[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r13034: some typos and capitalization (website/trunk/en)



Author: arma
Date: 2008-01-05 16:54:37 -0500 (Sat, 05 Jan 2008)
New Revision: 13034

Modified:
   website/trunk/en/index.wml
   website/trunk/en/torusers.wml
Log:
some typos and capitalization


Modified: website/trunk/en/index.wml
===================================================================
--- website/trunk/en/index.wml	2008-01-05 14:35:15 UTC (rev 13033)
+++ website/trunk/en/index.wml	2008-01-05 21:54:37 UTC (rev 13034)
@@ -45,7 +45,8 @@
 bloggers, human rights workers, law enforcement officers, soldiers,
 corporations, citizens of repressive regimes, and just ordinary
 citizens.  See the <a href="<page torusers>">Who Uses Tor?</a> page for
-examples of typical tor users.  See the <a href="<page overview>">overview page</a> for a
+examples of typical Tor users.
+See the <a href="<page overview>">overview page</a> for a
 more detailed explanation of what Tor does, why this diversity of
 users is important, and how Tor works.
 </p>

Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml	2008-01-05 14:35:15 UTC (rev 13033)
+++ website/trunk/en/torusers.wml	2008-01-05 21:54:37 UTC (rev 13034)
@@ -65,7 +65,7 @@
 
 <li>
 <strong>Field Agents:</strong>
-It is not difficult for insurgents to monitor internet traffic and
+It is not difficult for insurgents to monitor Internet traffic and
 discover all the hotels and other locations from which people are
 connecting to known military servers.
 Military field agents deployed away from home use Tor to
@@ -89,7 +89,7 @@
 <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
 <ul>
 <li><strong><a href="http://www.rsf.org/";>Reporters without Borders</a></strong>
-tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
+tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
 journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
 </li>
 <li><strong>The US <a href="http://www.ibb.gov/";>International Broadcasting Bureau</a></strong> 
@@ -103,7 +103,7 @@
 </li>
 <li><strong>Citizens and journalists in <a
 href="http://www.rsf.org/rubrique.php3?id_rubrique=554";>Internet black
-holes</a></strong> use Tor to research state propoganda and opposing
+holes</a></strong> use Tor to research state propaganda and opposing
 viewpoints, to file stories with non-State controlled media, and to
 avoid risking the personal consequences of intellectual curiosity.
 </li>
@@ -165,7 +165,7 @@
 report</a> on China Internet issues.
 </li>
 <li><a href="http://www.globalvoicesonline.org";>Global Voices</a>
-recommends Tor, especially for <strong>anonynomous blogging</strong>,
+recommends Tor, especially for <strong>anonymous blogging</strong>,
 throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor";>
 web site.</a>
 </li>
@@ -220,7 +220,7 @@
 government grant will cover a full time stipend for a volunteer to create
 curricula to <strong>show low-income populations how to use anonymity online for
 safer civic engagement</strong>.  Although it's often said that the poor do not use
-online access for civic engagment, failing to act in their self-interests,
+online access for civic engagement, failing to act in their self-interests,
 it is our hypothesis (based on personal conversations and anecdotal
 information) that it is precisely the &ldquo;permanent record &rdquo;
 left online that keeps many of the poor from speaking out on the Internet.
@@ -299,7 +299,7 @@
 and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
 are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
 the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
+purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
 <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html";>Four Horsemen of the Information Apocalypse</a>,
 you have better options than Tor. While not dismissing the potential abuses of Tor,
 this page shows a few of the many important ways anonymity is used online today.</p>