fix the links in the exit-list notice we give out to users.

This commit is contained in:
Andrew Lewman 2011-01-26 11:14:44 -05:00 committed by Nick Mathewson
parent ebb287c75d
commit 741ef2a8cd

View File

@ -32,7 +32,7 @@ Tor Exit Router</p>
Most likely you are accessing this website because you had some issue with Most likely you are accessing this website because you had some issue with
the traffic coming from this IP. This router is part of the <a the traffic coming from this IP. This router is part of the <a
href="https://www.torproject.org/">Tor Anonymity Network</a>, which is href="https://www.torproject.org/">Tor Anonymity Network</a>, which is
dedicated to <a href="https://www.torproject.org/overview.html">providing dedicated to <a href="https://www.torproject.org/about/overview">providing
privacy</a> to people who need it most: average computer users. This privacy</a> to people who need it most: average computer users. This
router IP should be generating no other traffic, unless it has been router IP should be generating no other traffic, unless it has been
compromised.</p> compromised.</p>
@ -42,19 +42,19 @@ compromised.</p>
and serve it locally --> and serve it locally -->
<p style="text-align:center"> <p style="text-align:center">
<a href="https://www.torproject.org/overview.html"> <a href="https://www.torproject.org/about/overview">
<img src="https://www.torproject.org/images/how_tor_works_thumb.png" alt="How Tor works" style="border-style:none"/> <img src="https://www.torproject.org/images/how_tor_works_thumb.png" alt="How Tor works" style="border-style:none"/>
</a></p> </a></p>
<p> <p>
Tor sees use by <a href="https://www.torproject.org/torusers.html">many Tor sees use by <a href="https://www.torproject.org/about/torusers">many
important segments of the population</a>, including whistle blowers, important segments of the population</a>, including whistle blowers,
journalists, Chinese dissidents skirting the Great Firewall and oppressive journalists, Chinese dissidents skirting the Great Firewall and oppressive
censorship, abuse victims, stalker targets, the US military, and law censorship, abuse victims, stalker targets, the US military, and law
enforcement, just to name a few. While Tor is not designed for malicious enforcement, just to name a few. While Tor is not designed for malicious
computer users, it is true that they can use the network for malicious ends. computer users, it is true that they can use the network for malicious ends.
In reality however, the actual amount of <a In reality however, the actual amount of <a
href="https://www.torproject.org/faq-abuse.html">abuse</a> is quite low. This href="https://www.torproject.org/docs/faq-abuse">abuse</a> is quite low. This
is largely because criminals and hackers have significantly better access to is largely because criminals and hackers have significantly better access to
privacy and anonymity than do the regular users whom they prey upon. Criminals privacy and anonymity than do the regular users whom they prey upon. Criminals
can and do <a can and do <a
@ -108,15 +108,15 @@ equipment, in accordance with <a
href="http://www4.law.cornell.edu/uscode/html/uscode17/usc_sec_17_00000512----000-.html">DMCA href="http://www4.law.cornell.edu/uscode/html/uscode17/usc_sec_17_00000512----000-.html">DMCA
"safe harbor" provisions</a>. In other words, you will have just as much luck "safe harbor" provisions</a>. In other words, you will have just as much luck
sending a takedown notice to the Internet backbone providers. Please consult sending a takedown notice to the Internet backbone providers. Please consult
<a href="https://www.torproject.org/eff/tor-dmca-response.html">EFF's prepared <a href="https://www.torproject.org/eff/tor-dmca-response">EFF's prepared
response</a> for more information on this matter.</p> response</a> for more information on this matter.</p>
<p>For more information, please consult the following documentation:</p> <p>For more information, please consult the following documentation:</p>
<ol> <ol>
<li><a href="https://www.torproject.org/overview.html">Tor Overview</a></li> <li><a href="https://www.torproject.org/about/overview">Tor Overview</a></li>
<li><a href="https://www.torproject.org/faq-abuse.html">Tor Abuse FAQ</a></li> <li><a href="https://www.torproject.org/docs/faq-abuse">Tor Abuse FAQ</a></li>
<li><a href="https://www.torproject.org/eff/tor-legal-faq.html">Tor Legal FAQ</a></li> <li><a href="https://www.torproject.org/eff/tor-legal-faq">Tor Legal FAQ</a></li>
</ol> </ol>
<p> <p>
@ -134,7 +134,7 @@ the Tor network if you so desire. The Tor project provides a <a
href="https://check.torproject.org/cgi-bin/TorBulkExitList.py">web service</a> href="https://check.torproject.org/cgi-bin/TorBulkExitList.py">web service</a>
to fetch a list of all IP addresses of Tor exit nodes that allow exiting to a to fetch a list of all IP addresses of Tor exit nodes that allow exiting to a
specified IP:port combination, and an official <a specified IP:port combination, and an official <a
href="https://www.torproject.org/tordnsel/">DNSRBL</a> is also available to href="https://www.torproject.org/tordnsel/dist/">DNSRBL</a> is also available to
determine if a given IP address is actually a Tor exit server. Please determine if a given IP address is actually a Tor exit server. Please
be considerate be considerate
when using these options. It would be unfortunate to deny all Tor users access when using these options. It would be unfortunate to deny all Tor users access