Author: arma
Date: 2010-10-10 00:25:46 +0000 (Sun, 10 Oct 2010)
New Revision: 23532
Modified:
website/trunk/about/en/torusers.wml
Log:
change - to mdash
Modified: website/trunk/about/en/torusers.wml
===================================================================
--- website/trunk/about/en/torusers.wml 2010-10-10 00:23:31 UTC (rev 23531)
+++ website/trunk/about/en/torusers.wml 2010-10-10 00:25:46 UTC (rev 23532)
@@ -311,11 +311,11 @@
debate (<a
href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over
anonymity. The Tor project is based on the belief that anonymity is not
- just a good idea some of the time - it is a requirement for a free and
functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF
maintains a good overview</a> of how anonymity was crucial to the founding of
the United States. Anonymity is recognized by US courts as a fundamental and
important right. In fact, governments mandate anonymity in many cases
themselves:
+ just a good idea some of the time — it is a requirement for a free
and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF
maintains a good overview</a> of how anonymity was crucial to the founding of
the United States. Anonymity is recognized by US courts as a fundamental and
important right. In fact, governments mandate anonymity in many cases
themselves:
<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
<a
href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption
services</a>,
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police
officer identities</a>,
- and so forth. It would be impossible to rehash the entire anonymity debate
here - it is too large an issue with too many nuances, and there
+ and so forth. It would be impossible to rehash the entire anonymity debate
here — it is too large an issue with too many nuances, and there
are plenty of other places where this information can be found. We do have
a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
the possible abuse cases for Tor, but suffice it to say that if you want
to abuse the system, you'll either find it mostly closed for your
purposes (e.g. the majority of Tor relays do not support SMTP in order to
prevent anonymous email spamming), or if you're one of the