[or-cvs] r10581: fix a few typos and clarify one point. i hope we have an edi (tor/trunk/doc/design-paper)

arma at seul.org arma at seul.org
Wed Jun 13 10:06:19 UTC 2007


Author: arma
Date: 2007-06-13 06:06:19 -0400 (Wed, 13 Jun 2007)
New Revision: 10581

Modified:
   tor/trunk/doc/design-paper/sptor.tex
Log:
fix a few typos and clarify one point. i hope we have
an editor who actually edits, rather than the traditional
academic role of editors.

but in any case, it'll do. great.


Modified: tor/trunk/doc/design-paper/sptor.tex
===================================================================
--- tor/trunk/doc/design-paper/sptor.tex	2007-06-13 09:50:39 UTC (rev 10580)
+++ tor/trunk/doc/design-paper/sptor.tex	2007-06-13 10:06:19 UTC (rev 10581)
@@ -157,7 +157,7 @@
 can be safely operated and used by a wide variety of mutually
 distrustful users, providing sustainability and security.
 
-The Tor network has a broad range of users making it difficult for
+The Tor network has a broad range of users, making it difficult for
 eavesdroppers to track them or profile interests. These include
 ordinary citizens concerned about their privacy, corporations who
 don't want to reveal information to their competitors, and law
@@ -171,9 +171,9 @@
 pervades Tor at all levels: Onion routing has been open source since
 the mid-nineties (mistrusting users can inspect the code themselves);
 Tor is free software (anyone could take up the development of Tor from
-the current team); anyone can use Tor without license or charge, (which
-encourages a broad userbase with diverse interests); Tor is designed to be
-usable (also promotes a large, diverse userbase); and configurable (so
+the current team); anyone can use Tor without license or charge (which
+encourages a broad user base with diverse interests); Tor is designed to be
+usable (also promotes a large, diverse user base) and configurable (so
 users can easily set up and run server nodes); the Tor
 infrastructure is run by volunteers (it is not dependent on the
 economic viability or business strategy of any company) who are
@@ -267,7 +267,7 @@
 encourage services to allow anonymous access. Services should not need
 to decide between blocking legitimate anonymous use and allowing
 unlimited abuse.  Nonetheless, blocking IP addresses is a
-course-grained solution~\cite{netauth}: entire appartment buildings,
+course-grained solution~\cite{netauth}: entire apartment buildings,
 campuses, and even countries sometimes share a single IP address.
 Also, whether intended or not, such blocking supports repression of
 free speech. In many locations where Internet access of various kinds
@@ -290,7 +290,8 @@
 group of abusers joining channels and subtly taking over the
 conversation; but when they labelled all users coming from Tor IP
 addresses as ``anonymous users,'' removing the ability of the abusers
-to blend in, the abuse stopped.  This is an illustration of how simple
+to blend in, the abusers stopped using Tor.  This is an illustration of
+how simple
 technical mechanisms can remove the ability to abuse anonymously
 without undermining the ability to communicate anonymously and can
 thus remove the incentive to attempt abusing in this way.



More information about the tor-commits mailing list