mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2025-02-22 22:25:51 +01:00
fix a few typos and clarify one point. i hope we have
an editor who actually edits, rather than the traditional academic role of editors. but in any case, it'll do. great. svn:r10581
This commit is contained in:
parent
26b9411513
commit
89b7021a8b
1 changed files with 7 additions and 6 deletions
|
@ -157,7 +157,7 @@ network. This ``distributed trust'' approach means the Tor network
|
||||||
can be safely operated and used by a wide variety of mutually
|
can be safely operated and used by a wide variety of mutually
|
||||||
distrustful users, providing sustainability and security.
|
distrustful users, providing sustainability and security.
|
||||||
|
|
||||||
The Tor network has a broad range of users making it difficult for
|
The Tor network has a broad range of users, making it difficult for
|
||||||
eavesdroppers to track them or profile interests. These include
|
eavesdroppers to track them or profile interests. These include
|
||||||
ordinary citizens concerned about their privacy, corporations who
|
ordinary citizens concerned about their privacy, corporations who
|
||||||
don't want to reveal information to their competitors, and law
|
don't want to reveal information to their competitors, and law
|
||||||
|
@ -171,9 +171,9 @@ This distribution of trust is central to the Tor philosophy and
|
||||||
pervades Tor at all levels: Onion routing has been open source since
|
pervades Tor at all levels: Onion routing has been open source since
|
||||||
the mid-nineties (mistrusting users can inspect the code themselves);
|
the mid-nineties (mistrusting users can inspect the code themselves);
|
||||||
Tor is free software (anyone could take up the development of Tor from
|
Tor is free software (anyone could take up the development of Tor from
|
||||||
the current team); anyone can use Tor without license or charge, (which
|
the current team); anyone can use Tor without license or charge (which
|
||||||
encourages a broad userbase with diverse interests); Tor is designed to be
|
encourages a broad user base with diverse interests); Tor is designed to be
|
||||||
usable (also promotes a large, diverse userbase); and configurable (so
|
usable (also promotes a large, diverse user base) and configurable (so
|
||||||
users can easily set up and run server nodes); the Tor
|
users can easily set up and run server nodes); the Tor
|
||||||
infrastructure is run by volunteers (it is not dependent on the
|
infrastructure is run by volunteers (it is not dependent on the
|
||||||
economic viability or business strategy of any company) who are
|
economic viability or business strategy of any company) who are
|
||||||
|
@ -267,7 +267,7 @@ blockable is important to being good netizens, we would like to
|
||||||
encourage services to allow anonymous access. Services should not need
|
encourage services to allow anonymous access. Services should not need
|
||||||
to decide between blocking legitimate anonymous use and allowing
|
to decide between blocking legitimate anonymous use and allowing
|
||||||
unlimited abuse. Nonetheless, blocking IP addresses is a
|
unlimited abuse. Nonetheless, blocking IP addresses is a
|
||||||
course-grained solution~\cite{netauth}: entire appartment buildings,
|
course-grained solution~\cite{netauth}: entire apartment buildings,
|
||||||
campuses, and even countries sometimes share a single IP address.
|
campuses, and even countries sometimes share a single IP address.
|
||||||
Also, whether intended or not, such blocking supports repression of
|
Also, whether intended or not, such blocking supports repression of
|
||||||
free speech. In many locations where Internet access of various kinds
|
free speech. In many locations where Internet access of various kinds
|
||||||
|
@ -290,7 +290,8 @@ example, the Freenode IRC network had a problem with a coordinated
|
||||||
group of abusers joining channels and subtly taking over the
|
group of abusers joining channels and subtly taking over the
|
||||||
conversation; but when they labelled all users coming from Tor IP
|
conversation; but when they labelled all users coming from Tor IP
|
||||||
addresses as ``anonymous users,'' removing the ability of the abusers
|
addresses as ``anonymous users,'' removing the ability of the abusers
|
||||||
to blend in, the abuse stopped. This is an illustration of how simple
|
to blend in, the abusers stopped using Tor. This is an illustration of
|
||||||
|
how simple
|
||||||
technical mechanisms can remove the ability to abuse anonymously
|
technical mechanisms can remove the ability to abuse anonymously
|
||||||
without undermining the ability to communicate anonymously and can
|
without undermining the ability to communicate anonymously and can
|
||||||
thus remove the incentive to attempt abusing in this way.
|
thus remove the incentive to attempt abusing in this way.
|
||||||
|
|
Loading…
Add table
Reference in a new issue