[or-cvs] r23180: {projects} better titles (projects/articles)

Roger Dingledine arma at torproject.org
Tue Sep 14 17:22:45 UTC 2010

Author: arma
Date: 2010-09-14 17:22:44 +0000 (Tue, 14 Sep 2010)
New Revision: 23180

better titles

Modified: projects/articles/circumvention-features.pdf
(Binary files differ)

Modified: projects/articles/circumvention-features.tex
--- projects/articles/circumvention-features.tex	2010-09-14 14:51:55 UTC (rev 23179)
+++ projects/articles/circumvention-features.tex	2010-09-14 17:22:44 UTC (rev 23180)
@@ -13,7 +13,7 @@
 \fancyfoot[C]{\hrulefill \\ The Tor Project, Inc.\\  969 Main Street, Suite 206, Walpole, MA 02081-2972 USA\\ https://www.torproject.org/}
 \author{Roger Dingledine \\ The Tor Project}
-\title{10 Things to Look for in a Circumvention Tool \\
+\title{Ten things to look for in a circumvention tool \\
 \date{Originally prepared for the March 2010 ``Index on Censorship'',\\
 then adapted for the July 2010 ``China Rights Forum''}
@@ -98,7 +98,7 @@
 on the other hand, if you're in Saudi Arabia and need a circumvention
 tool, some otherwise useful tools are not an option for you.
-\section{Provides sustainable network and software development}
+\section{Has a sustainable network and software development strategy}
 If you're going to invest the time to figure out how to use a given tool,
 you want to make sure it's going to be around for a while. There are
@@ -136,7 +136,7 @@
 a tool uses can help you predict what problems it might encounter in
 the future.
-\section{Uses open design}
+\section{Has an open design}
 The first step to transparency and reusability of the tool's software and
 design is to distribute the software (not just the client-side software,
@@ -179,7 +179,7 @@
 projects and the field of circumvention development as a whole moves
 forward too slowly.
-\section{Uses decentralized architecture}
+\section{Has a decentralized architecture}
 Another feature to look for in a circumvention tool is whether its network
 is centralized or decentralized. A centralized tool puts all of its users'
@@ -291,7 +291,7 @@
 strangers who get to see your entire traffic profile (and link you to
 it). Anybody who promises ``100\% security'' is selling something.
-\section{Runs fast}
+\section{Provides consistently good latency and throughput}
 The next feature you might look for in a circumvention tool is speed. Some
 tools tend to be consistently fast, some consistently slow, and some

More information about the tor-commits mailing list