[or-cvs] r23179: {projects} improve the section titles. (projects/articles)
Andrew Lewman
andrew at torproject.org
Tue Sep 14 14:51:55 UTC 2010
Author: phobos
Date: 2010-09-14 14:51:55 +0000 (Tue, 14 Sep 2010)
New Revision: 23179
Modified:
projects/articles/circumvention-features.pdf
projects/articles/circumvention-features.tex
Log:
improve the section titles.
Modified: projects/articles/circumvention-features.pdf
===================================================================
(Binary files differ)
Modified: projects/articles/circumvention-features.tex
===================================================================
--- projects/articles/circumvention-features.tex 2010-09-14 14:38:55 UTC (rev 23178)
+++ projects/articles/circumvention-features.tex 2010-09-14 14:51:55 UTC (rev 23179)
@@ -61,7 +61,7 @@
that some other tool developers may not care about), I have also tried
to include features that other tool developers consider important.
-\section{Diverse set of users}
+\section{Has a diverse set of users}
One of the simplest questions you can ask when looking at a circumvention
tool is who else uses it. A wide variety of users means that if somebody
@@ -98,7 +98,7 @@
on the other hand, if you're in Saudi Arabia and need a circumvention
tool, some otherwise useful tools are not an option for you.
-\section{Sustainable network and software development}
+\section{Provides sustainable network and software development}
If you're going to invest the time to figure out how to use a given tool,
you want to make sure it's going to be around for a while. There are
@@ -136,7 +136,7 @@
a tool uses can help you predict what problems it might encounter in
the future.
-\section{Open design}
+\section{Uses open design}
The first step to transparency and reusability of the tool's software and
design is to distribute the software (not just the client-side software,
@@ -179,7 +179,7 @@
projects and the field of circumvention development as a whole moves
forward too slowly.
-\section{Decentralized architecture}
+\section{Uses decentralized architecture}
Another feature to look for in a circumvention tool is whether its network
is centralized or decentralized. A centralized tool puts all of its users'
@@ -291,7 +291,7 @@
strangers who get to see your entire traffic profile (and link you to
it). Anybody who promises ``100\% security'' is selling something.
-\section{Fast}
+\section{Runs fast}
The next feature you might look for in a circumvention tool is speed. Some
tools tend to be consistently fast, some consistently slow, and some
@@ -319,7 +319,7 @@
downside is that the network is often overwhelmed by users doing bulk
transfer.
-\section{Easy to get the software and updates}
+\section{Makes it easy to get the software and updates}
Once a circumvention tool becomes well-known, its website is going to get
blocked. If it's impossible to get a copy of the tool itself, who cares
More information about the tor-commits
mailing list