[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r12083: make whousestor not quite as wrong. man, there is much work (website/trunk/en)



Author: arma
Date: 2007-10-21 06:42:21 -0400 (Sun, 21 Oct 2007)
New Revision: 12083

Modified:
   website/trunk/en/whousestor.wml
Log:
make whousestor not quite as wrong. man, there is much work
remaining in this one.


Modified: website/trunk/en/whousestor.wml
===================================================================
--- website/trunk/en/whousestor.wml	2007-10-21 10:16:35 UTC (rev 12082)
+++ website/trunk/en/whousestor.wml	2007-10-21 10:42:21 UTC (rev 12083)
@@ -11,13 +11,13 @@
 <h2>People like you use Tor every day to...</h2>
 
 <ul>
-<li>...protect their privacy from marketers </li>
+<li>...protect their privacy from marketers</li>
 
 <p>Anonymity helps defeat marketing that doesn't have your permissions.
 There are all kinds of unscrupulous marketing techniques that track your
 activity through cookies, web bugs, and malware by using your IP address
 to build marketing databases, often selling your private information
-without your permission.  Tor helps defeat a number of these violations
+without your permission.  Tor helps defeat many of these violations
 of your privacy.</p>
 
 <li>...preserve their kids' safety online</li>
@@ -26,7 +26,7 @@
 You've told your kids they shouldn't share personally identifying
 information online, but they may be sharing their location simply
 by not concealing their IP address from predators.  Increasingly, IP
-numbers can be literally mapped to street locations, and in the US the
+addresses can be literally mapped to street locations, and in the US the
 government is pushing to get this mapping closer and closer to your
 street address.  What if a predator heard your child was alone, and
 called up the satellite view of your address to find the best approach
@@ -39,19 +39,19 @@
 or world religions may be restricted inside a national firewall.
 Or perhaps are you afraid that if you research a particular set of
 symptoms, at some later date an insurance company could establish that
-you had suspicions of a pre-existing condition?  Want to research airline
+you had suspicions of a pre-existing condition.  Want to research airline
 security statistics or animal rights without the risk that your national
 security authorities are going to think you are a terrorist? </p>
 
 <li>...find out how other folks live</li>
 
-<p>Tor, in combination with Blossom, allows you to see the World Wide
-Web from a specific perspective.  Want to see Google come up in Polish?
-If you ask to leave the Tor cloud at a Polish Tor relay, you'll see what
+<p>Tor allows you to see the World Wide
+Web from a different perspective.  Want to see Google come up in Polish?
+If you leave the Tor cloud at a Polish Tor relay, you'll see what
 Poland sees online.  Want to check the differential pricing offered by
 an online retailer or wholesaler to folks in another country, compared
-to the pricing offered to you or your company?  Tor and Blossom can
-provide that window to the world, also.</p>
+to the pricing offered to you or your company?  Tor can
+provide that window to the world.</p>
 
 </ul>
 
@@ -61,28 +61,22 @@
 
 <li>Reporters without Borders</li>
 
-<p><a href="www.rsf.org">Reporters without Borders </a> advises
+<p><a href="http://www.rsf.org/";>Reporters without Borders</a> advises
 journalists, sources, bloggers, and dissidents online to use Tor to
 ensure their privacy.  RSF tracks internet prisoners of conscience and
 jailed or harmed journalists all over the world.</p>
 
 <li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
 
-<p>IBB recommends Tor for Internet users in countries that can not get
+<p>The US <a href="http://www.ibb.gov/";>International Broadcasting
+Bureau</a> is supporting Tor development Internet users in countries
+that can't get
 safe access to free media.  Tor not only protects freedom of expression,
 but preserves the ability of persons behind national firewalls or under
 the surveillance of repressive regimes to view information that gives
 a global perspective on democracy, economics, religion, and other vital
 topics to a full global perspective on culture.</p>
 
-<li>MediaGiraffe</li>
-
-<p>A conference for people in the media &ldquo;willing to
-stick their necks out&rdquo; recently asked Tor executive
-director, Shava Nerad, to lead a discussion of identity
-and anonymity for journalists online, and profiled <a
-href="http://www.mediagiraffe.org/wiki/index.php/Shava_Nerad";>here.</a></p>
-
 <li>Reporters in sensitive locations</li>
 
 <p>Reporters in sensitive environments can use Tor to be more secure in
@@ -100,7 +94,7 @@
 
 <li>citizen journalism</li>
 
-<p>Citizen journalists in China and &ldquo;other Internet black
+<p>Citizen journalists in China and other &ldquo;Internet black
 holes&rdquo; use Tor to write about local events and to encourage social
 change and political reform, more secure that there will not be a knock
 on their door at midnight.</p>
@@ -123,30 +117,28 @@
 
 <p>In their report &ldquo;Race to the Bottom: Corporate
 Complicity in Chinese Internet Censorship,&rdquo; a study
-co-author interviewed Roger Dingledine, Tor principal developer,
+co-author interviewed Roger Dingledine, Tor project leader,
 on Tor use.  They cover Tor in the section on how to breach the <a
 href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820";>&ldquo;Great
 Firewall of China &rdquo;</a></p>
 
-<a href="http://hrw.org/doc/?t=internet";>web site</a>
-
-<p>Human Rights Watch recommends Tor for human rights workers throughout
+<p><a href="http://hrw.org/doc/?t=internet";>Human Rights Watch</a>
+recommends Tor for human rights workers throughout
 the globe for &ldquo;secure browsing and communications.&rdquo;</p>
 
-<p>Tor has been invited to create a training for HRW field agents to be
-delivered this fall in NYC.</p>
-
 <li>Amnesty International</li>
 
 <p>Tor has consulted and volunteered help to Amnesty International's
-recent corporate responsibility campaign, http://irrepressible.info/,
-see also their full report on China Internet issues at
-http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf</p>
+recent corporate responsibility campaign at
+<a href="http://irrepressible.info/";>http://irrepressible.info/</a>.
+See also their <a
+href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf";>full
+report</a> on China Internet issues.</p>
 
 <li>Global Voices</li>
 
 <p>Global Voices can't stop recommending Tor throughout their <a
-href="http://www.google.com/search?hl=en&lr=&rls=DVFC,DVFC:1970--2,DVFC:en&q=+site:www.globalvoicesonline.org+global+voices+tor";>
+href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor";>
 web site.</a></p>
 
 <li>10% for corruption</li>
@@ -156,16 +148,16 @@
 sorts of corruption, mostly bribes and such.  When that percentage
 rises steeply, not only can they not afford the money, but they can
 not afford to complain -- this is the point at which open objection can
-become dangerous.  So his nonprofit is trying to figure out how to use
+become dangerous.  So his nonprofit has been working to use
 Tor to safely whistleblow on governmental corruption in order to continue
 their work more effectively and safely.</p>
 
 <li>Labor organizers in the US and overseas</li>
 
 <p>At a recent conference a Tor staffer ran into a woman who came from
-a  &ldquo;company town &rdquo; in a mountainous area of the
+a &ldquo;company town&rdquo; in a mountainous area of the
 eastern United States. She was attempting to blog anonymously to rally
-local residents to urge reform on the company that dominated the towns
+local residents to urge reform on the company that dominated the town's
 economic and governmental affairs, fully cognizant that the kind of
 organizing she was doing could lead to harm or &ldquo;fatal
 accidents.&rdquo;</p>
@@ -253,9 +245,9 @@
 
 <h2>Law enforcement officers use Tor</h2>
 
-<p>Undercover officers use Tor to conceal their IP of origin during
+<p>Undercover officers use Tor to conceal their IP address during
 sting operations. &ldquo;Anonymous tip lines&rdquo; may still
-preserve a log of IP origins, if the informant isn't using Tor.</p>
+preserve a log of IP addresses, if the informant isn't using Tor.</p>
 
 <ul>
 
@@ -276,14 +268,14 @@
 
 <li>truly anonymous tip lines</li>
 
-</ul>
-
 <p>While online anonymous tip lines are popular, without anonymity
 software, they are far less useful.  Sophisticated sources understand that
 although a name or email address is not attached to information, server
 logs can identify them very quickly.  As a result, tip line web sites that
 do not encourage anonymity are limiting the sources of their tips.</p>
 
+</ul>
+
 <h2>Whistleblowers use Tor</h2>
 
 <p>In the US, the Supreme Court recently stripped legal protections from
@@ -356,15 +348,15 @@
 of such data, is starting to be more widely recognized in several areas
 of the business world.</p>
 
-<li>accountability
+<li>accountability</li>
 
-</ul>
-
 <p>In an age when irresponsible and unreported corporate activity has
 undermined multi-billion dollar businesses, an executive exercising true
 stewardship wants the whole staff to feel free to disclose internal
 malfeasance.  Tor facilitates internal accountability before it turns
 into whistleblowing.</p>
 
+</ul>
+
 #include <foot.wmi>