Browse Source

fix the links in the exit-list notice we give out to users.

Andrew Lewman 13 years ago
parent
commit
741ef2a8cd
1 changed files with 9 additions and 9 deletions
  1. 9 9
      contrib/tor-exit-notice.html

+ 9 - 9
contrib/tor-exit-notice.html

@@ -32,7 +32,7 @@ Tor Exit Router</p>
 Most likely you are accessing this website because you had some issue with
 Most likely you are accessing this website because you had some issue with
 the traffic coming from this IP. This router is part of the <a
 the traffic coming from this IP. This router is part of the <a
 href="https://www.torproject.org/">Tor Anonymity Network</a>, which is
 href="https://www.torproject.org/">Tor Anonymity Network</a>, which is
-dedicated to <a href="https://www.torproject.org/overview.html">providing
+dedicated to <a href="https://www.torproject.org/about/overview">providing
 privacy</a> to people who need it most: average computer users. This
 privacy</a> to people who need it most: average computer users. This
 router IP should be generating no other traffic, unless it has been
 router IP should be generating no other traffic, unless it has been
 compromised.</p>
 compromised.</p>
@@ -42,19 +42,19 @@ compromised.</p>
      and serve it locally -->
      and serve it locally -->
 
 
 <p style="text-align:center">
 <p style="text-align:center">
-<a href="https://www.torproject.org/overview.html">
+<a href="https://www.torproject.org/about/overview">
 <img src="https://www.torproject.org/images/how_tor_works_thumb.png" alt="How Tor works" style="border-style:none"/>
 <img src="https://www.torproject.org/images/how_tor_works_thumb.png" alt="How Tor works" style="border-style:none"/>
 </a></p>
 </a></p>
 
 
 <p>
 <p>
-Tor sees use by <a href="https://www.torproject.org/torusers.html">many
+Tor sees use by <a href="https://www.torproject.org/about/torusers">many
 important segments of the population</a>, including whistle blowers,
 important segments of the population</a>, including whistle blowers,
 journalists, Chinese dissidents skirting the Great Firewall and oppressive
 journalists, Chinese dissidents skirting the Great Firewall and oppressive
 censorship, abuse victims, stalker targets, the US military, and law
 censorship, abuse victims, stalker targets, the US military, and law
 enforcement, just to name a few.  While Tor is not designed for malicious
 enforcement, just to name a few.  While Tor is not designed for malicious
 computer users, it is true that they can use the network for malicious ends.
 computer users, it is true that they can use the network for malicious ends.
 In reality however, the actual amount of <a
 In reality however, the actual amount of <a
-href="https://www.torproject.org/faq-abuse.html">abuse</a> is quite low. This
+href="https://www.torproject.org/docs/faq-abuse">abuse</a> is quite low. This
 is largely because criminals and hackers have significantly better access to
 is largely because criminals and hackers have significantly better access to
 privacy and anonymity than do the regular users whom they prey upon. Criminals
 privacy and anonymity than do the regular users whom they prey upon. Criminals
 can and do <a
 can and do <a
@@ -108,15 +108,15 @@ equipment, in accordance with <a
 href="http://www4.law.cornell.edu/uscode/html/uscode17/usc_sec_17_00000512----000-.html">DMCA
 href="http://www4.law.cornell.edu/uscode/html/uscode17/usc_sec_17_00000512----000-.html">DMCA
 "safe harbor" provisions</a>. In other words, you will have just as much luck
 "safe harbor" provisions</a>. In other words, you will have just as much luck
 sending a takedown notice to the Internet backbone providers. Please consult
 sending a takedown notice to the Internet backbone providers. Please consult
-<a href="https://www.torproject.org/eff/tor-dmca-response.html">EFF's prepared
+<a href="https://www.torproject.org/eff/tor-dmca-response">EFF's prepared
 response</a> for more information on this matter.</p>
 response</a> for more information on this matter.</p>
 
 
 <p>For more information, please consult the following documentation:</p>
 <p>For more information, please consult the following documentation:</p>
 
 
 <ol>
 <ol>
-<li><a href="https://www.torproject.org/overview.html">Tor Overview</a></li>
-<li><a href="https://www.torproject.org/faq-abuse.html">Tor Abuse FAQ</a></li>
-<li><a href="https://www.torproject.org/eff/tor-legal-faq.html">Tor Legal FAQ</a></li>
+<li><a href="https://www.torproject.org/about/overview">Tor Overview</a></li>
+<li><a href="https://www.torproject.org/docs/faq-abuse">Tor Abuse FAQ</a></li>
+<li><a href="https://www.torproject.org/eff/tor-legal-faq">Tor Legal FAQ</a></li>
 </ol>
 </ol>
 
 
 <p>
 <p>
@@ -134,7 +134,7 @@ the Tor network if you so desire. The Tor project provides a <a
 href="https://check.torproject.org/cgi-bin/TorBulkExitList.py">web service</a>
 href="https://check.torproject.org/cgi-bin/TorBulkExitList.py">web service</a>
 to fetch a list of all IP addresses of Tor exit nodes that allow exiting to a
 to fetch a list of all IP addresses of Tor exit nodes that allow exiting to a
 specified IP:port combination, and an official <a
 specified IP:port combination, and an official <a
-href="https://www.torproject.org/tordnsel/">DNSRBL</a> is also available to
+href="https://www.torproject.org/tordnsel/dist/">DNSRBL</a> is also available to
 determine if a given IP address is actually a Tor exit server. Please
 determine if a given IP address is actually a Tor exit server. Please
 be considerate
 be considerate
 when using these options. It would be unfortunate to deny all Tor users access
 when using these options. It would be unfortunate to deny all Tor users access