Commit ecb2b9af authored by Tails developers's avatar Tails developers

Fix a bunch of typos.

parent 4f1026fe
......@@ -30,7 +30,7 @@ outgoing connections to the Internet are forced to go through Tor.
Tor is free software and an open network that helps you defend against a form of
network surveillance that threatens personal freedom and privacy, confidential
business activities and relationships, and state security known as traffic
analysis
analysis.
Tor protects you by bouncing your communications around a distributed network of
relays run by volunteers all around the world: it prevents somebody watching
......
......@@ -40,7 +40,7 @@ Everywhere](https://www.eff.org/https-everywhere).
## It makes it clear that you are using Tor and probably Tails
**Your IPS or your local network administrator** can easily check that you're
**Your ISP or your local network administrator** can easily check that you're
connecting to a Tor relay, and not a normal web server for example.
**The destination server your are contacting through Tor** can know whether your
......@@ -62,7 +62,7 @@ over a private connection, when in fact the entire conversation is controlled by
the attacker.
Quoted from [Wikipedia: Man-in-the-middle
attack](https://secure.wikimedia.org/wikipedia/en/wiki/Man-in-the-middle_attack)
attack](https://secure.wikimedia.org/wikipedia/en/wiki/Man-in-the-middle_attack).
![Illustration of a man-in-the-middle attack](man_in_the_middle.jpg)
......@@ -164,11 +164,11 @@ or endorse two virtual identities that you really want to keep separate on from
another. For example hiding your location to check your email and publishing
anonymously a document.
First, because Tor tend to reuse the same circuits, for example amongst a same
First, because Tor tends to reuse the same circuits, for example amongst a same
browsing session. Since the exit node of a circuit knows both the destination
server (and possibly the content of the communication if not encrypted) and the
address of the previous relay he received the communication from, it makes it
easier to correlates the several browsing request as part of a same circuit and
easier to correlate the several browsing requests as part of a same circuit and
possibly made by a same user. If your facing a global adversary as described
above, it might then also be in position to do this correlation.
......@@ -184,7 +184,7 @@ the first threat, but not the second one.
## It doesn't make your crappy passwords stronger
Tor allows you to be anonymous online and Tails to leave no trace on the
computer your using. But again, **neither of both are magic spells for computer
computer you're using. But again, **neither of both are magic spells for computer
security**.
If your use weak passwords they can be guessed by brute-force attacks with or
......
......@@ -6,7 +6,7 @@ Is Tails the right tool for me?
1. First, read the [[overview|doc/overview]] page to get a basic idea of what Tails is.
2. Then read the [[warning|doc/warning]] page to understand **what Tails doesn't protect you
against**, how you can screw up your anonimity or leave traces.
against**, how you can screw up your anonymity or leave traces.
3. If Tails is the right tool for you, go on [[downloading|download]],
[[verifying|download#index2h1]] and [[installing|download#index3h1]] it.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment