[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r13034: some typos and capitalization (website/trunk/en)
Author: arma
Date: 2008-01-05 16:54:37 -0500 (Sat, 05 Jan 2008)
New Revision: 13034
Modified:
website/trunk/en/index.wml
website/trunk/en/torusers.wml
Log:
some typos and capitalization
Modified: website/trunk/en/index.wml
===================================================================
--- website/trunk/en/index.wml 2008-01-05 14:35:15 UTC (rev 13033)
+++ website/trunk/en/index.wml 2008-01-05 21:54:37 UTC (rev 13034)
@@ -45,7 +45,8 @@
bloggers, human rights workers, law enforcement officers, soldiers,
corporations, citizens of repressive regimes, and just ordinary
citizens. See the <a href="<page torusers>">Who Uses Tor?</a> page for
-examples of typical tor users. See the <a href="<page overview>">overview page</a> for a
+examples of typical Tor users.
+See the <a href="<page overview>">overview page</a> for a
more detailed explanation of what Tor does, why this diversity of
users is important, and how Tor works.
</p>
Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml 2008-01-05 14:35:15 UTC (rev 13033)
+++ website/trunk/en/torusers.wml 2008-01-05 21:54:37 UTC (rev 13034)
@@ -65,7 +65,7 @@
<li>
<strong>Field Agents:</strong>
-It is not difficult for insurgents to monitor internet traffic and
+It is not difficult for insurgents to monitor Internet traffic and
discover all the hotels and other locations from which people are
connecting to known military servers.
Military field agents deployed away from home use Tor to
@@ -89,7 +89,7 @@
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
<ul>
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
-tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
+tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
</li>
<li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
@@ -103,7 +103,7 @@
</li>
<li><strong>Citizens and journalists in <a
href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
-holes</a></strong> use Tor to research state propoganda and opposing
+holes</a></strong> use Tor to research state propaganda and opposing
viewpoints, to file stories with non-State controlled media, and to
avoid risking the personal consequences of intellectual curiosity.
</li>
@@ -165,7 +165,7 @@
report</a> on China Internet issues.
</li>
<li><a href="http://www.globalvoicesonline.org">Global Voices</a>
-recommends Tor, especially for <strong>anonynomous blogging</strong>,
+recommends Tor, especially for <strong>anonymous blogging</strong>,
throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
web site.</a>
</li>
@@ -220,7 +220,7 @@
government grant will cover a full time stipend for a volunteer to create
curricula to <strong>show low-income populations how to use anonymity online for
safer civic engagement</strong>. Although it's often said that the poor do not use
-online access for civic engagment, failing to act in their self-interests,
+online access for civic engagement, failing to act in their self-interests,
it is our hypothesis (based on personal conversations and anecdotal
information) that it is precisely the “permanent record ”
left online that keeps many of the poor from speaking out on the Internet.
@@ -299,7 +299,7 @@
and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
+purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
you have better options than Tor. While not dismissing the potential abuses of Tor,
this page shows a few of the many important ways anonymity is used online today.</p>