[or-cvs] r12011: minor grammar and name tweaks for trademark faq (website/trunk/en)

arma at seul.org arma at seul.org
Thu Oct 18 08:15:46 UTC 2007


Author: arma
Date: 2007-10-18 04:15:46 -0400 (Thu, 18 Oct 2007)
New Revision: 12011

Modified:
   website/trunk/en/trademark-faq.wml
Log:
minor grammar and name tweaks for trademark faq


Modified: website/trunk/en/trademark-faq.wml
===================================================================
--- website/trunk/en/trademark-faq.wml	2007-10-18 08:03:27 UTC (rev 12010)
+++ website/trunk/en/trademark-faq.wml	2007-10-18 08:15:46 UTC (rev 12011)
@@ -13,14 +13,14 @@
 <p>The Tor Project encourages developers to use the name Tor in ways that
 do not confuse the public about the source of anonymity software and
 services.  If you are building open-source non-commercial software or
-services that incorporate or work with the Tor Project's code, you may
+services that incorporate or work with The Tor Project's code, you may
 use the name “Tor” in an accurate description of your work.  We ask you
-to include a link to the official Tor website,
+to include a link to the official Tor website
 <a href="https://www.torproject.org/">https://www.torproject.org</a> so users can verify the original source of
 Tor for themselves, and a note indicating that your project is not
-sponsored by the Tor Project. For example, “This product is produced
+sponsored by The Tor Project. For example, “This product is produced
 independently from the Tor™ anonymity software and carries no guarantee
-from the Tor Project about quality, suitability or anything else.”</p>
+from The Tor Project about quality, suitability or anything else.”</p>
 
 <a id="onionlogo"></a>
 <h2>Can I use the Tor onion logo?</h2>
@@ -38,7 +38,7 @@
 trademark bullies, but we will use trademark to protect the public's
 ability to recognize Tor Project software.  Trademark helps us to assure
 that the name is used only in connection with genuine Tor anonymity
-software and for accurate description of software and services.  
+software and for accurate description of software and services.
 After all, to protect their anonymity securely, computer users must be
 able to identify the software they are using, so they can account
 properly for its strengths and weaknesses.  Tor has become well-known as
@@ -53,3 +53,4 @@
 </div><!-- #main -->
 
 #include <foot.wmi>
+



More information about the tor-commits mailing list