commit 102571fb26503a327c0bbf19213aa9325ddb0b80
Author: emma peel <[email protected]>
Date: Thu Sep 2 14:50:41 2021 +0200
test to see if changes in content trigger the other job, and lektor is
still installed
---
content/about/contents.lr | 29 -----------------------------
1 file changed, 29 deletions(-)
diff --git a/content/about/contents.lr b/content/about/contents.lr
deleted file mode 100644
index 33bf3d4..0000000
--- a/content/about/contents.lr
+++ /dev/null
@@ -1,29 +0,0 @@
-_model: topic
----
-title: ABOUT TOR BROWSER
----
-description: Learn what Tor Browser can do to protect your privacy and
anonymity
----
-seo_slug: about
----
-key: 1
----
-body:
-
-Tor Browser uses the Tor network to protect your privacy and anonymity. Using
the Tor network has two main properties:
-
-* Your internet service provider, and anyone watching your connection locally,
will not be able to track your internet activity, including the names and
addresses of the websites you visit.
-
-* The operators of the websites and services that you use, and anyone watching
them, will see a connection coming from the Tor network instead of your real
Internet (IP) address, and will not know who you are unless you explicitly
identify yourself.
-
-In addition, Tor Browser is designed to prevent websites from
âfingerprintingâ or identifying you based on your browser configuration.
-
-By default, Tor Browser does not keep any browsing history. Cookies are only
valid for a single session (until Tor Browser is exited or a [New
Identity](/managing-identities/#new-identity) is requested).
-
-### HOW TOR WORKS
-
-Tor is a network of virtual tunnels that allows you to improve your privacy
and security on the Internet. Tor works by sending your traffic through three
random servers (also known as *relays*) in the Tor network. The last relay in
the circuit (the âexit relayâ) then sends the traffic out onto the public
Internet.
-
-<img class="" src="../static/images/how-tor-works.png" alt="How Tor Browser
works">
-
-The image above illustrates a user browsing to different websites over Tor.
The green middle computers represent relays in the Tor network, while the three
keys represent the layers of encryption between the user and each relay.
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits