mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 21:23:58 +01:00
fix a few typos and clarify one point. i hope we have
an editor who actually edits, rather than the traditional academic role of editors. but in any case, it'll do. great. svn:r10581
This commit is contained in:
parent
26b9411513
commit
89b7021a8b
@ -157,7 +157,7 @@ network. This ``distributed trust'' approach means the Tor network
|
||||
can be safely operated and used by a wide variety of mutually
|
||||
distrustful users, providing sustainability and security.
|
||||
|
||||
The Tor network has a broad range of users making it difficult for
|
||||
The Tor network has a broad range of users, making it difficult for
|
||||
eavesdroppers to track them or profile interests. These include
|
||||
ordinary citizens concerned about their privacy, corporations who
|
||||
don't want to reveal information to their competitors, and law
|
||||
@ -171,9 +171,9 @@ This distribution of trust is central to the Tor philosophy and
|
||||
pervades Tor at all levels: Onion routing has been open source since
|
||||
the mid-nineties (mistrusting users can inspect the code themselves);
|
||||
Tor is free software (anyone could take up the development of Tor from
|
||||
the current team); anyone can use Tor without license or charge, (which
|
||||
encourages a broad userbase with diverse interests); Tor is designed to be
|
||||
usable (also promotes a large, diverse userbase); and configurable (so
|
||||
the current team); anyone can use Tor without license or charge (which
|
||||
encourages a broad user base with diverse interests); Tor is designed to be
|
||||
usable (also promotes a large, diverse user base) and configurable (so
|
||||
users can easily set up and run server nodes); the Tor
|
||||
infrastructure is run by volunteers (it is not dependent on the
|
||||
economic viability or business strategy of any company) who are
|
||||
@ -267,7 +267,7 @@ blockable is important to being good netizens, we would like to
|
||||
encourage services to allow anonymous access. Services should not need
|
||||
to decide between blocking legitimate anonymous use and allowing
|
||||
unlimited abuse. Nonetheless, blocking IP addresses is a
|
||||
course-grained solution~\cite{netauth}: entire appartment buildings,
|
||||
course-grained solution~\cite{netauth}: entire apartment buildings,
|
||||
campuses, and even countries sometimes share a single IP address.
|
||||
Also, whether intended or not, such blocking supports repression of
|
||||
free speech. In many locations where Internet access of various kinds
|
||||
@ -290,7 +290,8 @@ example, the Freenode IRC network had a problem with a coordinated
|
||||
group of abusers joining channels and subtly taking over the
|
||||
conversation; but when they labelled all users coming from Tor IP
|
||||
addresses as ``anonymous users,'' removing the ability of the abusers
|
||||
to blend in, the abuse stopped. This is an illustration of how simple
|
||||
to blend in, the abusers stopped using Tor. This is an illustration of
|
||||
how simple
|
||||
technical mechanisms can remove the ability to abuse anonymously
|
||||
without undermining the ability to communicate anonymously and can
|
||||
thus remove the incentive to attempt abusing in this way.
|
||||
|
Loading…
Reference in New Issue
Block a user