p>
@@ -49,7 +49,8 @@
 Traffic analysis is used every day by companies, governments, and
 individuals who want to keep track of where people and organizations go
 and what they do on the Internet.  Instead of looking at the content of
-your communications, traffic analysis tracks where they go. For example,
+your communications, traffic analysis tracks where your data goes and
+when, as well as how big it is. For example,
 online advertising company Doubleclick uses traffic analysis to record
 what webpages you've visited, and can build a profile of your interests
 from that. A pharmaceutical company could use traffic analysis to monitor

Index: overview.html
===================================================================
RCS file: /home2/or/cvsroot/website/overview.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -d -r1.14 -r1.15
--- overview.html	13 Dec 2004 19:16:23 -0000	1.14
+++ overview.html	14 Dec 2004 07:20:20 -0000	1.15
@@ -50,7 +50,7 @@
 Corporations are investigating Tor as a safe way to conduct competitive
 analysis, and are considering using Tor to test new experimental projects
 without associating their names with these projects. A branch of the
-US Navy uses Tor for open source intelligence gathering, and one of its
+U.S. Navy uses Tor for open source intelligence gathering, and one of its
 teams used Tor while deployed in the Middle East recently.
 </p>
 
@@ -70,16 +70,16 @@
 behavior and interests.  This can impact your checkbook if, for example,
 an e-commerce site uses price discrimination based on your country or
 institution of origin.  It can even threaten your job and physical safety
-by revealing who and where you are. For example, someone travelling
-abroad who connects to their employer's computers to check or send mail
-or for other reasons will reveal her national origin and professional
-affiliation to any local observing the network even if the connection
+by revealing who and where you are. For example, if you're travelling
+abroad and you connect to your employer's computers to check or send mail,
+you can inadvertently reveal your national origin and professional
+affiliation to any local observing the network, even if the connection
 is encrypted.
 </p>
 
 <p>
 How does traffic analysis work?  Internet data packets have two parts:
-a data payload, and a header used for routing.  The data payload is
+a data payload and a header used for routing.  The data payload is
 whatever is being sent, whether that's an email message, a web page, or an
 audio file.  Even if you encrypt the data payload of your communications,
 traffic analysis still reveals a great deal about what you're doing and,
@@ -88,8 +88,8 @@
 </p>
 
 <p>
-A basic problem, for the privacy minded, is that the recipient of your
-communications can see who sent them by looking at headers.  So can
+A basic problem for the privacy minded is that the recipient of your
+communications can see that you sent it by looking at headers.  So can
 authorized intermediaries like Internet service providers, and sometimes
 unauthorized intermediaries as well.  A very simple form of traffic
 analysis might involve sitting somewhere between sender and recipient on
@@ -168,16 +168,16 @@
 Of course, Tor can't solve all anonymity problems.  It focuses only on
 protecting the transport of data.  You need to use protocol-specific
 support software if you don't want the sites you visit to see your
-identifying information.  For example, web proxies such as Privoxy can
-be used while web browsing to block cookies and withhold information
+identifying information. For example, you can use web proxies such as
+Privoxy while web browsing to block cookies and withhold information
 about your browser type.
 </p>
 
 <p>
 Also, to protect your anonymity, be smart.  Don't provide your name
-or other revealing information in web forms.  Be aware that like all
+or other revealing information in web forms.  Be aware that, like all
 anonymizing networks that are fast enough for web browsing, Tor does not
-provide protection against end-to-end timing attacks: if your attacker
+provide protection against end-to-end timing attacks: If your attacker
 can watch the traffic coming out of your computer, and also the traffic
 arriving at your chosen destination, he can use statistical analysis to
 discover that they are part of the same circuit.
@@ -186,16 +186,16 @@
 <h3>The Future of Tor</h3>
 
 <p>
-Providing a usable anonymizing network on the Internet today is
-an ongoing challenge. We want software that meets users' needs.
-And we also want to keep the network up and running in a way that
-handles as many users as possible. Security and usability don't have
-to be at odds: as Tor's usability increases, it will attract more
-users, which will increase the possible sources and destinations
-of each communication, thus increasing security for everyone.
+Providing a usable anonymizing network on the Internet today is an
+ongoing challenge. We want software that meets users' needs. We also
+want to keep the network up and running in a way that handles as many
+users as possible. Security and usability don't have to be at odds:
+As Tor's usability increases, it will attract more users, which will
+increase the possible sources and destinations of each communication,
+thus increasing security for everyone.
 We're making progress, but we need your help.  Please consider
-<a href="cvs/tor/doc/tor-doc.html#installing">installing</a>
-a <a href="cvs/tor/doc/tor-doc.html#server">server</a>
+<a href="cvs/tor/doc/tor-doc.html#installing">installing</a> a <a
+href="cvs/tor/doc/tor-doc.html#server">server</a>
 or <a href="contribute.html">volunteering</a> as a <a
 href="developers.html">developer</a>.
 </p>



More information about the tor-commits mailing list