07666f713165023f0aa328b7c21fb195f8eaf253
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

1) ## translation metadata
Roger Dingledine looks like we never set the...

Roger Dingledine authored 13 years ago

2) # Revision: $Revision$
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

3) # Translation-Priority: 2-medium
4) 
5) #include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8"
6) 
7) <div id="content" class="clearfix">
8)   <div id="breadcrumbs">
Andrew Lewman change all of the breadcrum...

Andrew Lewman authored 13 years ago

9)     <a href="<page index>">Home &raquo; </a>
Andrew Lewman increase max img width, lin...

Andrew Lewman authored 13 years ago

10)     <a href="<page about/overview>">About &raquo; </a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

11)     <a href="<page about/torusers>">Who Uses Tor</a>
12)   </div>
13)   <div id="maincol">
14) 
15)     <h1>Inception</h1>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

16)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

17)     <p>
Andrew Lewman update path to images with...

Andrew Lewman authored 13 years ago

18)     Tor was originally designed, implemented, and deployed as a
19)     third-generation <a href="http://www.onion-router.net/">onion routing
20)     project of the Naval Research Laboratory</a>.  It was originally
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

21)     developed with the U.S. Navy in mind, for the primary purpose of
Andrew Lewman update path to images with...

Andrew Lewman authored 13 years ago

22)     protecting government communications.  Today, it is used every day
23)     for a wide variety of purposes by the military, journalists, law
24)     enforcement officers, activists, and many others. Here are some of
25)     the specific uses we've seen or recommend.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

26)     </p>
Andrew Lewman add request for more tor st...

Andrew Lewman authored 12 years ago

27) 
28)     <p>We need your <a
29)     href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
30)     Tor stories</a>! What do you use Tor for? Why do you need it? What
31)     has Tor done for you? We need your stories.</p>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

32) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

33)     <a name="normalusers"></a>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

34)     <img src="$(IMGROOT)/family.jpg" alt="Normal People">
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

35)     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

36)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

37)     <ul>
38)     <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

39)     Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
40)     sell your Internet browsing records</a> to marketers or anyone else
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

41)     willing to pay for it. ISPs typically say that
42)     they anonymize the data by not providing personally identifiable information, but
43)     <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
44)     has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially
45)     userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
46)     </li>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

47)     <li><strong> They protect their communications from irresponsible corporations.</strong>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

48)     All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
49)     private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
50)     <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&amp;en=f6f61949c6da4d38&amp;ei=5090">giving away the data to researchers</a>,
51)     your data is often not well protected by those you are supposed to trust to keep it safe.
52)     </li>
53)     <li><strong>They protect their children online.</strong>
54)     You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

55)     by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

56)     In the United States, the government is pushing to make this mapping increasingly precise.
57)     </li>
58)     <li><strong>They research sensitive topics.</strong>
59)     There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
kat Fix dead links and update c...

kat authored 6 years ago

60)     <a href="https://web.archive.org/web/20120107130815/http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

61)     or world religions is behind a national firewall.
62)     </li>
Matt Pagan Removed links to news stori...

Matt Pagan authored 10 years ago

63) <li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
64) </li>
65) <li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

66)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

67) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

68)     <a name="journalist"></a>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

69)     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

70)     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

71)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

72)     <ul>
73)     <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
74)     tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
75)     journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
76)     </li>
kat Fix dead links and update c...

kat authored 6 years ago

77) 	<li>Tor is part of <strong><a href="https://securedrop.org/">SecureDrop</a></strong>, an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. <a href="https://securedrop.org/directory">Many news organizations</a> use SecureDrop, including the Associated Press, The Washington Post, The New York Times, The CBC, ProPublica, Dagbladet, and more.
78) 	</li>
79) 	<li>Tor preserves the ability of people behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion.
80) 	</li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

81)     <li><strong>Citizen journalists in China</strong> use Tor to write about
82)     local events to encourage social change and political reform.
83)     </li>
hiromipaw Remove deadlink in who uses...

hiromipaw authored 6 years ago

84)     <li><strong>Citizens and journalists in Internet black
85)     holes</strong> use Tor to research state propaganda and opposing
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

86)     viewpoints, to file stories with non-State controlled media, and to
87)     avoid risking the personal consequences of intellectual curiosity.
88)     </li>
89)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

90) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

91)     <a name="lawenforcement"></a>
92)     <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

93)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

94)     <ul>
95)     <li><strong>Online surveillance:</strong>
96)     Tor allows officials to surf questionable web sites and services
97)     without leaving tell-tale tracks.  If the system administrator of an
98)     illegal gambling site, for example, were to see multiple connections from
99)     government or law enforcement IP addresses in usage logs, investigations
100)     may be hampered.
101)     </li>
102)     <li><strong>Sting operations:</strong>
103)     Similarly, anonymity allows law officers to engage in online
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

104)     &ldquo;undercover &rdquo; operations.  Regardless of how good an
105)     undercover officer's &ldquo;street cred&rdquo; may be, if the
106)     communications include IP ranges from police addresses, the cover is blown.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

107)     </li>
108)     <li><strong>Truly anonymous tip lines:</strong>
109)     While online anonymous tip lines are popular, without anonymity
110)     software, they are far less useful.  Sophisticated sources understand that
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

111)     although a name or email address is not attached to information, server
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

112)     logs can identify them very quickly.  As a result, tip line web sites that
113)     do not encourage anonymity are limiting the sources of their tips.
114)     </li>
115)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

116) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

117)     <a name="activists"></a>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

118)     <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers">
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

119)     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

120)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

121)     <ul>
122)     <li><strong>Human rights activists use Tor to anonymously report abuses from
123)     danger zones.</strong>  Internationally, labor rights workers use Tor and other
124)     forms of online and offline anonymity to organize workers in accordance
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

125)     with the Universal Declaration of Human Rights. Even though they are within
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

126)     the law, it does not mean they are safe. Tor provides the ability to
127)     avoid persecution while still raising a voice.
128)     </li>
129)     <li>When groups such as the <strong>Friends Service Committee and environmental
Andrew Lewman fix another dead link.

Andrew Lewman authored 12 years ago

130)     groups are increasingly <a href="http://www.afsc.org/story/iowans-rally-defense-civil-liberties">falling under surveillance</a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

131)     in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of
132)     change rely on Tor for basic privacy during legitimate activities.
133)     </li>
134)     <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

135)     recommends Tor in their report, &ldquo;
136)     <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

137)     Complicity in Chinese Internet Censorship</a>.&rdquo; The study
138)     co-author interviewed Roger Dingledine, Tor project leader,
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

139)     on Tor use.  They cover Tor in the section on how to breach the <a
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

140)     href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

141)     Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
142)     the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

143)     </li>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

144)     <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
Andrew Lewman fix the links to amnesty's...

Andrew Lewman authored 12 years ago

145)     past <a href="http://web.archive.org/web/20090323052228/http://irrepressible.info/">corporate responsibility campaign</a></strong>.
146)     See also their 2006 <a href="http://web.archive.org/web/20090530164605/http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

147)     report</a> on China Internet issues.
148)     </li>
149)     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
150)     recommends Tor, especially for <strong>anonymous blogging</strong>,
151)     throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

152)     web site.</a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

153)     </li>
154)     <li>In the US, the Supreme Court recently stripped legal protections from
155)     government whistleblowers.  But whistleblowers working for governmental
156)     transparency or corporate accountability can use Tor to seek justice
157)     without personal repercussions.
158)     </li>
159)     <li>A contact of ours who works with a public health nonprofit in
160)     Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

161)     mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
162)     not afford to complain &mdash; this is the point at which open objection can
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

163)     become dangerous.  So his nonprofit has been working to
164)     <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
165)     </li>
166)     <li>At a recent conference, a Tor staffer ran into a woman who came from
167)     a &ldquo;company town&rdquo; in the eastern United States. She was attempting to blog anonymously to rally
168)     local residents to <strong>urge reform in the company</strong> that dominated the town's
169)     economic and government affairs. She is fully cognizant that the kind of
170)     organizing she was doing <strong>could lead to harm or &ldquo;fatal
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

171)     accidents.&rdquo;</strong>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

172)     </li>
173)     <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

174)     regarding sweatshops</strong> that produce goods for western countries and to
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

175)     organize local labor.
176)     </li>
177)     <li>
178)     Tor can help activists avoid government or corporate censorship that hinders organization.
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

179)     In one such case, a
kat Fix dead links and update c...

kat authored 6 years ago

180)     <a href="https://web.archive.org/web/20071015142759/http://www.cbc.ca:80/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

181)     to help organize a strike.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

182)     </li>
183)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

184) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

185)     <a name="spotlight"></a>
186)     <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

187)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

188)     <ul>
189)     <li>Does being in the public spotlight shut you off from having a private
190)     life, forever, online?  A rural lawyer in a New England state keeps
191)     an anonymous blog because, with the diverse clientele at his prestigious
192)     law firm, <strong>his political beliefs are bound to offend someone</strong>.  Yet, he
193)     doesn't want to remain silent on issues he cares about.  Tor helps him
194)     feel secure that he can express his opinion without consequences to his
195)     public role.
196)     </li>
197)     <li>People living in poverty often don't participate fully in civil society
198)     -- not out of ignorance or apathy, but out of fear.  If something you
199)     write were to get back to your boss, would you lose your job?  If your
200)     social worker read about your opinion of the system, would she treat
201)     you differently?  Anonymity gives a voice to the voiceless.
Andrew Lewman remove the VISTA text from...

Andrew Lewman authored 12 years ago

202)     Although it's often said that the poor do not use online access
203)     for civic engagement, failing to act in their self-interests, it
204)     is our hypothesis (based on personal conversations and anecdotal
205)     information) that it is precisely the &ldquo;permanent record
206)     &rdquo; left online that keeps many of the poor from speaking out
207)     on the Internet.  We hope to show people how to engage more safely
208)     online, and then at the end of the year, evaluate how online and
209)     offline civic engagement has changed, and how the population sees
210)     this continuing into the future.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

211)     </li>
212)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

213) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

214)     <a name="executives"></a>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

215)     <img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

216)     <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

217)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

218)     <ul>
219)     <li><strong>Security breach information clearinghouses:</strong>
220)     Say a financial institution participates in a security clearinghouse
221)     of information on Internet attacks.  Such a repository requires members
222)     to report breaches to a central group, who correlates attacks to detect
223)     coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

224)     traffic to such a repository to be able to track where information is
225)     coming from.  Even though every packet were encrypted, the IP
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

226)     address would betray the location of a compromised system.  Tor allows
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

227)     such repositories of sensitive information to resist compromises.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

228)     </li>
229)     <li><strong>Seeing your competition as your market does:</strong>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

230)     If you try to check out a competitor's pricing, you may find no
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

231)     information or misleading information on their web site.  This is because
232)     their web server may be keyed to detect connections from competitors,
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

233)     and block or spread disinformation to your staff.  Tor allows a business
234)     to view their sector as the general public would view it.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

235)     </li>
236)     <li><strong>Keeping strategies confidential:</strong>
237)     An investment bank, for example, might not want industry snoopers to be
238)     able to track what web sites their analysts are watching.  The strategic
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

239)     importance of traffic patterns, and the vulnerability of the surveillance
240)     of such data, is starting to be more widely recognized in several areas
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

241)     of the business world.
242)     </li>
243)     <li><strong>Accountability:</strong>
244)     In an age when irresponsible and unreported corporate activity has
245)     undermined multi-billion dollar businesses, an executive exercising true
246)     stewardship wants the whole staff to feel free to disclose internal
247)     malfeasance.  Tor facilitates internal accountability before it turns
248)     into whistleblowing.
249)     </li>
250)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

251) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

252)     <a name="bloggers"></a>
253)     <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

254)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

255)     <ul>
256)     <li>Frequently we hear about bloggers who are
kat Fix dead links and update c...

kat authored 6 years ago

257)     <a href="https://web.archive.org/web/20060910122231/http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

258)     <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
259)     for saying perfectly legal things online, in their blog.</li>
260)     <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
261)     <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
262)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

263) 
264)     <a name="military"></a>
265)     <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
266)     <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
267)     <hr>
268)     <ul>
269) 
270)     <li>
271)     <strong>Field agents:</strong>
272)     It is not difficult for insurgents to monitor Internet traffic and
273)     discover all the hotels and other locations from which people are
274)     connecting to known military servers.
275)     Military field agents deployed away from home use Tor to
276)     mask the sites they are visiting, protecting military interests and
277)     operations, as well as protecting themselves from physical harm.
278)     </li>
279) 
kat Change hidden service to on...

kat authored 6 years ago

280)     <li><strong>Onion services:</strong>
281) 	When the Internet was designed by DARPA, its primary purpose was to be able
282) 	to facilitate distributed, robust communications in case of local strikes.
283) 	However, some functions must be centralized, such as command and control
284) 	sites.  It's the nature of the Internet protocols to reveal the geographic
285) 	location of any server that is reachable online.  Tor's onion services
286) 	capacity allows military command and control to be physically secure from
287) 	discovery and takedown.  </li> <li><strong>Intelligence gathering:</strong>
288) 	Military personnel need to use electronic resources run and monitored by
289) 	insurgents. They do not want the webserver logs on an insurgent website to
290) 	record a military address, thereby revealing the surveillance.  </li> </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

291) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

292)     <a name="itprofessionals"></a>
293)     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

294)     <hr>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

295)     <ul>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

296)     <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
297)     <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

298)     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

299)     <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
Roger Dingledine fix typo reported on tor-as...

Roger Dingledine authored 12 years ago

300)     <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

301)     </ul>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

302) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

303)     <p>
304)     Please do send us your success stories. They are very important because
305)     Tor provides anonymity. While it is thrilling to speculate about <a
306)     href="<page docs/faq-abuse>">undesired effects of Tor</a>, when it succeeds, nobody notices.  This is
307)     great for users, but not so good for us, since publishing success
308)     stories about how people or organizations are staying anonymous could be
309)     counterproductive.  For example, we talked to an FBI officer who
310)     explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
311)     details or mention his name.</p>
Sebastian Hahn Don't put all sections with...

Sebastian Hahn authored 9 years ago

312) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

313)     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
314)     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
315)     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

316)     href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
317)     just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
kat Fix dead links and update c...

kat authored 6 years ago

318)     <a href="https://www.crimeline.co.za/">police tip lines</a>, 
319)     <a href="https://en.wikipedia.org/wiki/Closed_adoption">some adoption services</a>,
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

320)     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
Roger Dingledine change - to mdash

Roger Dingledine authored 13 years ago

321)     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

322)     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
323)     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
Andrew Lewman selectively apply a patch f...

Andrew Lewman authored 13 years ago

324)     purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the