<!--
- Copyright 2016-2017 Soren Stoutner <soren@stoutner.com>.
+ Copyright © 2016-2017 Soren Stoutner <soren@stoutner.com>.
This file is part of Privacy Browser <https://www.stoutner.com/privacy-browser>.
color: 0D4781;
}
+ img.title {
+ vertical-align: bottom;
+ height: 32;
+ width: 32;
+ }
+
img.center {
display: block;
margin-left: auto;
</head>
<body>
- <h3>Tor and Its Limits</h3>
+ <h3><img class="title" src="images/orbot_dark_blue.png"> Tor and Its Limits</h3>
<p>There are two general categories of bad actors that want to infringe on the privacy of the web: malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks.
TOR (The Onion Router) is useful in protecting privacy from malicious governments (which spy on traffic in transit) but not from mega corporations (which embed malicious code on web servers).</p>