[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r21487: {projects} ok, embedding a huge image looks way tacky. opt for large bl (projects/articles)



Author: arma
Date: 2010-01-23 21:36:54 +0000 (Sat, 23 Jan 2010)
New Revision: 21487

Modified:
   projects/articles/circumvention-features.html
Log:
ok, embedding a huge image looks way tacky. opt for large blocks
of inscrutable text instead.


Modified: projects/articles/circumvention-features.html
===================================================================
--- projects/articles/circumvention-features.html	2010-01-23 21:33:51 UTC (rev 21486)
+++ projects/articles/circumvention-features.html	2010-01-23 21:36:54 UTC (rev 21487)
@@ -197,15 +197,13 @@
 
 <h3>5. Decentralized architecture</h3>
 
-<p><img alt="Tor uses multiple hops"
-src="https://www.torproject.org/images/htw2.png"; /></p>
-
 <p>
 Another feature to look for in a circumvention tool is whether its network
 is centralized or decentralized. A centralized tool puts all of its users'
 requests through one or a few servers that the tool operator controls. A
-decentralized design like Tor or JAP sends the traffic through multiple
-different locations, so there is no single location or entity that gets
+decentralized design like Tor or JAP sends the traffic through
+<a href="https://www.torproject.org/images/htw2.png";>multiple different
+locations</a>, so there is no single location or entity that gets
 to watch what websites each user is accessing.
 </p>