[tor-commits] [torbutton/master] speel Chekc.

mikeperry at torproject.org mikeperry at torproject.org
Mon Apr 4 19:46:02 UTC 2011


commit b8dbedbbf4bc78db10b5daf231157f2cb7f9a0fa
Author: Mike Perry <mikeperry-git at fscked.org>
Date:   Mon Apr 4 12:44:49 2011 -0700

    speel Chekc.
---
 website/design/design.xml |   20 ++++++++++----------
 1 files changed, 10 insertions(+), 10 deletions(-)

diff --git a/website/design/design.xml b/website/design/design.xml
index b1a390e..c589de8 100644
--- a/website/design/design.xml
+++ b/website/design/design.xml
@@ -153,7 +153,7 @@ a user's non-Tor IP address. Javascript
 also allows the adversary to execute <ulink
 url="http://whattheinternetknowsaboutyou.com/">history disclosure attacks</ulink>:
 to query the history via the different attributes of 'visited' links to search
-for particular google queries, sites, or even to <ulink
+for particular Google queries, sites, or even to <ulink
 url="http://www.mikeonads.com/2008/07/13/using-your-browser-url-history-estimate-gender/">profile
 users based on gender and other classifications</ulink>. Finally,
 Javascript can be used to query the user's timezone via the
@@ -248,9 +248,9 @@ by a factor of 5 (for each of the major desktop taskbars - Windows, OSX, KDE
 and Gnome, and None). Subtracting the browser content window
 size from the browser outer window size provide yet more information.
 Firefox toolbar presence gives about a factor of 8 (3 toolbars on/off give
-2<superscript>3</superscript>=8). Interface effects such as titlebar fontsize
+2<superscript>3</superscript>=8). Interface effects such as title bar font size
 and window manager settings gives a factor of about 9 (say 3 common font sizes
-for the titlebar and 3 common sizes for browser GUI element fonts).
+for the title bar and 3 common sizes for browser GUI element fonts).
 Multiply this all out, and you have (1280-640)*(1024-480)*5*5*8*9 ~=
 2<superscript>29</superscript>, or a 29 bit identifier based on resolution
 information alone. </para>
@@ -577,7 +577,7 @@ years past.
  <title><ulink
 url="https://gitweb.torproject.org/torbutton.git/blob_plain/HEAD:/src/components/torRefSpoofer.js">@torproject.org/torRefSpoofer;1</ulink></title>
  <para>
-This component handles optional referer spoofing for Torbuton. It implements a
+This component handles optional referrer spoofing for Torbuton. It implements a
 form of "smart" referer spoofing using <ulink
 url="https://developer.mozilla.org/en/Setting_HTTP_request_headers">http-on-modify-request</ulink>
 to modify the Referrer header. The code sends the default browser referrer
@@ -888,7 +888,7 @@ the Tor state has actually changed, and sets
 <command>extensions.torbutton.proxies_applied</command> to the appropriate Tor
 state value, and ensures that
 <command>extensions.torbutton.tor_enabled</command> is also set to the correct
-value. This is decoupled from the button click functionalty via the pref
+value. This is decoupled from the button click functionality via the pref
 observer so that other addons (such as SwitchProxy) can switch the proxy
 settings between multiple proxies.
 
@@ -903,7 +903,7 @@ The next stage is also handled by
 <function>torbutton_update_status()</function>. This function sets scores of
 Firefox preferences, saving the original values to prefs under
 <command>extensions.torbutton.saved.*</command>, and performs the <link
-linkend="cookiejar">cookie jaring</link>, state clearing (such as window.name
+linkend="cookiejar">cookie jarring</link>, state clearing (such as window.name
 and DOM storage), and <link linkend="preferences">preference
 toggling</link><!--, and ssl certificate jaring work of Torbutton-->. At the
 end of its work, it sets
@@ -2210,7 +2210,7 @@ provides a large amount of identifiable information</ulink>
 As <link linkend="fingerprinting">mentioned above</link>, a large amount of
 information is available from <ulink
 url="http://developer.mozilla.org/en/docs/DOM:window.screen">window.screen</ulink>.
-The most sensative data to anonymity is actually that which is not used in
+The most sensitive data to anonymity is actually that which is not used in
 rendering - such as desktop resolution, and window decoration size.
 Currently, there is no way to obscure this information without Javascript
 hooking. In addition, many of this same desktop and window decoration
@@ -2288,7 +2288,7 @@ url="https://bugzilla.mozilla.org/show_bug.cgi?id=122752">SOCKS
 Username/Password Support</ulink>
     <para>
 We need <ulink url="https://developer.mozilla.org/en/nsIProxyInfo">Firefox
-APIs</ulink> or about:config settings to conrol the SOCKS Username and
+APIs</ulink> or about:config settings to control the SOCKS Username and
 Password fields. The reason why we need this support is to utilize an (as yet
 unimplemented) scheme to separate Tor traffic based <ulink
 url="https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/171-separate-streams.txt">on
@@ -2345,7 +2345,7 @@ The following bugs impact Torbutton and similar extensions' functionality.
 
    <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=445696">Bug 445696 -
-Extensions cannot determine if firefox is fullScreen</ulink>
+Extensions cannot determine if Firefox is full screen</ulink>
    <para>
 
 The windowState property of <ulink
@@ -2367,7 +2367,7 @@ to registering XPCOM category managers such as the nsIContentPolicy, which
 make it difficult to do a straight-forward port of Torbutton or
 HTTPS-Everywhere to Firefox Mobile.  It probably also has similar issues with
 wrapping existing <link linkend="hookedxpcom">Firefox XPCOM components</link>,
-which will also cause more problems for porting TOrbutton.
+which will also cause more problems for porting Torbutton.
 
     </para>
    </listitem>





More information about the tor-commits mailing list