[or-cvs] r23845: {website} minor changes to make po4a happy (website/trunk/docs/en)

Runa Sandvik runa.sandvik at gmail.com
Sun Nov 21 21:00:05 UTC 2010


Author: runa
Date: 2010-11-21 21:00:05 +0000 (Sun, 21 Nov 2010)
New Revision: 23845

Modified:
   website/trunk/docs/en/faq.wml
Log:
minor changes to make po4a happy

Modified: website/trunk/docs/en/faq.wml
===================================================================
--- website/trunk/docs/en/faq.wml	2010-11-21 20:47:06 UTC (rev 23844)
+++ website/trunk/docs/en/faq.wml	2010-11-21 21:00:05 UTC (rev 23845)
@@ -125,17 +125,51 @@
     <a id="Torisdifferent"></a>
     <h3><a class="anchor" href="#Torisdifferent">How is Tor different from other proxies?</a></h3>
     <p>
-    A typical proxy provider sets up a server somewhere on the Internet and allows you to use it to relay your traffic.  This creates a simple, easy to maintain architecture.  The users all enter and leave through the same server.  The provider may charge for use of the proxy, or fund their costs through advertisements on the server.  In the simplest configuration, you don't have to install anything.  You just have to point your browser at their proxy server.  Simple proxy providers are fine solutions if you do not want protections for your privacy and anonymity online and you trust the provider from doing bad things.  Some simple proxy providers use SSL to secure your connection to them.  This may protect you against local eavesdroppers, such as those at a cafe with free wifi Internet.
+    A typical proxy provider sets up a server somewhere on the Internet and
+allows you to use it to relay your traffic.  This creates a simple, easy to
+maintain architecture.  The users all enter and leave through the same server.
+The provider may charge for use of the proxy, or fund their costs through
+advertisements on the server.  In the simplest configuration, you don't have to
+install anything.  You just have to point your browser at their proxy server.
+Simple proxy providers are fine solutions if you do not want protections for
+your privacy and anonymity online and you trust the provider from doing bad
+things.  Some simple proxy providers use SSL to secure your connection to them.
+This may protect you against local eavesdroppers, such as those at a cafe with
+free wifi Internet.
     </p>
     <p>
-    Simple proxy providers also create a single point of failure.  The provider knows who you are and where you browse on the Internet.  They can see your traffic as it passes through their server.  In some cases, they can see your encrypted traffic as they relay it to your banking site or to ecommerce stores.  You have to trust the provider isn't doing any number of things, such as watching your traffic, injecting their own advertisements into your traffic stream, and isn't recording your personal details.
+    Simple proxy providers also create a single point of failure.  The provider
+knows who you are and where you browse on the Internet.  They can see your
+traffic as it passes through their server.  In some cases, they can see your
+encrypted traffic as they relay it to your banking site or to ecommerce stores.
+You have to trust the provider isn't doing any number of things, such as
+watching your traffic, injecting their own advertisements into your traffic
+stream, and isn't recording your personal details.
     </p>
     <p>
-    Tor passes your traffic through at least 3 different servers before sending it on to the destination.  Tor does not modify, or even know, what you are sending into it.  It merely relays your traffic, completely encrypted through the Tor network and has it pop out somewhere else in the world, completely intact.  The Tor client is required because we assume you trust your local computer.  The Tor client manages the encryption and the path chosen through the network.  The relays located all over the world merely pass encrypted packets between themselves.</p>
+    Tor passes your traffic through at least 3 different servers before sending
+it on to the destination.  Tor does not modify, or even know, what you are
+sending into it.  It merely relays your traffic, completely encrypted through
+the Tor network and has it pop out somewhere else in the world, completely
+intact.  The Tor client is required because we assume you trust your local
+computer.  The Tor client manages the encryption and the path chosen through
+the network.  The relays located all over the world merely pass encrypted
+packets between themselves.</p>
     <p>
     <dl>
-    <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of three servers can see encrypted Tor traffic coming from your computer.  It still doesn't know who you are and what you are doing over Tor.  It merely sees "This IP address is using Tor".  Tor is not illegal anywhere in the world, so using Tor by itself is fine.  You are still protected from this node figuring out who you are and where you are going on the Internet.</dd>
-    <dt>Can't the third server see my traffic?</dt><dd>Possibly.  A bad third of three servers can see the traffic you sent into Tor.  It won't know who sent this traffic.  If you're using encryption, such as visiting a bank or e-commerce website, or encrypted mail connections, etc, it will only know the destination.  It won't be able to see the data inside the traffic stream.  You are still protected from this node figuring out who you are and if using encryption, what data you're sending to the destination.</dd>
+    <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of
+three servers can see encrypted Tor traffic coming from your computer.  It
+still doesn't know who you are and what you are doing over Tor.  It merely sees
+"This IP address is using Tor".  Tor is not illegal anywhere in the world, so
+using Tor by itself is fine.  You are still protected from this node figuring
+out who you are and where you are going on the Internet.</dd>
+    <dt>Can't the third server see my traffic?</dt><dd>Possibly.  A bad third
+of three servers can see the traffic you sent into Tor.  It won't know who sent
+this traffic.  If you're using encryption, such as visiting a bank or
+e-commerce website, or encrypted mail connections, etc, it will only know the
+destination.  It won't be able to see the data inside the traffic stream.  You
+are still protected from this node figuring out who you are and if using
+encryption, what data you're sending to the destination.</dd>
     </dl>
     </p>
     
@@ -305,7 +339,7 @@
     <h3><a class="anchor" href="#SupportMail">How can I get an answer to my
     Tor support mail?</a></h3>
 
-    <p>There is no official support for Tor. Your best bet is to try the following:
+    <p>There is no official support for Tor. Your best bet is to try the following:</p>
     <ol>
     <li>Read through this <a href="<page docs/faq>">FAQ</a>.</li>
     <li>Read through the <a href="<page docs/documentation>">documentation</a>.</li>
@@ -758,7 +792,7 @@
 Check</a> site and see whether it thinks you are using Tor. See <a
 href="<wikifaq>#HowcanItellifTorisworkingandthatmyconnectionsreallyareanonymizedArethereexternalserversthatwilltestmyconnection">the
 Tor Check FAQ entry</a> for details.
-<p>
+</p>
 
 <p>
 If it thinks you're not using Tor, here are some hints:



More information about the tor-commits mailing list