|
@@ -157,7 +157,7 @@ network. This ``distributed trust'' approach means the Tor network
|
|
|
can be safely operated and used by a wide variety of mutually
|
|
|
distrustful users, providing sustainability and security.
|
|
|
|
|
|
-The Tor network has a broad range of users making it difficult for
|
|
|
+The Tor network has a broad range of users, making it difficult for
|
|
|
eavesdroppers to track them or profile interests. These include
|
|
|
ordinary citizens concerned about their privacy, corporations who
|
|
|
don't want to reveal information to their competitors, and law
|
|
@@ -171,9 +171,9 @@ This distribution of trust is central to the Tor philosophy and
|
|
|
pervades Tor at all levels: Onion routing has been open source since
|
|
|
the mid-nineties (mistrusting users can inspect the code themselves);
|
|
|
Tor is free software (anyone could take up the development of Tor from
|
|
|
-the current team); anyone can use Tor without license or charge, (which
|
|
|
-encourages a broad userbase with diverse interests); Tor is designed to be
|
|
|
-usable (also promotes a large, diverse userbase); and configurable (so
|
|
|
+the current team); anyone can use Tor without license or charge (which
|
|
|
+encourages a broad user base with diverse interests); Tor is designed to be
|
|
|
+usable (also promotes a large, diverse user base) and configurable (so
|
|
|
users can easily set up and run server nodes); the Tor
|
|
|
infrastructure is run by volunteers (it is not dependent on the
|
|
|
economic viability or business strategy of any company) who are
|
|
@@ -267,7 +267,7 @@ blockable is important to being good netizens, we would like to
|
|
|
encourage services to allow anonymous access. Services should not need
|
|
|
to decide between blocking legitimate anonymous use and allowing
|
|
|
unlimited abuse. Nonetheless, blocking IP addresses is a
|
|
|
-course-grained solution~\cite{netauth}: entire appartment buildings,
|
|
|
+course-grained solution~\cite{netauth}: entire apartment buildings,
|
|
|
campuses, and even countries sometimes share a single IP address.
|
|
|
Also, whether intended or not, such blocking supports repression of
|
|
|
free speech. In many locations where Internet access of various kinds
|
|
@@ -290,7 +290,8 @@ example, the Freenode IRC network had a problem with a coordinated
|
|
|
group of abusers joining channels and subtly taking over the
|
|
|
conversation; but when they labelled all users coming from Tor IP
|
|
|
addresses as ``anonymous users,'' removing the ability of the abusers
|
|
|
-to blend in, the abuse stopped. This is an illustration of how simple
|
|
|
+to blend in, the abusers stopped using Tor. This is an illustration of
|
|
|
+how simple
|
|
|
technical mechanisms can remove the ability to abuse anonymously
|
|
|
without undermining the ability to communicate anonymously and can
|
|
|
thus remove the incentive to attempt abusing in this way.
|