[or-cvs] try out some new frontpage text

Roger Dingledine arma at seul.org
Thu Dec 9 17:55:07 UTC 2004


Update of /home2/or/cvsroot/website
In directory moria.mit.edu:/home2/arma/work/onion/cvs/website

Modified Files:
	howitworks.html index.html 
Log Message:
try out some new frontpage text


Index: howitworks.html
===================================================================
RCS file: /home2/or/cvsroot/website/howitworks.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -d -r1.7 -r1.8
--- howitworks.html	9 Dec 2004 17:08:54 -0000	1.7
+++ howitworks.html	9 Dec 2004 17:55:04 -0000	1.8
@@ -25,7 +25,7 @@
 <h2>Tor: How It Works</h2>
 
 <p>
-<a href="overview.html">Basic Tor Overview</a>: what Tor does, why it
+<a href="overview.html">Basic Tor Overview</a>: what Tor provides, why it
 matters, how it works.
 </p>
 

Index: index.html
===================================================================
RCS file: /home2/or/cvsroot/website/index.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -d -r1.23 -r1.24
--- index.html	8 Dec 2004 19:27:19 -0000	1.23
+++ index.html	9 Dec 2004 17:55:04 -0000	1.24
@@ -26,36 +26,61 @@
 <h2>Tor: an anonymous Internet communication system</h2>
 
 <p>
-The right to speak anonymously is <a
-href="http://www.eff.org/Privacy/Anonymity/">protected by the First
-Amendment</a> in the United States and is crucial for safety, privacy,
-and free expression on the global Internet. People who need anonymity
-online range from whistleblowers and political dissidents to people
-giving tips to the police and kids who are exploring online.
+Tor is a toolset for a wide range of organizations and people who want
+to improve their safety and security on the Internet. Using Tor can help
+you anonymize web browsing and publishing, instant messaging, IRC, SSH,
+and more. Tor also provides a platform on which software developers can
+build new applications with built-in anonymity, safety, and privacy
+features.
 </p>
 
 <p>
-Tor helps these people by allowing them to communicate anonymously on the
-Internet. It can anonymize web browsing, instant messaging, IRC, SSH, and
-more. Your identity is hidden because communications are bounced around
-a distributed network of servers called <a href="howitworks.html">onion
-routers</a> -- this system makes it hard for recipients, observers,
-and even the onion routers themselves to track the source of the stream.
+Your traffic is safer when you use Tor because communications
+are bounced around a distributed network of servers called <a
+href="howitworks.html">onion routers</a> -- this makes it hard for
+recipients, observers, and even the onion routers themselves to figure
+out who and where you are. Tor's technology aims to provide Internet
+users with protection against <em>traffic analysis</em>, a form of
+network surveillance that threatens personal anonymity and privacy,
+confidential business activities and relationships, and state security.
 </p>
 
 <p>
-Tor development is now supported by a grant from
-the <a href="http://www.eff.org/">Electronic Frontier
-Foundation</a>. The more people use Tor and volunteer to
-run servers, the better this service will be. Please consider <a
-href="cvs/tor/doc/tor-doc.html#installing">installing
-it</a> and then <a
-href="cvs/tor/doc/tor-doc.html#server">helping
-out</a>. You can also <a href="documentation.html">learn more about Tor here</a>.
+Traffic analysis is used every day by companies, governments, and
+individuals who want to keep track of where people and organizations go
+and what they do on the Internet.  Instead of looking at the content of
+your communications, traffic analysis tracks where they go. For example,
+online advertising company Doubleclick uses traffic analysis to record
+what webpages you've visited, and can build a profile of your interests
+from that. A pharmaceutical company could use traffic analysis to monitor
+when the research wing of a competitor visits its website, and track
+what pages or products the competitor is interested in. IBM hosts a
+searchable patent index, and it could keep a list of every query your
+company makes. A stalker could use traffic analysis to learn whether
+you're in a certain Internet cafe.
 </p>
 
 <p>
-Remember that this is development code -- it's not a good idea to rely
+Tor aims to make traffic analysis more difficult by preventing
+eavesdroppers from finding out where your communications are going
+online, and by letting you decide whether to identify yourself when
+you communicate.
+</p>
+
+<p>
+Currently, Tor development is supported by the <a
+href="http://www.eff.org/">Electronic Frontier Foundation</a>.
+Tor's security is improved as its user base grows and as
+more people volunteer to run servers.  Please consider <a
+href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then
+<a href="cvs/tor/doc/tor-doc.html#server">helping out</a>. You can also
+<a href="documentation.html">learn more about Tor here</a>.
+</p>
+
+<p>
+Tor is an important piece of building more safety, privacy, and anonymity
+online, but it is not a complete solution.
+And remember that this is development code; it's not a good idea to rely
 on the current Tor network if you really need strong anonymity.
 </p>
 



More information about the tor-commits mailing list