[or-cvs] Apply strunk&white, clarify a few points, convert em dashes.

Nick Mathewson nickm at seul.org
Tue Dec 21 04:48:58 UTC 2004


Update of /home/or/cvsroot/website
In directory moria.mit.edu:/tmp/cvs-serv32614

Modified Files:
	contribute.html download.html index.html overview.html 
	people.html 
Log Message:
Apply strunk&white, clarify a few points, convert em dashes.

Index: contribute.html
===================================================================
RCS file: /home/or/cvsroot/website/contribute.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -d -r1.16 -r1.17
--- contribute.html	20 Dec 2004 04:56:16 -0000	1.16
+++ contribute.html	21 Dec 2004 04:48:55 -0000	1.17
@@ -78,7 +78,7 @@
 </ul>
 </p>
 
-<p>People who want to donate to Tor:
+<p>Donors:
 <ul>
 <li>Go take a look at the <a href="http://www.eff.org/">Electronic
 Frontier Foundation</a>. More EFF donations means more Tor development.</li>

Index: download.html
===================================================================
RCS file: /home/or/cvsroot/website/download.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -d -r1.39 -r1.40
--- download.html	19 Dec 2004 23:35:01 -0000	1.39
+++ download.html	21 Dec 2004 04:48:55 -0000	1.40
@@ -31,10 +31,10 @@
 and more.
 <ul>
 <!--
-<li>Latest experimental: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a>
+<li>Latest experimental source: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a>
 (<a href="dist/tor-0.0.9.tar.gz.asc">sig</a>)</li>
 -->
-<li>Latest stable: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a>
+<li>Latest stable source: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a>
 (<a href="dist/tor-0.0.9.1.tar.gz.asc">sig</a>)</li>
 <li>Win32 installer (experimental):
 <a href="dist/win32/tor-0.0.9.1-win32.exe">0.0.9.1</a> (<a
@@ -48,7 +48,7 @@
 </p>
 
 <p>See the <a href="developers.html">developers page</a> for instructions
-on fetching Tor CVS.
+on fetching Tor from CVS.
 </p>
 
 <p>

Index: index.html
===================================================================
RCS file: /home/or/cvsroot/website/index.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -d -r1.35 -r1.36
--- index.html	21 Dec 2004 04:22:44 -0000	1.35
+++ index.html	21 Dec 2004 04:48:55 -0000	1.36
@@ -66,7 +66,7 @@
 <p>
 Your traffic is safer when you use Tor because communications
 are bounced around a distributed network of servers called <a
-href="howitworks.html">onion routers</a> -- this makes it hard for
+href="howitworks.html">onion routers</a>&mdash;this makes it hard for
 recipients, observers, and even the onion routers themselves to figure
 out who and where you are. Tor's technology aims to provide Internet
 users with protection against "traffic analysis," a form of
@@ -108,7 +108,7 @@
 <p>
 Tor is an important piece of building more safety, privacy, and anonymity
 online, but it is not a complete solution.
-And remember that this is development code -- it's not a good idea to rely
+And remember that this is development code&mdash;it's not a good idea to rely
 on the current Tor network if you really need strong anonymity.
 </p>
 

Index: overview.html
===================================================================
RCS file: /home/or/cvsroot/website/overview.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -d -r1.19 -r1.20
--- overview.html	19 Dec 2004 23:35:01 -0000	1.19
+++ overview.html	21 Dec 2004 04:48:55 -0000	1.20
@@ -29,16 +29,17 @@
 <p>
 Tor is a network-within-a-network that allows people and groups to
 improve their privacy and security on the Internet.  It also enables
-future software developers to create new kinds of communication tools
-that have built-in privacy features.  Tor can provide the foundation for
-a whole range of applications that allow organizations and individuals
+software developers to create new communication tools
+with built-in privacy features.  Tor provides the foundation for
+a range of applications that allow organizations and individuals
 to share information over public networks without compromising their
 privacy.
 </p>
 
 <p>
-Individuals can use Tor to shield themselves and their family members
-from being tracked by remote websites.  They can also use it to connect
+Individuals can use Tor to keep remote websites from tracking them and their
+family members.
+They can also use it to connect
 to resources such as news sites or instant messaging services that are
 blocked by their local Internet service providers (ISPs).
 </p>
@@ -57,7 +58,8 @@
 
 <p>
 The variety of people who use Tor is actually part of what makes it
-so secure.  The more populous and diverse the user base for Tor is,
+so secure.  Tor hides you among the other users on the network, so the more
+populous and diverse the user base for Tor is,
 the more your anonymity will be protected.
 </p>
 
@@ -74,7 +76,7 @@
 by revealing who and where you are. For example, if you're travelling
 abroad and you connect to your employer's computers to check or send mail,
 you can inadvertently reveal your national origin and professional
-affiliation to any local observing the network, even if the connection
+affiliation to anyone observing the network, even if the connection
 is encrypted.
 </p>
 
@@ -101,7 +103,9 @@
 But there are also more powerful kinds of traffic analysis.  Some
 attackers spy on multiple parts of the Internet and use sophisticated
 statistical techniques to track the communications patterns of many
-different organizations and individuals.
+different organizations and individuals.  Encryption does not help against
+these attackers, since it only hides the content of Internet traffic, not
+the headers.
 </p>
 
 <h3>The solution: a distributed, anonymous network</h3>
@@ -111,7 +115,7 @@
 analysis by distributing your transactions over several places on the
 Internet, so no single point can link you to your destination.  The idea
 is similar to using a twisty, hard-to-follow route in order to throw off
-somebody who is tailing you -- and then periodically erasing your
+somebody who is tailing you&mdash;and then periodically erasing your
 footprints.  Instead of taking a direct route from source to
 destination, data packets on the Tor network take a random pathway
 through several servers that cover your tracks so no observer at any
@@ -126,10 +130,10 @@
 client incrementally builds a circuit of encrypted connections through
 servers on the network.  The circuit is extended one hop at a time, and
 each server along the way knows only which server gave it data and which
-server it is giving data to.  No individual server will ever know the
+server it is giving data to.  No individual server ever knows the
 complete path that a data packet has taken.  The client negotiates a
 separate set of encryption keys for each hop along the circuit to ensure
-that each hop can't see what these connections are as they pass through.
+that each hop can't trace these connections as they pass through.
 </p>
 
 <img alt="tor circuit step three" src="img/htw3.png" />
@@ -169,7 +173,7 @@
 <h3>Staying anonymous</h3>
 
 <p>
-Of course, Tor can't solve all anonymity problems.  It focuses only on
+Tor can't solve all anonymity problems.  It focuses only on
 protecting the transport of data.  You need to use protocol-specific
 support software if you don't want the sites you visit to see your
 identifying information. For example, you can use web proxies such as

Index: people.html
===================================================================
RCS file: /home/or/cvsroot/website/people.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -d -r1.9 -r1.10
--- people.html	19 Dec 2004 23:35:01 -0000	1.9
+++ people.html	21 Dec 2004 04:48:55 -0000	1.10
@@ -27,7 +27,7 @@
 <h2>Tor: People</h2>
 
 <p>Tor is managed by <a href="http://freehaven.net/">The Free
-Haven Project</a> as one of the building blocks necessary for
+Haven Project</a> as a building block for
 a robust censorship-resistant data haven. It is developed by <a
 href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a
 href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from
@@ -39,7 +39,7 @@
 original <a href="http://www.onion-router.net/">onion routing</a> idea
 developed there.</p>
 
-<p>As of November 2004, Tor development is now supported by the <a
+<p>Since November 2004, Tor development has been supported by the <a
 href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p>
 
   </div><!-- #main -->



More information about the tor-commits mailing list