fix a few typos and clarify one point. i hope we have

an editor who actually edits, rather than the traditional
academic role of editors.

but in any case, it'll do. great.


svn:r10581
This commit is contained in:
Roger Dingledine 2007-06-13 10:06:19 +00:00
parent 26b9411513
commit 89b7021a8b

View file

@ -157,7 +157,7 @@ network. This ``distributed trust'' approach means the Tor network
can be safely operated and used by a wide variety of mutually can be safely operated and used by a wide variety of mutually
distrustful users, providing sustainability and security. distrustful users, providing sustainability and security.
The Tor network has a broad range of users making it difficult for The Tor network has a broad range of users, making it difficult for
eavesdroppers to track them or profile interests. These include eavesdroppers to track them or profile interests. These include
ordinary citizens concerned about their privacy, corporations who ordinary citizens concerned about their privacy, corporations who
don't want to reveal information to their competitors, and law don't want to reveal information to their competitors, and law
@ -171,9 +171,9 @@ This distribution of trust is central to the Tor philosophy and
pervades Tor at all levels: Onion routing has been open source since pervades Tor at all levels: Onion routing has been open source since
the mid-nineties (mistrusting users can inspect the code themselves); the mid-nineties (mistrusting users can inspect the code themselves);
Tor is free software (anyone could take up the development of Tor from Tor is free software (anyone could take up the development of Tor from
the current team); anyone can use Tor without license or charge, (which the current team); anyone can use Tor without license or charge (which
encourages a broad userbase with diverse interests); Tor is designed to be encourages a broad user base with diverse interests); Tor is designed to be
usable (also promotes a large, diverse userbase); and configurable (so usable (also promotes a large, diverse user base) and configurable (so
users can easily set up and run server nodes); the Tor users can easily set up and run server nodes); the Tor
infrastructure is run by volunteers (it is not dependent on the infrastructure is run by volunteers (it is not dependent on the
economic viability or business strategy of any company) who are economic viability or business strategy of any company) who are
@ -267,7 +267,7 @@ blockable is important to being good netizens, we would like to
encourage services to allow anonymous access. Services should not need encourage services to allow anonymous access. Services should not need
to decide between blocking legitimate anonymous use and allowing to decide between blocking legitimate anonymous use and allowing
unlimited abuse. Nonetheless, blocking IP addresses is a unlimited abuse. Nonetheless, blocking IP addresses is a
course-grained solution~\cite{netauth}: entire appartment buildings, course-grained solution~\cite{netauth}: entire apartment buildings,
campuses, and even countries sometimes share a single IP address. campuses, and even countries sometimes share a single IP address.
Also, whether intended or not, such blocking supports repression of Also, whether intended or not, such blocking supports repression of
free speech. In many locations where Internet access of various kinds free speech. In many locations where Internet access of various kinds
@ -290,7 +290,8 @@ example, the Freenode IRC network had a problem with a coordinated
group of abusers joining channels and subtly taking over the group of abusers joining channels and subtly taking over the
conversation; but when they labelled all users coming from Tor IP conversation; but when they labelled all users coming from Tor IP
addresses as ``anonymous users,'' removing the ability of the abusers addresses as ``anonymous users,'' removing the ability of the abusers
to blend in, the abuse stopped. This is an illustration of how simple to blend in, the abusers stopped using Tor. This is an illustration of
how simple
technical mechanisms can remove the ability to abuse anonymously technical mechanisms can remove the ability to abuse anonymously
without undermining the ability to communicate anonymously and can without undermining the ability to communicate anonymously and can
thus remove the incentive to attempt abusing in this way. thus remove the incentive to attempt abusing in this way.