commit 5ba855fc8971c8cf4a2d14b71089fd2048b52119
Author: gus <[email protected]>
Date: Fri Jul 5 15:28:22 2019 -0400
Fix broken links and typos in community resources child pages
---
content/relay-operations/community-resources/contents.lr | 10 +++++-----
.../community-resources/tor-abuse-templates/contents.lr | 2 +-
.../community-resources/tor-relay-universities/contents.lr | 5 +++--
3 files changed, 9 insertions(+), 8 deletions(-)
diff --git a/content/relay-operations/community-resources/contents.lr
b/content/relay-operations/community-resources/contents.lr
index 935d20d..e6be9c0 100644
--- a/content/relay-operations/community-resources/contents.lr
+++ b/content/relay-operations/community-resources/contents.lr
@@ -28,7 +28,7 @@ Also see the [Tor Exit Guidelines](tor-exit-guidelines).
Operators can put together their own abuse complaint template responses from
one of many templates that Tor has created: [Tor Abuse
Templates](tor-abuse-templates).
-It is important to respond to abuse complaints in a timely manner (usually
within 24 hours). If the hoster gets annoyed by the amount of abuse you can
reduce the amount of ports allowed in your exit policy. Please document your
experience with new hosters on the following wiki page:
[GoodBadISPs](/good-bad-isps)
+It is important to respond to abuse complaints in a timely manner (usually
within 24 hours). If the hoster gets annoyed by the amount of abuse you can
reduce the amount of ports allowed in your exit policy. Please document your
experience with new hosters on the following wiki page:
[GoodBadISPs](good-bad-isps)
Other docs we like:
@@ -49,11 +49,11 @@ The next steps are figuring out hardware, transit, and
server hosting. Depending
## At your university
-Many computer science departments, university libraries, and individual
students and faculty run relays from university networks. These universities
include the Massachusetts Institute of Technology (MIT CSAIL), Boston
University, the University of Waterloo, the University of Washington,
Northeastern University, Karlstad University, Universitaet Stuttgart, and
Friedrich-Alexander University Erlangen-Nuremberg. To learn more about how to
get support for a relay on your university's network, check out EFF's
resources: [Tor no campus](https://www.eff.org/torchallenge/tor-on-campus.html).
+Many computer science departments, university libraries, and individual
students and faculty run relays from university networks. These universities
include the Massachusetts Institute of Technology (MIT CSAIL), Boston
University, the University of Waterloo, the University of Washington,
Northeastern University, Karlstad University, Universitaet Stuttgart, and
Friedrich-Alexander University Erlangen-Nuremberg. To learn more about how to
get support for a relay on your university's network, check out EFF's
resources: [Tor on campus](https://www.eff.org/torchallenge/tor-on-campus.html).
## At your company or organization
-If you work at a Tor-friendly company or organization, that's another ideal
place to run a relay. Some companies running relays include Brass Horn
Communications, Quintex Alliance Consulting, and OmuraVPN. Some organizations
running Tor relays include Digital Courage, Access Now, Derechos Digitales, and
Lebanon Libraries in New Hampshire.
+If you work at a Tor-friendly company or organization, that's another ideal
place to run a relay. Some companies running relays include Brass Horn
Communications, Quintex Alliance Consulting, and OmuraVPN. Some organizations
running Tor relays include Digital Courage, [Access
Now](https://www.accessnow.org/), [Derechos
Digitales](https://tor.derechosdigitales.org), [Enjambre
Digital](https://tor.enjambre.net/) and Lebanon Libraries in New Hampshire.
# More resources
@@ -61,7 +61,7 @@ Congratulations, you're officially a Tor relay operator! What
now?
* You can check out traffic and other statistics for your relay at our [Relay
Search](https://metrics.torproject.org/rs.html) (your relay will appear on
"Relay Search" about 3 hours after you started it).
-* There is also more info about running a relay at the [Tor
FAQ](https://www.torproject.org/docs/faq.html.en#HowDoIDecide).
+* There is also more info about running a relay at the [Tor
FAQ](https://2019.www.torproject.org/docs/faq.html.en#HowDoIDecide).
-* And, most importantly, make sure to email [email protected] and [claim
your swag](https://www.torproject.org/getinvolved/tshirt.html). It's our way of
saying thanks for defending privacy and free speech online.
+* And, most importantly, make sure to email [email protected] and [claim
your swag](https://2019.www.torproject.org/getinvolved/tshirt.html). It's our
way of saying thanks for defending privacy and free speech online.
diff --git
a/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
b/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
index b24cf79..f9952e6 100644
---
a/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
+++
b/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
@@ -14,7 +14,7 @@ Below are a collection of letters you can use to respond to
your ISP about their
The general format of these templates is to inform the complaintant about Tor,
to help them to find a solution to their particular issue that works in general
for the Internet at large (open wifi, open proxies, botnets, etc), and barring
all else, how to block Tor. The philosophy of the Tor Project is that abuse
should be handled proactively by the site administrators, rather than wasting
effort and resources on seeking vengeance and chasing ghosts.
-The difference between the proactive approach and the reactive approach to
abuse is the difference between decentralized fault-tolerant Internet freedom,
and fragile, corruptible totalitarian control. To further preach to the choir,
the identity-based Internet "driver's licenses" of South Korea and China have
done nothing to curtail cybercrime and Internet abuse. In fact, all
[http://boingboing.net/2011/08/12/south-korea-to-abandon-real-name-internet-policy.html
objective evidence] seems to indicate that it has only created new markets for
organized crime to preside over. This is the core idea that these abuse
complaint templates attempt to instil in the recipient. Feel free to improve
them if you feel they fall short of this goal.
+The difference between the proactive approach and the reactive approach to
abuse is the difference between decentralized fault-tolerant Internet freedom,
and fragile, corruptible totalitarian control. To further preach to the choir,
the identity-based Internet "driver's licenses" of South Korea and China have
done nothing to curtail cybercrime and Internet abuse. In fact, all [objective
evidence](http://boingboing.net/2011/08/12/south-korea-to-abandon-real-name-internet-policy.html)
seems to indicate that it has only created new markets for organized crime to
preside over. This is the core idea that these abuse complaint templates
attempt to instil in the recipient. Feel free to improve them if you feel they
fall short of this goal.
All templates should include the Common Boilerplate below, and append some
additional paragraphs depending on the specific Scenario.
diff --git
a/content/relay-operations/community-resources/tor-relay-universities/contents.lr
b/content/relay-operations/community-resources/tor-relay-universities/contents.lr
index 0fb65a2..14040b8 100644
---
a/content/relay-operations/community-resources/tor-relay-universities/contents.lr
+++
b/content/relay-operations/community-resources/tor-relay-universities/contents.lr
@@ -30,13 +30,14 @@ In some cases, you should talk to the network security
people before you talk to
If the authorities contact your university for logs, be pleasant and helpful.
Tor's default log level doesn't provide much that's useful, so if they want
copies of your logs, that's fine. Be helpful and take the opportunity to
explain to them about Tor and why it's useful to the world. (If they contact
you directly for logs, you should send them to
your university's lawyers -- acting on it yourself is [almost always a poor
idea](https://2019.www.torproject.org/eff/tor-legal-faq.html#RequestForLogs).
-If there are too many complaints coming in, there are several approaches you
can take to reduce them. First, you should follow the tips in the [Tor relay
documentation](https://community.torproject.org/relay), such
+If there are too many complaints coming in, there are several approaches you
can take to reduce them. First, you should follow the tips in the [Tor relay
documentation](https://community.torproject.org/relay-operations), such
as picking a descriptive hostname or getting your own IP address. If that
doesn't work, you can scale back the advertised speed of your relay, by using
the Max``Advertised``Bandwidth to attract less traffic from the Tor network.
Lastly, you can scale back your exit policy.
Some people have found that their university only tolerates their Tor relay if
they're involved in a research project around anonymity. So if you're
interested, you might want to get that started early in the process -- see our
[Research Portal](https://research.torproject.org/). This approach has the
added benefit that you can draw in other faculty and students in the process.
The downside is that your Tor relay's existence is more fragile, since the
terms of its demise are already negotiated. Note that in many cases you don't
even need to be researching the exit node itself -- doing research on the Tor
network requires that there be a Tor network, after all, and keeping it going
is a community effort.
+Subscribe to [Tor Relays
Universities](https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays-universities)
mailing list (and other education institutions too).
---
-cta: Subscribe to Tor at universities, colleges, and other education
institutions:
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays-universities
+cta:
---
html: two-columns-page.html
---
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits