Commit 67c21ef5 authored by T(A)ILS developers's avatar T(A)ILS developers
Browse files

Design draft: small language fixes.

parent 83fece67
......@@ -116,9 +116,9 @@ attackers.
- **Identify the user's activities on the Internet**: Information such
as user-agent, locale and (especially) IP address can all be used in
various degrees to identify the user.
- **Eavesdrop on sensitive data**: Sensitive data sent through the Tor
network will only be untraceable (with respect to Tor's threat
model) and thus will be at least as likely to be eavesdropped.
- **Eavesdrop on sensitive data**: The Tor network only prevent the
data from being traced (according to Tor's threat model) but does not
protect it from eavesdropping.
- **Post-mortem user activity and sensitive data recovery**:
"Normal" operating systems keep a lot of traces about their users'
Internet activities (notably browser cache and cookies) on local
......@@ -267,7 +267,7 @@ The user should be able to do all relevant things with easy to use
graphical interfaces. As such it should be presented a solid,
user-friendly desktop environment with all the expected features after
booting: file management, system settings configuration, support
applications etc..
applications etc.
### 2.7.2 Internet applications
......@@ -358,8 +358,8 @@ Tools for creating encrypted storage containers are also recommended.
As one of the PELD intent is to permit usage of untrusty computers while
preserving anonymity, measures should be taken against hardware that
might prevent it, such as hardware
[keyloggers](http://en.wikipedia.org/wiki/Keylogger). Thus a a virtual
keyboard (used with the mouse) should be available.
[keyloggers](http://en.wikipedia.org/wiki/Keylogger). Thus a virtual
keyboard (usable with the mouse) should be available.
### 2.7.8 Entropy
......@@ -395,11 +395,11 @@ be developed with i18n/l10n-awareness in mind.
The PELD should include an easily read document explaining how to use
it and its software securely. The user should be assumed to only have
the knowledge of an average computer user, so there will be required
some explaining of general security concepts.
the knowledge of an average computer user, so it will be required to
explain some general security concepts.
Real-world experience demonstrates the average user quite rarely
thinks to upgrade his or her PELD copy, and is often pretty happy
Real-world experience demonstrates that the average user quite rarely
thinks about upgrading his or her PELD copy, and is often pretty happy
running an obsolete version affected by numerous well-known security
issues. A PELD running copy should therefore notice it is affected by
known security issues and notify the user if a newer release fixes
......@@ -416,7 +416,7 @@ to manually setting up things.
### 2.9.2 Sustainability
PELD development shoud be a team work rather than a one person work,
PELD development should be a team work rather than a one person work,
and the deep knowledge of this work should be shared between the team
members. Thus the development infrastructure should be thought and
deployed in order to share this knowledge.
......@@ -428,8 +428,8 @@ encouraged. Binary blobs should only be used when no good alternatives
exist, which could be the case with certain hardware drivers or driver
firmwares.
Similarly, it is recommended that the PELD itself is open-source, and
that it is well documented to help security analysis by third-parties.
Similarly, it is recommended for the PELD itself to be open-source, and
well documented to help security analysis by third-parties.
### 2.9.4 Easy feedback
......@@ -441,12 +441,12 @@ pseudonymous) possible way to send this feedback.
# 3 Implementation
T(A)ILS is an implementation the PELD specification above. It is
T(A)ILS is an implementation of the PELD specification above. It is
licensed under the GNU GPL version 3 or (at your option) any later
version.
Critical parts of the config (firewall, polipo and Tor config) are
based on the well known, trusted Incognito's ones.
based on the ones from the well known and trusted Incognito.
**NOTICE**: This distribution is provided as-is with no warranty of
fitness for a particular purpose, including total anonymity. Anonymity
......@@ -504,11 +504,11 @@ features.
recommended by the above specification)
- [cryptsetup](http://code.google.com/p/cryptsetup/) ensures storage
encryption using [LUKS](http://en.wikipedia.org/wiki/LUKS)
encryption using [LUKS](http://en.wikipedia.org/wiki/LUKS).
- [gnupg](http://gnupg.org) complete and free implementation of the
OpenPGP standard.
- [Torbutton](https://www.torproject.org/torbutton) offers all kind of
protection against non-HTML anonymity attacks
protection against non-HTML anonymity attacks.
- [haveged](http://freshmeat.net/projects/haveged) feeds /dev/random
using HArdware Volatile Entropy Gathering and Expansion algorithm.
- [Vidalia](https://www.torproject.org/projects/vidalia.html.en) is used
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment