[or-cvs] r18747: {website} Add some list items and clean up some text. (website/trunk/en)

phobos at seul.org phobos at seul.org
Tue Mar 3 04:26:52 UTC 2009


Author: phobos
Date: 2009-03-02 23:26:52 -0500 (Mon, 02 Mar 2009)
New Revision: 18747

Modified:
   website/trunk/en/30seconds.wml
Log:
Add some list items and clean up some text.


Modified: website/trunk/en/30seconds.wml
===================================================================
--- website/trunk/en/30seconds.wml	2009-03-03 04:26:26 UTC (rev 18746)
+++ website/trunk/en/30seconds.wml	2009-03-03 04:26:52 UTC (rev 18747)
@@ -17,9 +17,10 @@
 <ul>
 <li>Your Internet service provider</li>
 <li>Your favorite website or online store</li>
+<li>Your favorite coffee shop or cafe with free wifi</li>
 </ul>
 
-<p>These activities are commonly called traffic analysis and corporations,
+<p>These snooping activities are commonly called traffic analysis. Corporations,
 marketing organizations, governments, and other parties are becoming
 increasingly sophisticated at it.</p>
 
@@ -29,6 +30,7 @@
 journals</li>
 <li>Thieves, spammers, and phishers to launch progressively sophisticated and
 personalized attacks</li>
+<li>Corporations can collect and aggregate online browsing and chatting behavior for better ad-targeting and profiling.</li>
 </ul>
 
 <p>For some people, this electronic spying is a nuisance that can affect their
@@ -37,11 +39,11 @@
 <p>Since 2001, the Tor Project has been developing free and
  open-source software that helps provide anonymity for Internet users. It works
 by allowing users
-to travel the web on a circuitous route on a set of servers positioned
+to travel the web on a circuitous route over 1500 servers positioned
 around the world. When you use Tor, your route on the Internet is indirect,
 so snoops have a difficult time following your path and seizing vital
 information. Tor also has special functionality, called hidden services,
-that allows users to run websites without revealing their location.</p>
+that allows you to run websites without revealing their location.</p>
 
 <p>Tor is compatible with different operating systems, such as Microsoft
 Windows, Apple Mac, and various versions of Linux. Tor works with most
@@ -53,7 +55,10 @@
 <li>Journalists who need to protect their sources</li>
 <li>Human rights workers</li>
 <li>Dissidents in politically rigid countries</li>
+<li>Corporations who wish to protect their employees web traffic</li>
+
 <li>Whistle blowers who fear retribution</li>
+<li>Governments wishing to protect their agents and employees traffic</li>
 <li>Law enforcement officers on Internet sting operations</li>
 <li>People wanting to post socially sensitive information in chat
 rooms, like rape or abuse survivors and those with stigmatized illnesses.</li>



More information about the tor-commits mailing list