[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] faq-abuse edits from donna



Update of /home2/or/cvsroot/website
In directory moria:/home/arma/work/onion/cvs/website

Modified Files:
	faq-abuse.html 
Log Message:
faq-abuse edits from donna


Index: faq-abuse.html
===================================================================
RCS file: /home2/or/cvsroot/website/faq-abuse.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -d -r1.14 -r1.15
--- faq-abuse.html	30 Jun 2005 19:53:30 -0000	1.14
+++ faq-abuse.html	12 Jul 2005 22:09:41 -0000	1.15
@@ -76,12 +76,12 @@
 <a id="DDoS"></a>
 <h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3>
 
-<p>Distributed denial of service attacks typically rely on having a group
+<p>Distributed denial of service (DDoS) attacks typically rely on having a group
 of thousands of computers all sending floods of traffic to a victim. Since
 the goal is to overpower the bandwidth of the victim, they typically send
 UDP packets since those don't require handshakes or coordination. </p>
 
-<p>But because Tor only transports correctly-formed TCP streams, not
+<p>But because Tor only transports correctly formed TCP streams, not
 all IP packets, you cannot send UDP packets over Tor. (You can't do
 specialized forms of this attack like SYN flooding either.) So ordinary
 DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth
@@ -134,7 +134,7 @@
 course, like all privacy-oriented networks on the net, we attract our
 share of jerks. Tor's exit policies help separate the role of "willing
 to donate resources to the network" from the role of "willing to deal
-with exit abuse complaints", so we hope our network is more sustainable
+with exit abuse complaints," so we hope our network is more sustainable
 than past attempts at anonymity networks. </p>
 
 <p>Since Tor has <a
@@ -150,20 +150,20 @@
 hear from somebody. Abuse
 complaints may come in a variety of forms. For example: </p>
 <ul>
-<li>Somebody connects to hotmail, and sends a ransom note to a
+<li>Somebody connects to Hotmail, and sends a ransom note to a
 company. The
 FBI sends you a polite email, you explain that you run a Tor server,
-and they say 'oh well' and leave you alone. [Port 80]</li>
-<li>Somebody tries to get you shut down by using Tor to connect to google
-groups and post spam to usenet, and then sending an angry mail to
+and they say "oh well" and leave you alone. [Port 80]</li>
+<li>Somebody tries to get you shut down by using Tor to connect to Google
+groups and post spam to Usenet, and then sends an angry mail to
 your ISP about how you're destroying the world. [Port 80]</li>
-<li>Somebody connects to an irc network and makes a nuisance of
+<li>Somebody connects to an IRC network and makes a nuisance of
 himself. Your ISP gets polite mail about how your computer has been
-compromised; and/or your computer gets ddosed. [Port 6667]</li>
+compromised; and/or your computer gets DDoSed. [Port 6667]</li>
 <li>Somebody uses Tor to download a Vin Diesel movie, and
 your ISP gets a DMCA takedown notice. See EFF's <a
 href="http://tor.eff.org/eff/tor-dmca-response.html";>Tor DMCA Response
-Template</a>, which explains to your ISP why they can probably ignore
+Template</a>, which explains to your ISP why it can probably ignore
 the notice without any liability. [Arbitrary ports]</li>
 </ul>
 
@@ -250,7 +250,7 @@
 <p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for
 spamming</a>, some over-zealous blacklisters seem to think that all
 open networks like Tor are evil --- they attempt to strong-arm network
-administrators on policy, service and routing issues, and then extract
+administrators on policy, service, and routing issues, and then extract
 ransoms from victims. </p>
 
 <p>If your server administrators decide to make use of these