tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 88a7482047f23aef9642d2977a051265df0c686d
parent efecc36148e2d896cded5b29e20838e45381dcee
Author: n_user <465f5d21-fbad-4466-a525-e21c6a62ba3f@aleeas.com>
Date:   Thu,  3 Feb 2022 14:34:31 +0000

Update unstable links to use Web Archive
Diffstat:
Mcontrib/operator-tools/tor-exit-notice.html | 4++--
1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/contrib/operator-tools/tor-exit-notice.html b/contrib/operator-tools/tor-exit-notice.html @@ -261,9 +261,9 @@ href="https://support.torproject.org/abuse/">abuse</a> is quite low. This is largely because criminals and hackers have significantly better access to privacy and anonymity than do the regular users whom they prey upon. Criminals can and do <a -href="https://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html">build, +href="https://web.archive.org/web/20211202194841/http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html">build, sell, and trade</a> far larger and <a -href="https://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html">more +href="https://web.archive.org/web/20211202194839/https://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html">more powerful networks</a> than Tor on a daily basis. Thus, in the mind of this operator, the social need for easily accessible censorship-resistant private, anonymous communication trumps the risk of unskilled bad actors, who are