the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 1) ## translation metadata
en/whousestor.wml 2) # Revision: $Revision$
en/whousestor.wml 3)
en/whousestor.wml 4) #include "head.wmi" TITLE="Who uses Tor?"
en/whousestor.wml 5)
|
help explain which files ar...
Roger Dingledine authored 16 years ago
|
en/torusers.wml 6) # Note to translators: this file is still under construction, and
en/torusers.wml 7) # will probably change a whole lot before we link to it. So it's
en/torusers.wml 8) # probably best to not translate it yet.
en/torusers.wml 9)
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 10) <div class="main-column">
en/whousestor.wml 11)
en/whousestor.wml 12) <h1>Who uses Tor?</h1>
en/whousestor.wml 13)
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 14) <p>
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 15) If you have a success story with Tor, especially one we
en/torusers.wml 16) can link to, please <a href="<page contact>">send us</a> a note!
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 17) </p>
en/whousestor.wml 18)
en/whousestor.wml 19) <p>
|
edit whousestor a little.
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 20) Tor provides anonymity: when it succeeds, nobody notices. This is
en/whousestor.wml 21) great for users, but not so good for us, since publishing success
en/whousestor.wml 22) stories about how people or organizations are staying anonymous could be
en/whousestor.wml 23) counterproductive.
en/whousestor.wml 24) As an example, we talked
|
Website tweaks from sjmurdo...
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 25) to an FBI officer who explained that he uses Tor every day for his
en/whousestor.wml 26) work — but he quickly followed up
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 27) with a request not to provide details or mention his name.
en/whousestor.wml 28) </p>
en/whousestor.wml 29)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 30) <p>
en/torusers.wml 31) Like any technology, from pencils to cellphones to airplanes, anonymity can be used for both good and evil.
en/torusers.wml 32) You have probably seen at least some of the vigorous debate
en/torusers.wml 33) (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
en/torusers.wml 34) <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
en/torusers.wml 35) and
en/torusers.wml 36) <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
en/torusers.wml 37) over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
en/torusers.wml 38) <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
en/torusers.wml 39) <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
en/torusers.wml 40) <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
en/torusers.wml 41) and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support port 25 to prevent anonymous email spamming), or if you're one of the
en/torusers.wml 42) <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Internet</a>,
en/torusers.wml 43) you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 44) </p>
en/whousestor.wml 45)
en/whousestor.wml 46)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 47) <h2>Everyday, ordinary Internet surfers use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 48)
en/whousestor.wml 49) <ul>
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 50) <li>
en/torusers.wml 51) <strong>They protect their privacy from unscrupulous
en/torusers.wml 52) marketers and identity thieves.</strong>
en/torusers.wml 53) Internet Service Providers (ISPs)
en/torusers.wml 54) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
en/torusers.wml 55) sell your Internet browsing records</a>
en/torusers.wml 56) to marketers or anyone else willing to pay for it. They typically say that
en/torusers.wml 57) they anonymize it by not providing your username or personally
en/torusers.wml 58) identifiable information, but
en/torusers.wml 59) <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.
en/torusers.wml 60) A full record of every
en/torusers.wml 61) site you visit, the text of every search you perform, and potentially
en/torusers.wml 62) userid and even password information can still be part of this data.
en/torusers.wml 63) In addition to your ISP, the websites
en/torusers.wml 64) (<a href="http://www.google.com/privacy_faq.html">and search engines</a>)
en/torusers.wml 65) you visit have their own logs,
en/torusers.wml 66) containing the same or more information.
en/torusers.wml 67) </li>
en/torusers.wml 68)
en/torusers.wml 69) <li>
en/torusers.wml 70) <strong> They protect their communications from irresponsible corporations.</strong>
en/torusers.wml 71) All over the net, Tor is being recommended to people newly concerned
en/torusers.wml 72) about their privacy in the face of increasing breaches and betrayals of
en/torusers.wml 73) private data. From
en/torusers.wml 74) <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
en/torusers.wml 75) <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
en/torusers.wml 76) your data is often not well protected by those you are supposed to trust to keep it safe.
en/torusers.wml 77) </li>
en/torusers.wml 78)
en/torusers.wml 79) <li>
en/torusers.wml 80) <strong>They protect their children online.</strong>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 81) You've told your kids they shouldn't share personally identifying
en/whousestor.wml 82) information online, but they may be sharing their location simply
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 83) by not concealing their IP address. Increasingly, IP
en/torusers.wml 84) addresses can be
en/torusers.wml 85) <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>,
en/torusers.wml 86) and can
en/torusers.wml 87) <a href="http://whatsmyip.org/more/">reveal other information</a>
en/torusers.wml 88) about how you are connecting to the Internet.
en/torusers.wml 89) In the United States the
en/torusers.wml 90) government is pushing to make this mapping increasingly precise.
en/torusers.wml 91) </li>
en/torusers.wml 92)
en/torusers.wml 93) <li>
en/torusers.wml 94) <strong>They research sensitive topics.</strong>
en/torusers.wml 95) There's a wealth of information available online. But perhaps in your
en/torusers.wml 96) country, access to information on AIDS, birth control,
en/torusers.wml 97) <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
|
edit whousestor a little.
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 98) or world religions is behind a national firewall.
en/whousestor.wml 99) Or perhaps you are worried that if you research a particular set of
en/whousestor.wml 100) symptoms, at some later date an insurance company might buy the
en/whousestor.wml 101) logs of the websites you visited and establish that
en/whousestor.wml 102) you had suspicions of a pre-existing condition.
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 103) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 104)
en/whousestor.wml 105) </ul>
en/whousestor.wml 106)
en/whousestor.wml 107)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 108)
en/torusers.wml 109) <h2>Soldiers in the field use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 110) <ul>
en/whousestor.wml 111)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 112) <li>
en/torusers.wml 113) <strong>Military field agents:</strong>
en/torusers.wml 114) How much, do you imagine, would the Iraqi insurgency pay to find out
en/torusers.wml 115) the location of every computer in Baghdad that logged into a military
en/torusers.wml 116) server in Maryland to read email? Tor can protect military personnel in
en/torusers.wml 117) the field by hiding their location.
en/torusers.wml 118) </li>
en/torusers.wml 119)
en/torusers.wml 120) <li>
en/torusers.wml 121) <strong>Hidden services:</strong>
en/torusers.wml 122) When the Internet was designed by DARPA, its primary purpose was to
en/torusers.wml 123) be able to facilitate distributed, robust communications in case of
en/torusers.wml 124) local strikes. However, some functions must be centralized, such as
en/torusers.wml 125) command and control sites. It's the nature of the Internet protocols to
en/torusers.wml 126) reveal the geographic location of any server that is reachable online.
en/torusers.wml 127) Tor's hidden services capacity allows military command and
en/torusers.wml 128) control to be physically secure from discovery and takedown.
en/torusers.wml 129) </li>
en/torusers.wml 130)
en/torusers.wml 131) <li>
en/torusers.wml 132) <strong>Intelligence gathering:</strong>
en/torusers.wml 133) Military personnel need to use electronic resources run and monitored
en/torusers.wml 134) by insurgents. Obviously, they do not want the server logs on an insurgent
en/torusers.wml 135) website to show a military address, revealing their surveillance.
en/torusers.wml 136) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 137)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 138) </ul>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 139)
en/whousestor.wml 140)
en/whousestor.wml 141)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 142) <h2>Journalists and their audience use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 143)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 144) <ul>
en/torusers.wml 145) <li><strong>
en/torusers.wml 146) <a href="http://www.rsf.org/">Reporters without Borders</a></strong>
en/torusers.wml 147) tracks internet prisoners of conscience and
en/torusers.wml 148) jailed or harmed journalists all over the world. They advise
en/torusers.wml 149) journalists, sources, bloggers, and dissidents to use Tor to
en/torusers.wml 150) ensure their privacy and safety.
en/torusers.wml 151) </li>
en/torusers.wml 152)
en/torusers.wml 153) <li>
en/torusers.wml 154) <strong>The US <a href="http://www.ibb.gov/">International Broadcasting
en/torusers.wml 155) Bureau</a></strong> (Voice of America/Radio Free Europe/Radio Free Asia)
en/torusers.wml 156) supports Tor development to help Internet users in countries without
en/torusers.wml 157) safe access to free media. Tor
en/torusers.wml 158) preserves the ability of persons behind national firewalls or under
en/torusers.wml 159) the surveillance of repressive regimes to obtain
en/torusers.wml 160) a global perspective on controversial topics including democracy,
en/torusers.wml 161) economics and religion.
en/torusers.wml 162) </li>
en/torusers.wml 163)
en/torusers.wml 164) <li>
en/torusers.wml 165) Although we often think of foreign journalists working in far off lands,
en/torusers.wml 166) <strong>citizen journalists in China and other
en/torusers.wml 167) <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
en/torusers.wml 168) use Tor to write about local events</strong> and to encourage social
en/torusers.wml 169) change and political reform, more secure that there will not be a knock
en/torusers.wml 170) on the door at midnight.
en/torusers.wml 171) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 172)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 173) </ul>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 174)
en/whousestor.wml 175)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 176) <h2>Law enforcement officers use Tor</h2>
en/torusers.wml 177) <ul>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 178)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 179) <li>
en/torusers.wml 180) <strong>Online surveillance:</strong>
en/torusers.wml 181) Tor allows officials to surf questionable web sites and services
en/torusers.wml 182) without leaving tell-tale tracks. If the system administrator of an
en/torusers.wml 183) illegal gambling site, for example, were to see multiple connections from
en/torusers.wml 184) governmental or law enforcement computers in usage logs, investigations
en/torusers.wml 185) would be hampered.
en/torusers.wml 186) </strong>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 187)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 188) <li>
en/torusers.wml 189) <strong>Sting operations:</strong>
en/torusers.wml 190) Similarly, anonymity allows law officers to engage in online
en/torusers.wml 191) “undercover ” operations. Regardless of how good an
en/torusers.wml 192) undercover officer's “street cred” may be, if his or her
en/torusers.wml 193) email headers include nypd.nyc.ny.state.us, his or her cover is blown.
en/torusers.wml 194) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 195)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 196) <li>
en/torusers.wml 197) <strong>Truly anonymous tip lines:</strong>
en/torusers.wml 198) While online anonymous tip lines are popular, without anonymity
en/torusers.wml 199) software, they are far less useful. Sophisticated sources understand that
en/torusers.wml 200) although a name or email address is not attached to information, server
en/torusers.wml 201) logs can identify them very quickly. As a result, tip line web sites that
en/torusers.wml 202) do not encourage anonymity are limiting the sources of their tips.
en/torusers.wml 203) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 204)
en/whousestor.wml 205) </ul>
en/whousestor.wml 206)
en/whousestor.wml 207)
en/whousestor.wml 208)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 209) <h2>Activists & whistleblowers use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 210) <ul>
en/whousestor.wml 211)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 212) <li>
en/torusers.wml 213) <strong>Human rights activists use Tor to anonymously report abuses from
en/torusers.wml 214) danger zones.</strong> Internationally, labor rights workers use Tor and other
en/torusers.wml 215) forms of online and offline anonymity to organize workers in accordance
en/torusers.wml 216) with the Universal Declaration of Human Rights. Even though they are within
en/torusers.wml 217) the law, it does not mean they are safe. Tor provides the ability to
en/torusers.wml 218) avoid persecution while still raising a voice.
en/torusers.wml 219) </li>
en/torusers.wml 220)
en/torusers.wml 221) <li>
en/torusers.wml 222) When groups such as the <strong>Friends Service Committee and environmental
en/torusers.wml 223) groups are increasingly
en/torusers.wml 224) <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
en/torusers.wml 225) in the United States</strong>
en/torusers.wml 226) under laws meant to protect against terrorism, many peaceful agents of
en/torusers.wml 227) change rely on Tor for basic privacy during legitimate activities.
en/torusers.wml 228) </li>
en/torusers.wml 229)
en/torusers.wml 230) <li>
en/torusers.wml 231) <strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
en/torusers.wml 232) recommends Tor
en/torusers.wml 233) in their report, “
en/torusers.wml 234) <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
en/torusers.wml 235) Complicity in Chinese Internet Censorship</a>.” The study
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 236) co-author interviewed Roger Dingledine, Tor project leader,
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 237) on Tor use. They cover Tor in the section on how to breach the <a
en/whousestor.wml 238) href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 239) Firewall of China,”</a>
en/torusers.wml 240) and recommend that human rights workers throughout
en/torusers.wml 241) the globe use Tor for “secure browsing and communications.”
en/torusers.wml 242) </li>
en/torusers.wml 243)
en/torusers.wml 244) <li>
en/torusers.wml 245) Tor has consulted with and volunteered help to <strong>Amnesty International's
en/torusers.wml 246) recent
en/torusers.wml 247) <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 248) See also their <a
en/whousestor.wml 249) href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 250) report</a> on China Internet issues.
en/torusers.wml 251) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 252)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 253) <li>
en/torusers.wml 254) <a href="http://www.globalvoicesonline.org">Global Voices</a>
en/torusers.wml 255) can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,
en/torusers.wml 256) throughout their <a
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 257) href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 258) web site.</a>
en/torusers.wml 259) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 260)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 261) <li>
en/torusers.wml 262) In the US, the Supreme Court recently stripped legal protections from
en/torusers.wml 263) government whistleblowers. But whistleblowers working for governmental
en/torusers.wml 264) transparency or corporate accountability can use Tor to seek justice
en/torusers.wml 265) without personal repercussions.
en/torusers.wml 266) </li>
en/torusers.wml 267)
en/torusers.wml 268) <li>
en/torusers.wml 269) A contact of ours who works with a public health nonprofit in
en/torusers.wml 270) Africa reports that his nonprofit
en/torusers.wml 271) <strong>must budget 10% to cover various sorts of corruption</strong>,
en/torusers.wml 272) mostly bribes and such. When that percentage
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 273) rises steeply, not only can they not afford the money, but they can
|
Website tweaks from sjmurdo...
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 274) not afford to complain — this is the point at which open objection can
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 275) become dangerous. So his nonprofit has been working to
en/torusers.wml 276) <strong>use Tor to safely whistleblow on governmental corruption</strong>
en/torusers.wml 277) in order to continue their work.
en/torusers.wml 278) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 279)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 280) <li>
en/torusers.wml 281) At a recent conference a Tor staffer ran into a woman who came from
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 282) a “company town” in a mountainous area of the
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 283) eastern United States. She was attempting to blog anonymously to rally
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 284) local residents to
en/torusers.wml 285) <strong>urge reform on the company</strong> that dominated the town's
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 286) economic and governmental affairs, fully cognizant that the kind of
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 287) organizing she was doing <strong>could lead to harm or “fatal
en/torusers.wml 288) accidents.”</strong>
en/torusers.wml 289) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 290)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 291) <li>
en/torusers.wml 292) In east Asia, some labor organizers use anonymity to <strong>reveal information
en/torusers.wml 293) regarding sweatshops</strong> that produce goods for western countries and to
en/torusers.wml 294) organize local labor.
en/torusers.wml 295) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 296)
en/whousestor.wml 297) </ul>
en/whousestor.wml 298)
en/whousestor.wml 299)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 300) <h2>Both high and low profile people use Tor</h2>
en/torusers.wml 301) <ul>
en/torusers.wml 302)
en/torusers.wml 303) <li>
en/torusers.wml 304) Does being in the public spotlight shut you off from having a private
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 305) life, forever, online? A rural lawyer in a small New England state keeps
en/whousestor.wml 306) an anonymous blog because, with the diverse clientele at his prestigious
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 307) law firm, <strong>his political beliefs are bound to offend someone</strong>. Yet, he
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 308) doesn't want to remain silent on issues he cares about. Tor helps him
en/whousestor.wml 309) feel secure that he can express his opinion without consequences to his
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 310) public role.
en/torusers.wml 311) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 312)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 313) <li>People living in poverty often don't participate fully in civil society
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 314) -- not out of ignorance or apathy, but out of fear. If something you
en/whousestor.wml 315) write were to get back to your boss, would you lose your job? If your
en/whousestor.wml 316) social worker read about your opinion of the system, would she treat
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 317) you differently? Anonymity gives a voice to the voiceless.
en/torusers.wml 318) To support this,
en/torusers.wml 319) <strong>Tor currently has an open Americorps/VISTA position</strong> pending. This
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 320) government grant will cover a full time stipend for a volunteer to create
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 321) curricula to <strong>show low-income populations how to use anonymity online for
en/torusers.wml 322) safer civic engagement</strong>. Although it's often said that the poor do not use
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 323) online access for civic engagment, failing to act in their self-interests,
en/whousestor.wml 324) it is our hypothesis (based on personal conversations and anecdotal
en/whousestor.wml 325) information) that it is precisely the “permanent record ”
en/whousestor.wml 326) left online that keeps many of the poor from speaking out on the Internet.
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 327) We hope to show people how to engage more safely online, and then at
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 328) the end of the year, evaluate how online and offline civic engagement has
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 329) changed, and how the population sees this continuing into the future.
en/torusers.wml 330) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 331)
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 332) </ul>
en/whousestor.wml 333)
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 334)
en/whousestor.wml 335) <h2>Business executives use Tor</h2>
en/whousestor.wml 336) <ul>
en/whousestor.wml 337)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 338) <li>
en/torusers.wml 339) <strong>Security breach information clearinghouses:</strong>
en/torusers.wml 340) Say a financial institution participates in a security clearinghouse
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 341) of information on Internet attacks. Such a repository requires members
en/whousestor.wml 342) to report breaches to a central group, who correlates attacks to detect
en/whousestor.wml 343) coordinated patterns and send out alerts. But if a specific bank in
en/whousestor.wml 344) St. Louis is breached, they don't want an attacker watching the incoming
en/whousestor.wml 345) traffic to such a repository to be able to track where information is
en/whousestor.wml 346) coming from. Even though every packet were encrypted, the Internet
en/whousestor.wml 347) address would betray the location of a compromised system. Tor allows
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 348) such repositories of sensitive information to resist compromises.
en/torusers.wml 349) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 350)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 351) <li>
en/torusers.wml 352) <strong>Seeing your competition as your market does:</strong>
en/torusers.wml 353) If you try to check out a competitor's pricing, you may find no
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 354) information or misleading information on their web site. This is because
en/whousestor.wml 355) their web server may be keyed to detect connections from competitors,
en/whousestor.wml 356) and block or spread disinformation to your staff. Tor allows a business
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 357) to view their sector as the general public would view it.
en/torusers.wml 358) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 359)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 360) <li>
en/torusers.wml 361) <strong>Keeping strategies confidential:</strong>
en/torusers.wml 362) An investment bank, for example, might not want industry snoopers to be
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 363) able to track what web sites their analysts are watching. The strategic
en/whousestor.wml 364) importance of traffic patterns, and the vulnerability of the surveillance
en/whousestor.wml 365) of such data, is starting to be more widely recognized in several areas
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 366) of the business world.
en/torusers.wml 367) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 368)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 369) <li>
en/torusers.wml 370) <strong>Accountability:</strong>
en/torusers.wml 371) In an age when irresponsible and unreported corporate activity has
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 372) undermined multi-billion dollar businesses, an executive exercising true
en/whousestor.wml 373) stewardship wants the whole staff to feel free to disclose internal
en/whousestor.wml 374) malfeasance. Tor facilitates internal accountability before it turns
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 375) into whistleblowing.
en/torusers.wml 376) </li>
en/torusers.wml 377)
en/torusers.wml 378) </ul>
en/torusers.wml 379)
en/torusers.wml 380)
en/torusers.wml 381) <h2>Bloggers use Tor</h2>
en/torusers.wml 382) <ul>
en/torusers.wml 383) <li>
en/torusers.wml 384) Every day we hear about bloggers who are
en/torusers.wml 385) <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
en/torusers.wml 386) <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
en/torusers.wml 387) for saying perfectly legal things online, in their blog. In addition to following
en/torusers.wml 388) the advice in the
en/torusers.wml 389) <a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
en/torusers.wml 390) and Reporters Without Borders'
en/torusers.wml 391) <a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
en/torusers.wml 392) we recommend using Tor.
en/torusers.wml 393) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 394)
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 395) </ul>
en/whousestor.wml 396)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 397)
en/torusers.wml 398)
en/torusers.wml 399)
|
some html fixes; whousestor...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 400) </div><!-- #main -->
en/whousestor.wml 401)
|