Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
tails
tails
Commits
ecb2b9af
Commit
ecb2b9af
authored
Apr 16, 2011
by
Tails developers
Browse files
Fix a bunch of typos.
parent
4f1026fe
Changes
3
Hide whitespace changes
Inline
Side-by-side
wiki/src/doc/overview.mdwn
View file @
ecb2b9af
...
...
@@ -30,7 +30,7 @@ outgoing connections to the Internet are forced to go through Tor.
Tor is free software and an open network that helps you defend against a form of
network surveillance that threatens personal freedom and privacy, confidential
business activities and relationships, and state security known as traffic
analysis
analysis
.
Tor protects you by bouncing your communications around a distributed network of
relays run by volunteers all around the world: it prevents somebody watching
...
...
wiki/src/doc/warning.mdwn
View file @
ecb2b9af
...
...
@@ -40,7 +40,7 @@ Everywhere](https://www.eff.org/https-everywhere).
## It makes it clear that you are using Tor and probably Tails
**Your I
P
S or your local network administrator** can easily check that you're
**Your IS
P
or your local network administrator** can easily check that you're
connecting to a Tor relay, and not a normal web server for example.
**The destination server your are contacting through Tor** can know whether your
...
...
@@ -62,7 +62,7 @@ over a private connection, when in fact the entire conversation is controlled by
the attacker.
Quoted from [Wikipedia: Man-in-the-middle
attack](https://secure.wikimedia.org/wikipedia/en/wiki/Man-in-the-middle_attack)
attack](https://secure.wikimedia.org/wikipedia/en/wiki/Man-in-the-middle_attack)
.

...
...
@@ -164,11 +164,11 @@ or endorse two virtual identities that you really want to keep separate on from
another. For example hiding your location to check your email and publishing
anonymously a document.
First, because Tor tend to reuse the same circuits, for example amongst a same
First, because Tor tend
s
to reuse the same circuits, for example amongst a same
browsing session. Since the exit node of a circuit knows both the destination
server (and possibly the content of the communication if not encrypted) and the
address of the previous relay he received the communication from, it makes it
easier to correlate
s
the several browsing request as part of a same circuit and
easier to correlate the several browsing request
s
as part of a same circuit and
possibly made by a same user. If your facing a global adversary as described
above, it might then also be in position to do this correlation.
...
...
@@ -184,7 +184,7 @@ the first threat, but not the second one.
## It doesn't make your crappy passwords stronger
Tor allows you to be anonymous online and Tails to leave no trace on the
computer you
r
using. But again, **neither of both are magic spells for computer
computer you
're
using. But again, **neither of both are magic spells for computer
security**.
If your use weak passwords they can be guessed by brute-force attacks with or
...
...
wiki/src/getting_started.mdwn
View file @
ecb2b9af
...
...
@@ -6,7 +6,7 @@ Is Tails the right tool for me?
1. First, read the [[overview|doc/overview]] page to get a basic idea of what Tails is.
2. Then read the [[warning|doc/warning]] page to understand **what Tails doesn't protect you
against**, how you can screw up your anon
i
mity or leave traces.
against**, how you can screw up your anon
y
mity or leave traces.
3. If Tails is the right tool for you, go on [[downloading|download]],
[[verifying|download#index2h1]] and [[installing|download#index3h1]] it.
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment