[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] and stop linking to tor-doc.html



Update of /home2/or/cvsroot/website
In directory moria:/home/arma/work/onion/cvs/website

Modified Files:
	documentation.html faq-abuse.html overview.html 
Log Message:
and stop linking to tor-doc.html


Index: documentation.html
===================================================================
RCS file: /home2/or/cvsroot/website/documentation.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -d -r1.45 -r1.46
--- documentation.html	27 Aug 2005 13:59:03 -0000	1.45
+++ documentation.html	12 Sep 2005 10:33:13 -0000	1.46
@@ -57,14 +57,13 @@
 <a id="RunningTor"></a>
 <h2><a class="anchor" href="#RunningTor">Running Tor</a></h2>
 <ul>
-<li><a href="/cvs/tor/doc/tor-doc.html">Why should I run Tor?</a></li>
+<li><a href="/overview.html">Why should I run Tor?</a></li>
 <li><a href="/cvs/tor/doc/tor-doc-win32.html">Installing Tor on Win32</a></li>
 <li><a href="/cvs/tor/doc/tor-doc-osx.html">Installing Tor on Mac OS X</a></li>
 <li><a href="/cvs/tor/doc/tor-doc-unix.html">Installing Tor on Linux/BSD/Unix</a></li>
 <li><a href="/cvs/tor/doc/tor-switchproxy.html">Installing SwitchProxy for Tor</a></li>
 <li><a href="/cvs/tor/doc/tor-doc-server.html">Configuring a Tor server</a></li>
 <li><a href="/cvs/tor/doc/tor-hidden-service.html">Configuring a Tor hidden service</a></li>
-<li><a href="/cvs/tor/doc/tor-doc.html#own-network">Setting up your own Tor network</a></li>
 </ul>
 
 <a id="DesignDoc"></a>

Index: faq-abuse.html
===================================================================
RCS file: /home2/or/cvsroot/website/faq-abuse.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -d -r1.23 -r1.24
--- faq-abuse.html	27 Aug 2005 13:59:03 -0000	1.23
+++ faq-abuse.html	12 Sep 2005 10:33:13 -0000	1.24
@@ -144,7 +144,7 @@
 than past attempts at anonymity networks. </p>
 
 <p>Since Tor has <a
-href="/cvs/tor/doc/tor-doc.html">many good uses as
+href="/overview.html">many good uses as
 well</a>, we feel that we're doing pretty well at striking a balance
 currently. </p>
 

Index: overview.html
===================================================================
RCS file: /home2/or/cvsroot/website/overview.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -d -r1.43 -r1.44
--- overview.html	12 Sep 2005 10:23:46 -0000	1.43
+++ overview.html	12 Sep 2005 10:33:13 -0000	1.44
@@ -82,11 +82,19 @@
 Foundation (EFF) are supporting Tor's development as a mechanism for
 maintaining civil liberties online. Corporations use Tor as a safe way
 to conduct competitive analysis, and to protect sensitive procurement
-patterns from eavesdroppers.  A branch of the U.S. Navy uses Tor for
-open source intelligence gathering, and one of its teams used Tor
-while deployed in the Middle East recently. Law enforcement uses Tor
-for visiting or surveilling web sites without leaving government IP
-addresses in their web logs.
+patterns from eavesdroppers. They also use it to replace traditional
+VPNs, which reveal the exact amount and timing of communication. Which
+locations have employees working late? Which locations have employees
+consulting job-hunting websites? Which research divisions are communicating
+with the company's patent lawyers?
+</p>
+
+<p>
+A branch of the U.S. Navy uses Tor for open source intelligence
+gathering, and one of its teams used Tor while deployed in the Middle
+East recently. Law enforcement uses Tor for visiting or surveilling
+web sites without leaving government IP addresses in their web logs,
+and for security during sting operations.
 </p>
 
 <p>