commit 0b1d62e945bc050583c227e452e09cc3cfb31d2f
Author: Stephanie A. Whited <[email protected]>
Date:   Thu Oct 31 19:11:46 2019 +0000

    slight grammar and flow edits
---
 content/training/risks/contents.lr | 28 ++++++++++++++--------------
 1 file changed, 14 insertions(+), 14 deletions(-)

diff --git a/content/training/risks/contents.lr 
b/content/training/risks/contents.lr
index c1fea57..967ab61 100644
--- a/content/training/risks/contents.lr
+++ b/content/training/risks/contents.lr
@@ -5,27 +5,27 @@ title: Risks
 body:
 
 To our knowledge, no Tor trainer has ever faced consequences as a result of 
training others or speaking about Tor.
-However, in some countries and in certain circumstances, it's possible that a 
simply gathering of human rights defenders could be very risky, illegal or even 
subject of imprisonment, physical assaults, large fines, threats, placement on 
government watch lists and targeting for surveillance.
+However, in some countries and in certain circumstances, it's possible that 
simply a gathering of human rights defenders could be risky, illegal, or even 
subject someone to imprisonment, physical assaults, large fines, threats, 
placement on government watch lists, and targeting for surveillance.
 
-If you want to run a Tor training for the first time and you don't know how to 
assess the political and social environment, we strongly encourage you read 
this document and, in case of doubt, to reach out Tor Community Team privately.
+If you want to run a Tor training for the first time and you don't know how to 
assess the political and social environment, we strongly encourage you read 
this document and, in case of doubt, to reach out to the Tor Community Team 
privately.
 
-Some of potential risks of running a digital security training are only valid 
in specific contexts.
-Therefore the potential risks associated to running a Tor training depend on:
+Some potential risks of running a digital security training are only valid in 
specific contexts.
+The potential risks associated with running a Tor training depend on:
 
 1. **Your threat model.** A high-profile activist already under a lot of 
surveillance, for example, might attract more attention when reaching out other 
activists to run a digital security training.
-2. **The laws and regulations in the country.** Best to consult with local 
lawyers and local freedom of expression organizations, and learn whether your 
country has a record in prosecuting individuals engaging in similar types of 
activities.
+2. **The laws and regulations in the country.** Consult with local lawyers and 
local freedom of expression organizations and learn whether your country has a 
record in prosecuting individuals engaging in similar types of activities.
 3. **The types of training.** Not all trainings carry the same weight in terms 
of potential risk.
-   For example, talking about privacy on digital age might be appreciable, but 
teaching how to circumvent government censorship could be a serious felony.
-4. **The audience.** Gathering university students might not attract 
attention, but in case of a group of journalists working on leaked documents 
about government corruption, you might need to be extra careful on how to reach 
out them in a private way.
-5. **The training venue.** Running a Tor training in some spaces could expose 
your participants identity.
-   Ideally, you should use a private space that you can control the 
participants entrance.
-   Check before the training if participants are comfortable on revealing 
their identity to a third party, if it's the case.
+   For example, talking about privacy in the digital age might be appreciable, 
but teaching how to circumvent government censorship could be a serious felony.
+4. **The audience.** Gathering university students might not attract 
attention, but if you're gathering a group of journalists working with leaked 
documents about government corruption, you might need to be extra careful on 
how to reach out them in a private way.
+5. **The training venue.** Running a Tor training in some spaces could expose 
your participants' identities.
+   Ideally, you should use a private space where you control the participants' 
entrance.
+   If the space isn't private, check before the training to find out if 
participants are comfortable revealing their identity to a third party.
 
 ## Evaluating risks
 
 Some questions you may want to answer before running a digital security 
training include:
 
-* Has anyone in my country ever been criminalized based on their internet 
activity? (This does not necessarily need to be specific to digital security 
training or use of Tor)
+* Has anyone in my country ever been criminalized based on their internet 
activity? (This does not necessarily need to be specific to digital security 
training or use of Tor.)
 * Are there laws in my country that require Internet Service Providers (ISPs) 
to track my online activity?
 * Is it illegal for me to access certain websites?
 * Does my country prohibit me from using:
@@ -34,11 +34,11 @@ Some questions you may want to answer before running a 
digital security training
 
 Note, this is not an exhaustive list of questions.
 
-Additionally, while many countries do not have laws specifically prohibiting 
the activity of running digital security training, the use of digital security 
tools may still be criminalized in certain countries under other, broader laws.
+Additionally, while many countries do not have laws specifically prohibiting 
the activity of running a digital security training, the use of digital 
security tools may still be criminalized in certain countries under other, 
broader laws.
 For example, using Tor Browser may be viewed as illegal or anti-government 
activity.
 
 Please note that we are not lawyers, and any information we give you does not 
constitute legal advice.
-Additionally, your communication with us is not protected by any legal 
privilege so law enforcement may subpoena and obtain any information you give 
us.
+Additionally, your communication with us is not protected by any legal 
privilege, so law enforcement may subpoena and obtain any information you give 
us.
 However, we may be able to put you in touch with lawyers who are capable of 
addressing your questions and/or concerns.
 
 Some relevant resources include:
@@ -57,4 +57,4 @@ section: training
 ---
 section_id: training
 ---
-subtitle: Things you should be aware before running a digital security training
+subtitle: Things you should be aware of before running a digital security 
training.



_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to