[or-cvs] finally wrap the rest of tor-doc into the overview

arma at seul.org arma at seul.org
Mon Sep 12 10:23:48 UTC 2005


Update of /home2/or/cvsroot/website
In directory moria:/home/arma/work/onion/cvs/website

Modified Files:
	overview.html 
Log Message:
finally wrap the rest of tor-doc into the overview


Index: overview.html
===================================================================
RCS file: /home2/or/cvsroot/website/overview.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -d -r1.42 -r1.43
--- overview.html	27 Aug 2005 13:59:03 -0000	1.42
+++ overview.html	12 Sep 2005 10:23:46 -0000	1.43
@@ -58,30 +58,43 @@
 </p>
 
 <p>
-Individuals can use Tor to keep remote websites from tracking them and their
-family members.
-They can also use it to connect
-to resources such as news sites or instant messaging services that are
-blocked by their local Internet service providers (ISPs).
+Individuals use Tor to keep websites from tracking them and their family
+members, or to connect to news sites, instant messaging services, or the
+like when these are blocked by their local Internet providers.  Tor's <a
+href="http://tor.eff.org/doc/tor-hidden-service.html">hidden services</a>
+let users publish web sites and other services without needing to reveal
+the location of the site. Individuals also use Tor for socially sensitive
+communication: chat rooms and web forums for rape and abuse survivors,
+or people with illnesses.
 </p>
 
 <p>
-Groups such as Indymedia recommend Tor
-for safeguarding their members' online privacy and security.  Activist
-groups like the Electronic Frontier Foundation (EFF) are supporting
-Tor's development as a mechanism for maintaining civil liberties online.
-Corporations are investigating Tor as a safe way to conduct competitive
-analysis, and are considering using Tor to test new experimental projects
-without associating their names with these projects. A branch of the
-U.S. Navy uses Tor for open source intelligence gathering, and one of its
-teams used Tor while deployed in the Middle East recently.
+Journalists use Tor to communicate more safely with whistleblowers and
+dissidents. Non-governmental organizations (NGOs) use Tor to allow their
+workers to connect to their home website while they're in a foreign
+country, without notifying everybody nearby that they're working with
+that organization.
 </p>
 
 <p>
-The variety of people who use Tor is actually part of what makes it
-so secure.  Tor hides you among the other users on the network, so the more
-populous and diverse the user base for Tor is,
-the more your anonymity will be protected.
+Groups such as Indymedia recommend Tor for safeguarding their members'
+online privacy and security. Activist groups like the Electronic Frontier
+Foundation (EFF) are supporting Tor's development as a mechanism for
+maintaining civil liberties online. Corporations use Tor as a safe way
+to conduct competitive analysis, and to protect sensitive procurement
+patterns from eavesdroppers.  A branch of the U.S. Navy uses Tor for
+open source intelligence gathering, and one of its teams used Tor
+while deployed in the Middle East recently. Law enforcement uses Tor
+for visiting or surveilling web sites without leaving government IP
+addresses in their web logs.
+</p>
+
+<p>
+The variety of people who use Tor is actually <a
+href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
+it so secure</a>.  Tor hides you among the other users on the network,
+so the more populous and diverse the user base for Tor is, the more your
+anonymity will be protected.
 </p>
 
 <h3>Why we need Tor</h3>



More information about the tor-commits mailing list