[or-cvs] r13089: Fix two bad links caught by IanG. (website/trunk/en)

phobos at seul.org phobos at seul.org
Thu Jan 10 14:21:22 UTC 2008


Author: phobos
Date: 2008-01-10 09:21:22 -0500 (Thu, 10 Jan 2008)
New Revision: 13089

Modified:
   website/trunk/en/torusers.wml
Log:
Fix two bad links caught by IanG.


Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml	2008-01-09 23:02:07 UTC (rev 13088)
+++ website/trunk/en/torusers.wml	2008-01-10 14:21:22 UTC (rev 13089)
@@ -3,10 +3,6 @@
 
 #include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8"
 
-# Note to translators: this file is still under construction, and
-# will probably change a whole lot before we link to it. So it's
-# probably best to not translate it yet.
-
 <div class="main-column">
 <h1>Who uses Tor?</h1>
 <ul>
@@ -281,7 +277,7 @@
 <p>
 Please do send us your success stories. They are very important because
 Tor provides anonymity. While it is thrilling speculate about <a
-href="<page contact>">undesired effects of Tor</a>, when it succeeds, nobody notices.  This is
+href="<page faq-abuse>">undesired effects of Tor</a>, when it succeeds, nobody notices.  This is
 great for users, but not so good for us, since publishing success
 stories about how people or organizations are staying anonymous could be
 counterproductive.  For example, we talked to an FBI officer who
@@ -297,7 +293,7 @@
 <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
 <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
 and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
-are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
+are plenty of other places where this information can be found. We do have a <a href="<page faq-abuse>">Tor abuse</a> page describing some of
 the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
 purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
 <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,



More information about the tor-commits mailing list