[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [webwml/staging] Don't put all sections with pictures on top on torusers page
commit b563db366d1275550166f8bf46b099ac5d83c10b
Author: Sebastian Hahn <sebastian@xxxxxxxxxxxxxx>
Date: Sat Mar 14 13:36:45 2015 +0100
Don't put all sections with pictures on top on torusers page
---
about/en/torusers.wml | 76 ++++++++++++++++++++++++-------------------------
1 file changed, 38 insertions(+), 38 deletions(-)
diff --git a/about/en/torusers.wml b/about/en/torusers.wml
index 24516c7..2ec4f2e 100644
--- a/about/en/torusers.wml
+++ b/about/en/torusers.wml
@@ -29,7 +29,7 @@
href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
Tor stories</a>! What do you use Tor for? Why do you need it? What
has Tor done for you? We need your stories.</p>
-
+
<a name="normalusers"></a>
<img src="$(IMGROOT)/family.jpg" alt="Normal People">
<h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
@@ -64,35 +64,7 @@
</li>
<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
</ul>
-
- <a name="military"></a>
- <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
- <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
- <hr>
- <ul>
-
- <li>
- <strong>Field agents:</strong>
- It is not difficult for insurgents to monitor Internet traffic and
- discover all the hotels and other locations from which people are
- connecting to known military servers.
- Military field agents deployed away from home use Tor to
- mask the sites they are visiting, protecting military interests and
- operations, as well as protecting themselves from physical harm.
- </li>
-
- <li><strong>Hidden services:</strong>
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and
- control to be physically secure from discovery and takedown.
- </li>
- <li><strong>Intelligence gathering:</strong>
- Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
- to record a military address, thereby revealing the surveillance.
- </li>
- </ul>
-
+
<a name="journalist"></a>
<img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
@@ -118,7 +90,7 @@
avoid risking the personal consequences of intellectual curiosity.
</li>
</ul>
-
+
<a name="lawenforcement"></a>
<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
<hr>
@@ -144,7 +116,7 @@
do not encourage anonymity are limiting the sources of their tips.
</li>
</ul>
-
+
<a name="activists"></a>
<img src="$(IMGROOT)/activists.jpg" alt="Activists & Whistleblowers">
<h2><a class="anchor" href="#activists">Activists & Whistleblowers use Tor</a></h2>
@@ -212,7 +184,7 @@
to help organize a strike.
</li>
</ul>
-
+
<a name="spotlight"></a>
<h2><a class="anchor" href="#spotlight">High & low profile people use Tor</a></h2>
<hr>
@@ -241,7 +213,7 @@
this continuing into the future.
</li>
</ul>
-
+
<a name="executives"></a>
<img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
@@ -279,7 +251,7 @@
into whistleblowing.
</li>
</ul>
-
+
<a name="bloggers"></a>
<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
<hr>
@@ -291,7 +263,35 @@
<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
<li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
</ul>
-
+
+ <a name="military"></a>
+ <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
+ <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
+ <hr>
+ <ul>
+
+ <li>
+ <strong>Field agents:</strong>
+ It is not difficult for insurgents to monitor Internet traffic and
+ discover all the hotels and other locations from which people are
+ connecting to known military servers.
+ Military field agents deployed away from home use Tor to
+ mask the sites they are visiting, protecting military interests and
+ operations, as well as protecting themselves from physical harm.
+ </li>
+
+ <li><strong>Hidden services:</strong>
+ When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
+ local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to
+ reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and
+ control to be physically secure from discovery and takedown.
+ </li>
+ <li><strong>Intelligence gathering:</strong>
+ Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
+ to record a military address, thereby revealing the surveillance.
+ </li>
+ </ul>
+
<a name="itprofessionals"></a>
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
<hr>
@@ -302,7 +302,7 @@
<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
<li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
</ul>
-
+
<p>
Please do send us your success stories. They are very important because
Tor provides anonymity. While it is thrilling to speculate about <a
@@ -312,7 +312,7 @@
counterproductive. For example, we talked to an FBI officer who
explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide
details or mention his name.</p>
-
+
<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous
debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits