[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r23532: {website} change - to mdash (website/trunk/about/en)
Author: arma
Date: 2010-10-10 00:25:46 +0000 (Sun, 10 Oct 2010)
New Revision: 23532
Modified:
website/trunk/about/en/torusers.wml
Log:
change - to mdash
Modified: website/trunk/about/en/torusers.wml
===================================================================
--- website/trunk/about/en/torusers.wml 2010-10-10 00:23:31 UTC (rev 23531)
+++ website/trunk/about/en/torusers.wml 2010-10-10 00:25:46 UTC (rev 23532)
@@ -311,11 +311,11 @@
debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
- just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
+ just a good idea some of the time — it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
- and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
+ and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there
are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the