[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [webwml/staging] Don't put all sections with pictures on top on torusers page



commit b563db366d1275550166f8bf46b099ac5d83c10b
Author: Sebastian Hahn <sebastian@xxxxxxxxxxxxxx>
Date:   Sat Mar 14 13:36:45 2015 +0100

    Don't put all sections with pictures on top on torusers page
---
 about/en/torusers.wml |   76 ++++++++++++++++++++++++-------------------------
 1 file changed, 38 insertions(+), 38 deletions(-)

diff --git a/about/en/torusers.wml b/about/en/torusers.wml
index 24516c7..2ec4f2e 100644
--- a/about/en/torusers.wml
+++ b/about/en/torusers.wml
@@ -29,7 +29,7 @@
     href="https://blog.torproject.org/blog/we-need-your-good-tor-stories";>good
     Tor stories</a>! What do you use Tor for? Why do you need it? What
     has Tor done for you? We need your stories.</p>
-    
+
     <a name="normalusers"></a>
     <img src="$(IMGROOT)/family.jpg" alt="Normal People">
     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
@@ -64,35 +64,7 @@
 </li>
 <li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook";>blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube";>Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
     </ul>
-    
-    <a name="military"></a>
-    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
-    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
-    <hr>
-    <ul>
-    
-    <li>
-    <strong>Field agents:</strong>
-    It is not difficult for insurgents to monitor Internet traffic and
-    discover all the hotels and other locations from which people are
-    connecting to known military servers.
-    Military field agents deployed away from home use Tor to
-    mask the sites they are visiting, protecting military interests and
-    operations, as well as protecting themselves from physical harm.
-    </li>
-    
-    <li><strong>Hidden services:</strong>
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
-    control to be physically secure from discovery and takedown.
-    </li>
-    <li><strong>Intelligence gathering:</strong>
-    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
-    to record a military address, thereby revealing the surveillance.
-    </li>
-    </ul>
-    
+
     <a name="journalist"></a>
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
@@ -118,7 +90,7 @@
     avoid risking the personal consequences of intellectual curiosity.
     </li>
     </ul>
-    
+
     <a name="lawenforcement"></a>
     <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
     <hr>
@@ -144,7 +116,7 @@
     do not encourage anonymity are limiting the sources of their tips.
     </li>
     </ul>
-    
+
     <a name="activists"></a>
     <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers">
     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
@@ -212,7 +184,7 @@
     to help organize a strike.
     </li>
     </ul>
-    
+
     <a name="spotlight"></a>
     <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
     <hr>
@@ -241,7 +213,7 @@
     this continuing into the future.
     </li>
     </ul>
-    
+
     <a name="executives"></a>
     <img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
     <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
@@ -279,7 +251,7 @@
     into whistleblowing.
     </li>
     </ul>
-    
+
     <a name="bloggers"></a>
     <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
     <hr>
@@ -291,7 +263,35 @@
     <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal";>EFF Legal Guide for Bloggers</a>.</li>
     <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/";>guide to anonymous blogging with Wordpress and Tor</a>.</li>
     </ul>
-    
+
+    <a name="military"></a>
+    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
+    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
+    <hr>
+    <ul>
+
+    <li>
+    <strong>Field agents:</strong>
+    It is not difficult for insurgents to monitor Internet traffic and
+    discover all the hotels and other locations from which people are
+    connecting to known military servers.
+    Military field agents deployed away from home use Tor to
+    mask the sites they are visiting, protecting military interests and
+    operations, as well as protecting themselves from physical harm.
+    </li>
+
+    <li><strong>Hidden services:</strong>
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
+    control to be physically secure from discovery and takedown.
+    </li>
+    <li><strong>Intelligence gathering:</strong>
+    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
+    to record a military address, thereby revealing the surveillance.
+    </li>
+    </ul>
+
     <a name="itprofessionals"></a>
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
     <hr>
@@ -302,7 +302,7 @@
     <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
     <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
     </ul>
-    
+
     <p>
     Please do send us your success stories. They are very important because
     Tor provides anonymity. While it is thrilling to speculate about <a
@@ -312,7 +312,7 @@
     counterproductive.  For example, we talked to an FBI officer who
     explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
     details or mention his name.</p>
-    
+
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000";>pro</a>,
     <a href="http://www.edge.org/q2006/q06_4.html#kelly";>con</a>, and <a



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits