[or-cvs] r12156: Website tweaks from sjmurdoch; make spaces on the sides of m (website/trunk/en)

nickm at seul.org nickm at seul.org
Wed Oct 24 17:16:06 UTC 2007


Author: nickm
Date: 2007-10-24 13:16:06 -0400 (Wed, 24 Oct 2007)
New Revision: 12156

Modified:
   website/trunk/en/download.wml
   website/trunk/en/index.wml
   website/trunk/en/overview.wml
   website/trunk/en/whousestor.wml
Log:
Website tweaks from sjmurdoch; make spaces on the sides of mdash consistent.

Modified: website/trunk/en/download.wml
===================================================================
--- website/trunk/en/download.wml	2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/download.wml	2007-10-24 17:16:06 UTC (rev 12156)
@@ -83,7 +83,9 @@
 
 <li>Browser plugins such as Java, Flash, ActiveX, RealPlayer,
 Quicktime, Adobe's PDF plugin, and others can be manipulated
-into revealing your IP address. You should probably uninstall your plugins
+into revealing your IP address. You should probably
+<a href="http://plugindoc.mozdev.org/faqs/uninstall.html">uninstall your
+plugins</a>
 (go to "about:plugins" to see what is installed), or investigate <a
 href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a
 href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and
@@ -107,7 +109,7 @@
 can't encrypt your traffic between the Tor network and its final
 destination.</a>
 If you are communicating sensitive information, you should use as much
-care as you would on the normal scary Internet &mdash; use SSL or other
+care as you would on the normal scary Internet &mdash; use HTTPS or other
 end-to-end encryption and authentication.
 </li>
 

Modified: website/trunk/en/index.wml
===================================================================
--- website/trunk/en/index.wml	2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/index.wml	2007-10-24 17:16:06 UTC (rev 12156)
@@ -49,7 +49,7 @@
 <p>
 (There are three pieces of fine print you need to know about.
 First, Tor does not protect you if you do not use it correctly.
-Read <a href="<page download>#Warnings">our list of warnings</a> and
+Read <a href="<page download>#Warning">our list of warnings</a> and
 make sure to follow the
 <a href="<page documentation>#RunningTor">instructions for your platform</a>
 carefully. Second, even if you configure and use Tor correctly,

Modified: website/trunk/en/overview.wml
===================================================================
--- website/trunk/en/overview.wml	2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/overview.wml	2007-10-24 17:16:06 UTC (rev 12156)
@@ -119,7 +119,7 @@
 analysis by distributing your transactions over several places on the
 Internet, so no single point can link you to your destination.  The idea
 is similar to using a twisty, hard-to-follow route in order to throw off
-somebody who is tailing you&mdash;and then periodically erasing your
+somebody who is tailing you &mdash; and then periodically erasing your
 footprints.  Instead of taking a direct route from source to
 destination, data packets on the Tor network take a random pathway
 through several relays that cover your tracks so no observer at any

Modified: website/trunk/en/whousestor.wml
===================================================================
--- website/trunk/en/whousestor.wml	2007-10-24 15:47:01 UTC (rev 12155)
+++ website/trunk/en/whousestor.wml	2007-10-24 17:16:06 UTC (rev 12156)
@@ -20,8 +20,8 @@
 stories about how people or organizations are staying anonymous could be
 counterproductive.
 As an example, we talked
-to an FBI officer who explained that he uses Tor every day for his work
-&mdash;but he quickly followed up
+to an FBI officer who explained that he uses Tor every day for his
+work &mdash; but he quickly followed up
 with a request not to provide details or mention his name.
 </p>
 
@@ -92,8 +92,8 @@
 <li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
 
 <p>The US <a href="http://www.ibb.gov/">International Broadcasting
-Bureau</a> supports Tor development Internet users in countries
-that can't get
+Bureau</a> supports Tor development Internet to help users in countries
+where they can't get
 safe access to free media.  Tor not only protects freedom of expression,
 but preserves the ability of persons behind national firewalls or under
 the surveillance of repressive regimes to view information that gives
@@ -170,7 +170,7 @@
 Africa reports that his nonprofit must budget 10% to cover various
 sorts of corruption, mostly bribes and such.  When that percentage
 rises steeply, not only can they not afford the money, but they can
-not afford to complain -- this is the point at which open objection can
+not afford to complain &mdash; this is the point at which open objection can
 become dangerous.  So his nonprofit has been working to use
 Tor to safely whistleblow on governmental corruption in order to continue
 their work more effectively and safely.</p>
@@ -256,8 +256,6 @@
 
 <li>Hidden services</li>
 
-</ul>
-
 <p>When the Internet was designed by DARPA, its primary purpose was to
 be able to facilitate distributed, robust communications in case of
 local strikes.  However, some functions must be centralized, such as
@@ -266,6 +264,8 @@
 however Tor's hidden services capacity allows military command and
 control to be physically secure from discovery and takedown.</p>
 
+</ul>
+
 <h2>Law enforcement officers use Tor</h2>
 
 <p>Undercover officers use Tor to conceal their IP address during



More information about the tor-commits mailing list