[or-cvs] cut out much of the front page material.

arma at seul.org arma at seul.org
Fri Oct 21 22:17:54 UTC 2005


Update of /home2/or/cvsroot/website/en
In directory moria:/home/arma/work/onion/cvs/website/en

Modified Files:
	index.wml people.wml volunteer.wml 
Log Message:
cut out much of the front page material.
point out that we're unfunded and looking for sponsors.


Index: index.wml
===================================================================
RCS file: /home2/or/cvsroot/website/en/index.wml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- index.wml	4 Oct 2005 23:03:54 -0000	1.3
+++ index.wml	21 Oct 2005 22:17:52 -0000	1.4
@@ -10,9 +10,11 @@
 <br />
 
 <a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a>
+<!--
 <div class="donatebutton">
 <a href="http://secure.eff.org/tor">Support Tor by giving to EFF</a>
 </div>
+-->
 <div class="donatebutton">
 <a href="gui/">Want a better Tor GUI?</a>
 </div>
@@ -38,65 +40,60 @@
 <p>
 Your traffic is safer when you use Tor, because communications
 are bounced around a distributed network of servers, called
-<a href="<page overview>">onion routers</a>.  Instead of taking a direct
-route from source to destination, data packets on the Tor network take a
-random pathway through several servers that cover your tracks so no observer
-at any single point can tell where the data came from or where it's going.
-This makes it hard for
-recipients, observers, and even the onion routers themselves to figure
-out who and where you are. Tor's technology aims to provide Internet
-users with protection against "traffic analysis," a form of
-network surveillance that threatens personal anonymity and privacy,
-confidential business activities and relationships, and state security.
+<a href="<page overview>">onion routers</a>.
+Tor's technology aims to provide Internet users with protection against
+"traffic analysis," a form of network surveillance that threatens personal
+anonymity and privacy, confidential business activities and relationships,
+and state security.
 </p>
 
 <p>
-Traffic analysis is used every day by companies, governments, and
-individuals that want to keep track of where people and organizations go
-and what they do on the Internet.  Instead of looking at the content of
-your communications, traffic analysis tracks where your data goes and
-when, as well as how much is sent. For example, online advertising
-companies like Fastclick and Doubleclick use traffic analysis to record
-what web pages you've visited, and can build a profile of your interests
-from that. A pharmaceutical company could use traffic analysis to monitor
-when the research wing of a competitor visits its website, and track
-what pages or products that interest the competitor. IBM hosts a
-searchable patent index, and it could keep a list of every query your
-company makes. A stalker could use traffic analysis to learn whether
-you're in a certain Internet cafe.
+Instead of looking at the content of your communications, traffic analysis
+tracks where your data goes and when, as well as how much is sent.
+<!--
+For example, online advertising companies like Doubleclick use traffic
+analysis to record what web pages you've visited, and can build a
+profile of your interests from that. A pharmaceutical company could
+use traffic analysis to monitor when the research wing of a competitor
+visits its website, and track what pages or products that interest the
+competitor. IBM hosts a searchable patent index, and it could keep a list
+of every query your company makes. A stalker could use traffic analysis
+to learn whether you're in a certain Internet cafe.
 </p>
 
 <p>
-Tor aims to make traffic analysis more difficult by preventing
-eavesdroppers from finding out where your communications are going
-online, and by letting you decide whether to identify yourself when
-you communicate.
+-->
+Tor aims to make traffic analysis more difficult by preventing websites,
+eavesdroppers, and even the onion routers themselves from tracing your
+communications online. This means Tor lets you decide whether to identify
+yourself when you communicate.
 </p>
 
 <p>
 Tor's security is improved as its user base grows and as
 more people volunteer to run servers.  Please consider
-<a href="<page documentation>">installing it</a> and then
-<a href="<cvssandbox>tor/doc/tor-doc-server.html">helping out</a>.
-</p>
-
-<p>
-Part of the goal of the Tor project is to deploy a public testbed for
-experimenting with design trade-offs, to teach us how best to provide
-privacy online. We welcome research into the security of Tor and related
-anonymity systems, and want to hear about any vulnerabilities you find.
-</p>
-
-<p>
-Tor is an important piece of building more safety, privacy, and anonymity
-online, but it is not a complete solution.
+<a href="<page volunteer>">volunteering your time</a> or
+<a href="<cvssandbox>tor/doc/tor-doc-server.html">volunteering your bandwidth</a>.
 And remember that this is development code&mdash;it's not a good idea to rely
 on the current Tor network if you really need strong anonymity.
 </p>
 
+<p><b>We are now actively looking for new sponsors and funders.</b>
+The Tor project was launched by <a href="http://freehaven.net/">The Free
+Haven Project</a> in 2002. In the past, Tor development was funded
+by contracts with the <a href="http://www.nrl.navy.mil/">Naval
+Research Lab</a> (inventor of onion routing) and the <a
+href="http://www.eff.org/">Electronic Frontier Foundation</a> (who still
+kindly hosts our website). Sponsors of Tor get personal attention,
+better support, publicity (if they want it), and get to influence the
+direction of our research and development!
+</p>
+
   </div><!-- #main -->
 
-<a href="http://secure.eff.org/tor"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development is supported by EFF" /></a>
-<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development is supported by ONR" /></a>
+<!--
+<a href="http://www.eff.org/"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development has been supported by EFF" /></a>
+<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development has been supported by ONR" /></a>
+-->
 
 #include <foot.wmi>

Index: people.wml
===================================================================
RCS file: /home2/or/cvsroot/website/en/people.wml,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -d -r1.2 -r1.3
--- people.wml	4 Oct 2005 19:19:20 -0000	1.2
+++ people.wml	21 Oct 2005 22:17:52 -0000	1.3
@@ -8,8 +8,8 @@
 <h2>Tor: People</h2>
 <hr />
 
-<p>Tor is managed by <a href="http://freehaven.net/">The Free
-Haven Project</a> as a building block for
+<p>The Tor Project is managed by <a href="http://freehaven.net/">The
+Free Haven Project</a> as a building block for
 a robust censorship-resistant data haven. It is developed by <a
 href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a
 href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from
@@ -24,8 +24,14 @@
 original <a href="http://www.onion-router.net/">onion routing</a> idea
 developed there.</p>
 
-<p>Since November 2004, Tor development has been supported by the <a
-href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p>
+<p>From late 2004 to late 2005, Tor development was supported by
+the <a href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p>
+
+<p><b>We are now actively looking for new contracts and funders.</b>
+Sponsors of Tor get personal attention, better support, publicity
+(if they want it), and get to influence the direction of our research
+and development!
+</p>
 
   </div><!-- #main -->
 

Index: volunteer.wml
===================================================================
RCS file: /home2/or/cvsroot/website/en/volunteer.wml,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -d -r1.4 -r1.5
--- volunteer.wml	19 Oct 2005 03:40:51 -0000	1.4
+++ volunteer.wml	21 Oct 2005 22:17:52 -0000	1.5
@@ -21,9 +21,10 @@
 and usability better. Free T-shirt for each submission!</li>
 <li> Tell your friends! Get them to run servers. Get them to run hidden
 services. Get them to tell their friends.</li>
-<li> Consider joining the <a href="http://secure.eff.org/tor">Electronic
-Frontier Foundation</a>. More EFF donations means more freedom in the
-world, including more Tor development.</li>
+<li> We are looking for funders and sponsors. Take a look at the
+ <a href="<page people>">people page</a>, and if you know any
+  companies, NGOs, or other organizations that want communications
+  security, let them know about us.</li>
 </ol>
 
 <h2>Installers</h2>



More information about the tor-commits mailing list