X-Git-Url: https://gitweb.stoutner.com/?p=PrivacyBrowserAndroid.git;a=blobdiff_plain;f=app%2Fsrc%2Fmain%2Fassets%2Fzh-rTW%2Fguide_tor.html;h=27cacb60f7efde4c258e3e0623f8d7945ba9b3bb;hp=be99b0b602688651e44a7c0d1ef0ea01521d6756;hb=2b15a4595039d5f8a5269cb990805b6e15f8613f;hpb=4d7e0bfa2399670591dc585f94a976b904787a9d diff --git a/app/src/main/assets/zh-rTW/guide_tor.html b/app/src/main/assets/zh-rTW/guide_tor.html index be99b0b6..27cacb60 100644 --- a/app/src/main/assets/zh-rTW/guide_tor.html +++ b/app/src/main/assets/zh-rTW/guide_tor.html @@ -26,6 +26,12 @@ color: 0D4781; } + img.title { + vertical-align: bottom; + height: 32; + width: 32; + } + img.center { display: block; margin-left: auto; @@ -37,7 +43,7 @@ -

Tor and Its Limits

+

Tor and Its Limits

There are two general categories of bad actors that want to infringe on the privacy of the web: malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. TOR (The Onion Router) is useful in protecting privacy from malicious governments (which spy on traffic in transit) but not from mega corporations (which embed malicious code on web servers).