commit 8c859d5bd156eaa98fb7deb0b786e17167f7860f
Author: emma peel <emma.p...@riseup.net>
Date:   Fri Mar 5 09:12:04 2021 +0100

    better lines for localization.
---
 .../tor-dmca-response/contents.lr                  | 23 +++++++++++++++++-----
 .../tor-abuse-templates/contents.lr                |  9 +++------
 .../technical-setup/bridge/docker/contents.lr      | 16 ++++-----------
 3 files changed, 25 insertions(+), 23 deletions(-)

diff --git 
a/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
 
b/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
index 847ce19..f782b29 100644
--- 
a/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
+++ 
b/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
@@ -30,15 +30,28 @@ Dear [ISP]:
 
 Thank you for forwarding me the notice you received from [copyright claimant] 
regarding [content]. I would like to assure you that I am not hosting the 
claimed infringing materials, and furthermore, the Digital Millennium Copyright 
Act's ("DMCA") safe harbors likely protect you from liability arising from this 
complaint. The notice is likely based upon misunderstandings about the law and 
about some of the software I run.
 
-As you know, the DMCA creates four "safe harbors" for service providers to 
protect them from copyright liability for the acts of their users, when the 
ISPs fulfill certain requirements. (17 U.S.C. 512) The DMCA's requirements vary 
depending on the ISP's role. You may be familiar with the "notice and takedown" 
provisions of section 512(c) of the DMCA; however, those do not apply when an 
ISP merely acts as a conduit. Instead, the "conduit" safe harbor of section 
512(a) of the DMCA has different and less burdensome eligibility requirements, 
as the D.C. Circuit Court of Appeals held in RIAA v. Verizon (see 
https://scholar.google.com/scholar_case?case=15815830240179540527) and the 
Eighth Circuit Court of Appeals confirmed in RIAA v. Charter (see 
https://scholar.google.com/scholar_case?case=11547531128234336420).
+As you know, the DMCA creates four "safe harbors" for service providers to 
protect them from copyright liability for the acts of their users, when the 
ISPs fulfill certain requirements. (17 U.S.C. 512)
+The DMCA's requirements vary depending on the ISP's role. You may be familiar 
with the "notice and takedown" provisions of section 512(c) of the DMCA; 
however, those do not apply when an ISP merely acts as a conduit.
+Instead, the "conduit" safe harbor of section 512(a) of the DMCA has different 
and less burdensome eligibility requirements, as the D.C. Circuit Court of 
Appeals held in RIAA v. Verizon (see 
https://scholar.google.com/scholar_case?case=15815830240179540527) and the 
Eighth Circuit Court of Appeals confirmed in RIAA v. Charter (see 
https://scholar.google.com/scholar_case?case=11547531128234336420).
 
-Under DMCA 512(a), service providers like you are typically protected from 
damages for copyright infringement claims if you also maintain "a policy that 
provides for termination in appropriate circumstances of subscribers and 
account holders of the service provider's system or network who are repeat 
infringers." If you have and implement such a policy, and you otherwise qualify 
for the safe harbor, you should be free from fear of copyright damages.
+Under DMCA 512(a), service providers like you are typically protected from 
damages for copyright infringement claims if you also maintain "a policy that 
provides for termination in appropriate circumstances of subscribers and 
account holders of the service provider's system or network who are repeat 
infringers."
+If you have and implement such a policy, and you otherwise qualify for the 
safe harbor, you should be free from fear of copyright damages.
 
-The copyright notice you received was likely triggered by a program I run 
called Tor. Tor is network software that helps users to enhance their privacy, 
security, and safety online. It does not host any content. Rather, it is part 
of a network of nodes on the Internet that simply pass packets among themselves 
before sending them to their destinations, just as any Internet intermediary 
does. The difference is that Tor tunnels the connections such that no hop can 
learn both the source and destination of the packets, giving users protection 
from nefarious snooping on network traffic. The result is that, unlike most 
other Internet traffic, the final IP address that the recipient receives is not 
the IP address of the sender. Tor protects users against hazards such as 
harassment, spam, and identity theft. Initial development of Tor, including 
deployment of a public-use Tor network, was a project of the U.S. Naval 
Research Laboratory, with funding from ONR and DARPA. (For more on Tor, see 
 https://www.torproject.org/.) I hope, as an organization committed to 
protecting the privacy of its customers, you'll agree that this is a valuable 
technology.
+The copyright notice you received was likely triggered by a program I run 
called Tor. Tor is network software that helps users to enhance their privacy, 
security, and safety online.
+It does not host any content. Rather, it is part of a network of nodes on the 
Internet that simply pass packets among themselves before sending them to their 
destinations, just as any Internet intermediary does.
+The difference is that Tor tunnels the connections such that no hop can learn 
both the source and destination of the packets, giving users protection from 
nefarious snooping on network traffic.
+The result is that, unlike most other Internet traffic, the final IP address 
that the recipient receives is not the IP address of the sender.
+Tor protects users against hazards such as harassment, spam, and identity 
theft. Initial development of Tor, including deployment of a public-use Tor 
network, was a project of the U.S. Naval Research Laboratory, with funding from 
ONR and DARPA. (For more on Tor, see https://www.torproject.org/.)
+I hope, as an organization committed to protecting the privacy of its 
customers, you'll agree that this is a valuable technology.
 
-While the Tor node that I run may appear to be the source of material that is 
alleged to be copyright-infringing, I do not host that material. I do not 
select the material transmitted through the Tor node that I run, and I have no 
practical means of either identifying the source of such material or preventing 
its transmission. I do nothing to encourage or promote the use of the Tor 
network for copyright infringement. For these reasons, I am not an infringer of 
copyright in any materials that are transmitted through the Tor node that I 
run, either directly or under a theory of contributory or vicarious liability. 
Therefore, you should continue to be protected under the DMCA 512(a) safe 
harbor without taking any further action.
+While the Tor node that I run may appear to be the source of material that is 
alleged to be copyright-infringing, I do not host that material.
+I do not select the material transmitted through the Tor node that I run, and 
I have no practical means of either identifying the source of such material or 
preventing its transmission.
+I do nothing to encourage or promote the use of the Tor network for copyright 
infringement.
+For these reasons, I am not an infringer of copyright in any materials that 
are transmitted through the Tor node that I run, either directly or under a 
theory of contributory or vicarious liability.
+Therefore, you should continue to be protected under the DMCA 512(a) safe 
harbor without taking any further action.
 
-Thank you for working with me on this matter. As a loyal subscriber, I 
appreciate your notifying me of this issue and hope that the protections of 
DMCA 512 put any concerns you may have to rest. If not, please contact me with 
any further questions.
+Thank you for working with me on this matter. As a loyal subscriber, I 
appreciate your notifying me of this issue and hope that the protections of 
DMCA 512 put any concerns you may have to rest.
+If not, please contact me with any further questions.
 
 Very truly yours,
 Your customer, [User]
diff --git 
a/content/relay-operations/community-resources/tor-abuse-templates/contents.lr 
b/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
index 1cd12f9..3d2f00c 100644
--- 
a/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
+++ 
b/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
@@ -92,8 +92,7 @@ We're sorry your site is experiencing this heavy load from 
Tor.
 However, it is possible that your rate limiting alarms simply experienced a 
false positive due to the amount of traffic that flows through the router.
 We provide service to almost a gigabit of traffic per second, 98% of which is 
web traffic.
 
-If the attack is real and ongoing, however, the Tor project provides an 
automated DNSRBL for you to query to block login attempts coming
-from Tor nodes: https://www.torproject.org/projects/tordnsel.html.en
+If the attack is real and ongoing, however, the Tor project provides an 
automated DNSRBL for you to query to block login attempts coming from Tor 
nodes: https://www.torproject.org/projects/tordnsel.html.en
 
 It is also possible to download a list of all Tor exit IPs that will connect 
to your server port:
 https://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=YOUR_IP&port=80
@@ -175,11 +174,9 @@ Additionally, the Tor project provides an automated DNSRBL 
for you to query to f
 
 It also provides a Bulk Exit List service for retrieving the entire list: 
https://check.torproject.org/cgi-bin/TorBulkExitList.py
 
-You can use this list to help you take a closer look at Tor orders, or to hold 
them temporarily for additional verification, without losing
-legitimate customers.
+You can use this list to help you take a closer look at Tor orders, or to hold 
them temporarily for additional verification, without losing legitimate 
customers.
 
-In fact, in my experience, the fraud processing teams contracted by many ISPs 
simply mark all requests from Tor nodes as fraud using that
-very list.
+In fact, in my experience, the fraud processing teams contracted by many ISPs 
simply mark all requests from Tor nodes as fraud using that very list.
 So it is even possible this is a legitimate order, but was flagged as fraud 
solely based on IP, especially if you contract out fraud detection to a third 
party.
 ```
 
diff --git a/content/relay-operations/technical-setup/bridge/docker/contents.lr 
b/content/relay-operations/technical-setup/bridge/docker/contents.lr
index eb449a8..00e26a1 100644
--- a/content/relay-operations/technical-setup/bridge/docker/contents.lr
+++ b/content/relay-operations/technical-setup/bridge/docker/contents.lr
@@ -9,11 +9,7 @@ body:
 ### 1. Deploy a container
 
 We provide a docker-compose file that helps you deploy the container.
-First,
-[download 
docker-compose.yml](https://dip.torproject.org/torproject/anti-censorship/docker-obfs4-bridge/raw/master/docker-compose.yml),
-and then write your bridge configuration to a new file, `.env`, which is in the
-same directory as `docker-compose.yml`. Here's a
-template:
+First, [download 
docker-compose.yml](https://dip.torproject.org/torproject/anti-censorship/docker-obfs4-bridge/raw/master/docker-compose.yml),
 and then write your bridge configuration to a new file, `.env`, which is in 
the same directory as `docker-compose.yml`. Here's a template:
 
 ```
 # Your bridge's Tor port.
@@ -24,18 +20,14 @@ PT_PORT=Y
 EMAIL=Z
 ```
 
-Replace `X` with your desired OR port, `Y` with your obfs4 port (make sure that
-**both** ports are forwarded in your firewall), and `Z` with your email 
address,
-which allows us to get in touch with you if there are problems with your 
bridge.
-With your bridge configuration in place, you can now deploy the container by
-running:
+Replace `X` with your desired OR port, `Y` with your obfs4 port (make sure 
that **both** ports are forwarded in your firewall), and `Z` with your email 
address, which allows us to get in touch with you if there are problems with 
your bridge.
+With your bridge configuration in place, you can now deploy the container by 
running:
 
 ```
 docker-compose up -d obfs4-bridge
 ```
 
-This command will automatically load your `docker-compose.yml` file while
-considering the environment variables in `.env`.
+This command will automatically load your `docker-compose.yml` file while 
considering the environment variables in `.env`.
 
 You should now see output similar to the following:
 

_______________________________________________
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to