summaryrefslogtreecommitdiffstats
path: root/wiki/src/about.mdwn
diff options
context:
space:
mode:
authorJesse Weinstein <jesse@wefu.org>2015-10-19 22:58:54 -0700
committersajolida <sajolida@pimienta.org>2015-10-30 10:24:53 +0000
commit01d01ff94a51c2bba8a0f8cfa58b4219ba7ebc29 (patch)
tree6b27fdda99833b4ef1557aa51c9f133c59597d0e /wiki/src/about.mdwn
parent646ee711a5fba5f55d7881bb1ef64e03dbc18733 (diff)
Native English fixes for about.mdwn
Diffstat (limited to 'wiki/src/about.mdwn')
-rw-r--r--wiki/src/about.mdwn38
1 files changed, 19 insertions, 19 deletions
diff --git a/wiki/src/about.mdwn b/wiki/src/about.mdwn
index a13d5cf..44600fc 100644
--- a/wiki/src/about.mdwn
+++ b/wiki/src/about.mdwn
@@ -35,12 +35,12 @@ online:
- if an application tries to connect to the Internet directly, the
connection is automatically blocked for security.
-Tor is free software and an open network that helps you defend against a form of
+Tor is free software which forms an open, distributed network that helps defend
+against traffic analysis, a form of
network surveillance that threatens personal freedom and privacy, confidential
-business activities and relationships, and state security known as traffic
-analysis.
+business activities and relationships, and state security.
-Tor protects you by bouncing your communications around a distributed network of
+Tor protects you by bouncing your communications around a network of
relays run by volunteers all around the world: it prevents somebody watching
your Internet connection from learning what sites you visit, and it prevents the
sites you visit from learning your physical location.
@@ -53,7 +53,7 @@ Using Tor you can:
such as [[bridges|doc/first_steps/startup_options/bridge_mode]].
To learn more about Tor, see the official [Tor
-website](https://www.torproject.org/):
+website](https://www.torproject.org/), particularly the following pages:
- [Tor overview: Why we need
Tor](https://www.torproject.org/about/overview.html.en#whyweneedtor)
@@ -63,8 +63,8 @@ website](https://www.torproject.org/):
- [Understanding and Using Tor — An Introduction for the
Layman](https://trac.torproject.org/projects/tor/wiki/doc/TorALaymansGuide)
-To learn more about how the usage of Tor is enforced, see our [[design
-document|contribute/design/Tor_enforcement]].
+To learn more about how Tails ensures all its network connections use Tor,
+see our [[design document|contribute/design/Tor_enforcement]].
I2P
---
@@ -84,18 +84,18 @@ Use anywhere but leave no trace
Using Tails on a computer doesn't alter or depend on the operating system
installed on it. So you can use it in the same way on your computer, a
-friend's or one at your local library. After shutting down Tails,
-the computer can start again on its usual operating system.
+friend's computer, or one at your local library. After shutting down Tails,
+the computer will start again with its usual operating system.
Tails is configured with special care to not use the computer's hard-disks,
even if there is some swap space on them. The only storage space used by Tails is
-the RAM, which is automatically erased when the computer shuts down. So
-you won't leave any trace neither of the Tails system nor of what you did on
-the computer. That's why we call it "amnesic".
+in RAM, which is automatically erased when the computer shuts down. So
+you won't leave any trace on the computer either of the Tails system itself or
+what you used it for. That's why we call Tails "amnesic".
-This allows you to work on sensitive documents on any computer and protect you
+This allows you to work with sensitive documents on any computer and protects you
from data recovery after shutdown. Of course, you can still explicitly save
-some documents to another USB or external hard-disk and take them away for
+specific documents to another USB or external hard-disk and take them away for
future use.
<a id="cryptography"></a>
@@ -111,7 +111,7 @@ encryption:
class="definition">[[!wikipedia LUKS]]</span>, the Linux standard for
disk-encryption.
- - Automatically encrypt with HTTPS all your communications to a number of
+ - Automatically use HTTPS to encrypt all your communications to a number of
major websites using [HTTPS
Everywhere](https://www.eff.org/https-everywhere), a Firefox extension
developed by the [Electronic Frontier Foundation](https://www.eff.org).
@@ -136,12 +136,12 @@ What's next?
To continue discovering Tails, you can now read:
- - the [[warning page|doc/about/warning]] to understand better the security limitations of Tails and Tor,
+ - the [[warning page|doc/about/warning]] to better understand the security limitations of Tails and Tor,
- more details about the [[features and software|doc/about/features]] included in Tails,
- our [[documentation|doc]] explaining in detail how to use Tails,
- - some hints on why [[should you trust Tails|doc/about/trust]],
- - our [[design document|contribute/design]] about Tails specification, threat model and implementation,
- - the [[calendar|contribute/calendar]] holds the release dates, meetings and other events.
+ - some hints on why [[you should trust Tails|doc/about/trust]],
+ - our [[design document|contribute/design]] laying out Tails specification, threat model and implementation,
+ - the [[calendar|contribute/calendar]] that holds our release dates, meetings and other events.
Press and media
===============