the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 1) ## translation metadata
en/whousestor.wml 2) # Revision: $Revision$
en/whousestor.wml 3)
en/whousestor.wml 4) #include "head.wmi" TITLE="Who uses Tor?"
en/whousestor.wml 5)
|
help explain which files ar...
Roger Dingledine authored 16 years ago
|
en/torusers.wml 6) # Note to translators: this file is still under construction, and
en/torusers.wml 7) # will probably change a whole lot before we link to it. So it's
en/torusers.wml 8) # probably best to not translate it yet.
en/torusers.wml 9)
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 10) <div class="main-column">
en/whousestor.wml 11)
en/whousestor.wml 12) <h1>Who uses Tor?</h1>
en/whousestor.wml 13)
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 14) <p>
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 15) If you have a success story with Tor, especially one we
en/torusers.wml 16) can link to, please <a href="<page contact>">send us</a> a note!
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 17) </p>
en/whousestor.wml 18)
en/whousestor.wml 19) <p>
|
edit whousestor a little.
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 20) Tor provides anonymity: when it succeeds, nobody notices. This is
en/whousestor.wml 21) great for users, but not so good for us, since publishing success
en/whousestor.wml 22) stories about how people or organizations are staying anonymous could be
en/whousestor.wml 23) counterproductive.
en/whousestor.wml 24) As an example, we talked
|
Website tweaks from sjmurdo...
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 25) to an FBI officer who explained that he uses Tor every day for his
en/whousestor.wml 26) work — but he quickly followed up
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 27) with a request not to provide details or mention his name.
en/whousestor.wml 28) </p>
en/whousestor.wml 29)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 30) <p>
|
Cleanup torusers a bit.
Andrew Lewman authored 16 years ago
|
en/torusers.wml 31) Like any technology, from pencils to cellphones, anonymity can be used for both good and evil.
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 32) You have probably seen at least some of the vigorous debate
en/torusers.wml 33) (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
en/torusers.wml 34) <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
en/torusers.wml 35) and
en/torusers.wml 36) <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
en/torusers.wml 37) over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
en/torusers.wml 38) <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
en/torusers.wml 39) <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
en/torusers.wml 40) <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
en/torusers.wml 41) and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support port 25 to prevent anonymous email spamming), or if you're one of the
en/torusers.wml 42) <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Internet</a>,
en/torusers.wml 43) you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:
|
a first go at an intro to t...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 44) </p>
en/whousestor.wml 45)
en/whousestor.wml 46)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 47) <h2>Everyday, ordinary Internet surfers use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 48)
en/whousestor.wml 49) <ul>
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 50) <li>
en/torusers.wml 51) <strong>They protect their privacy from unscrupulous
en/torusers.wml 52) marketers and identity thieves.</strong>
en/torusers.wml 53) Internet Service Providers (ISPs)
en/torusers.wml 54) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
en/torusers.wml 55) sell your Internet browsing records</a>
en/torusers.wml 56) to marketers or anyone else willing to pay for it. They typically say that
en/torusers.wml 57) they anonymize it by not providing your username or personally
en/torusers.wml 58) identifiable information, but
en/torusers.wml 59) <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.
en/torusers.wml 60) A full record of every
en/torusers.wml 61) site you visit, the text of every search you perform, and potentially
en/torusers.wml 62) userid and even password information can still be part of this data.
en/torusers.wml 63) In addition to your ISP, the websites
en/torusers.wml 64) (<a href="http://www.google.com/privacy_faq.html">and search engines</a>)
en/torusers.wml 65) you visit have their own logs,
en/torusers.wml 66) containing the same or more information.
en/torusers.wml 67) </li>
en/torusers.wml 68)
en/torusers.wml 69) <li>
en/torusers.wml 70) <strong> They protect their communications from irresponsible corporations.</strong>
en/torusers.wml 71) All over the net, Tor is being recommended to people newly concerned
en/torusers.wml 72) about their privacy in the face of increasing breaches and betrayals of
en/torusers.wml 73) private data. From
en/torusers.wml 74) <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
en/torusers.wml 75) <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
en/torusers.wml 76) your data is often not well protected by those you are supposed to trust to keep it safe.
en/torusers.wml 77) </li>
en/torusers.wml 78)
en/torusers.wml 79) <li>
en/torusers.wml 80) <strong>They protect their children online.</strong>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 81) You've told your kids they shouldn't share personally identifying
en/whousestor.wml 82) information online, but they may be sharing their location simply
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 83) by not concealing their IP address. Increasingly, IP
en/torusers.wml 84) addresses can be
en/torusers.wml 85) <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>,
en/torusers.wml 86) and can
en/torusers.wml 87) <a href="http://whatsmyip.org/more/">reveal other information</a>
en/torusers.wml 88) about how you are connecting to the Internet.
en/torusers.wml 89) In the United States the
en/torusers.wml 90) government is pushing to make this mapping increasingly precise.
en/torusers.wml 91) </li>
en/torusers.wml 92)
en/torusers.wml 93) <li>
en/torusers.wml 94) <strong>They research sensitive topics.</strong>
en/torusers.wml 95) There's a wealth of information available online. But perhaps in your
en/torusers.wml 96) country, access to information on AIDS, birth control,
en/torusers.wml 97) <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
|
edit whousestor a little.
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 98) or world religions is behind a national firewall.
en/whousestor.wml 99) Or perhaps you are worried that if you research a particular set of
en/whousestor.wml 100) symptoms, at some later date an insurance company might buy the
en/whousestor.wml 101) logs of the websites you visited and establish that
en/whousestor.wml 102) you had suspicions of a pre-existing condition.
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 103) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 104) </ul>
en/whousestor.wml 105)
en/whousestor.wml 106)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 107)
en/torusers.wml 108) <h2>Soldiers in the field use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 109) <ul>
en/whousestor.wml 110)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 111) <li>
en/torusers.wml 112) <strong>Military field agents:</strong>
en/torusers.wml 113) How much, do you imagine, would the Iraqi insurgency pay to find out
en/torusers.wml 114) the location of every computer in Baghdad that logged into a military
en/torusers.wml 115) server in Maryland to read email? Tor can protect military personnel in
en/torusers.wml 116) the field by hiding their location.
en/torusers.wml 117) </li>
en/torusers.wml 118)
en/torusers.wml 119) <li>
en/torusers.wml 120) <strong>Hidden services:</strong>
en/torusers.wml 121) When the Internet was designed by DARPA, its primary purpose was to
en/torusers.wml 122) be able to facilitate distributed, robust communications in case of
en/torusers.wml 123) local strikes. However, some functions must be centralized, such as
en/torusers.wml 124) command and control sites. It's the nature of the Internet protocols to
en/torusers.wml 125) reveal the geographic location of any server that is reachable online.
en/torusers.wml 126) Tor's hidden services capacity allows military command and
en/torusers.wml 127) control to be physically secure from discovery and takedown.
en/torusers.wml 128) </li>
en/torusers.wml 129)
en/torusers.wml 130) <li>
en/torusers.wml 131) <strong>Intelligence gathering:</strong>
en/torusers.wml 132) Military personnel need to use electronic resources run and monitored
en/torusers.wml 133) by insurgents. Obviously, they do not want the server logs on an insurgent
en/torusers.wml 134) website to show a military address, revealing their surveillance.
en/torusers.wml 135) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 136)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 137) </ul>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 138)
en/whousestor.wml 139)
en/whousestor.wml 140)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 141) <h2>Journalists and their audience use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 142)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 143) <ul>
en/torusers.wml 144) <li><strong>
en/torusers.wml 145) <a href="http://www.rsf.org/">Reporters without Borders</a></strong>
en/torusers.wml 146) tracks internet prisoners of conscience and
en/torusers.wml 147) jailed or harmed journalists all over the world. They advise
en/torusers.wml 148) journalists, sources, bloggers, and dissidents to use Tor to
en/torusers.wml 149) ensure their privacy and safety.
en/torusers.wml 150) </li>
en/torusers.wml 151)
en/torusers.wml 152) <li>
en/torusers.wml 153) <strong>The US <a href="http://www.ibb.gov/">International Broadcasting
en/torusers.wml 154) Bureau</a></strong> (Voice of America/Radio Free Europe/Radio Free Asia)
en/torusers.wml 155) supports Tor development to help Internet users in countries without
en/torusers.wml 156) safe access to free media. Tor
en/torusers.wml 157) preserves the ability of persons behind national firewalls or under
en/torusers.wml 158) the surveillance of repressive regimes to obtain
en/torusers.wml 159) a global perspective on controversial topics including democracy,
en/torusers.wml 160) economics and religion.
en/torusers.wml 161) </li>
en/torusers.wml 162)
en/torusers.wml 163) <li>
en/torusers.wml 164) Although we often think of foreign journalists working in far off lands,
en/torusers.wml 165) <strong>citizen journalists in China and other
en/torusers.wml 166) <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
en/torusers.wml 167) use Tor to write about local events</strong> and to encourage social
en/torusers.wml 168) change and political reform, more secure that there will not be a knock
en/torusers.wml 169) on the door at midnight.
en/torusers.wml 170) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 171)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 172) </ul>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 173)
en/whousestor.wml 174)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 175) <h2>Law enforcement officers use Tor</h2>
en/torusers.wml 176) <ul>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 177)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 178) <li>
en/torusers.wml 179) <strong>Online surveillance:</strong>
en/torusers.wml 180) Tor allows officials to surf questionable web sites and services
en/torusers.wml 181) without leaving tell-tale tracks. If the system administrator of an
en/torusers.wml 182) illegal gambling site, for example, were to see multiple connections from
en/torusers.wml 183) governmental or law enforcement computers in usage logs, investigations
en/torusers.wml 184) would be hampered.
en/torusers.wml 185) </strong>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 186)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 187) <li>
en/torusers.wml 188) <strong>Sting operations:</strong>
en/torusers.wml 189) Similarly, anonymity allows law officers to engage in online
en/torusers.wml 190) “undercover ” operations. Regardless of how good an
en/torusers.wml 191) undercover officer's “street cred” may be, if his or her
en/torusers.wml 192) email headers include nypd.nyc.ny.state.us, his or her cover is blown.
en/torusers.wml 193) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 194)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 195) <li>
en/torusers.wml 196) <strong>Truly anonymous tip lines:</strong>
en/torusers.wml 197) While online anonymous tip lines are popular, without anonymity
en/torusers.wml 198) software, they are far less useful. Sophisticated sources understand that
en/torusers.wml 199) although a name or email address is not attached to information, server
en/torusers.wml 200) logs can identify them very quickly. As a result, tip line web sites that
en/torusers.wml 201) do not encourage anonymity are limiting the sources of their tips.
en/torusers.wml 202) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 203)
en/whousestor.wml 204) </ul>
en/whousestor.wml 205)
en/whousestor.wml 206)
en/whousestor.wml 207)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 208) <h2>Activists & whistleblowers use Tor</h2>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 209) <ul>
en/whousestor.wml 210)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 211) <li>
en/torusers.wml 212) <strong>Human rights activists use Tor to anonymously report abuses from
en/torusers.wml 213) danger zones.</strong> Internationally, labor rights workers use Tor and other
en/torusers.wml 214) forms of online and offline anonymity to organize workers in accordance
en/torusers.wml 215) with the Universal Declaration of Human Rights. Even though they are within
en/torusers.wml 216) the law, it does not mean they are safe. Tor provides the ability to
en/torusers.wml 217) avoid persecution while still raising a voice.
en/torusers.wml 218) </li>
en/torusers.wml 219)
en/torusers.wml 220) <li>
en/torusers.wml 221) When groups such as the <strong>Friends Service Committee and environmental
en/torusers.wml 222) groups are increasingly
en/torusers.wml 223) <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
en/torusers.wml 224) in the United States</strong>
en/torusers.wml 225) under laws meant to protect against terrorism, many peaceful agents of
en/torusers.wml 226) change rely on Tor for basic privacy during legitimate activities.
en/torusers.wml 227) </li>
en/torusers.wml 228)
en/torusers.wml 229) <li>
en/torusers.wml 230) <strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
en/torusers.wml 231) recommends Tor
en/torusers.wml 232) in their report, “
en/torusers.wml 233) <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
en/torusers.wml 234) Complicity in Chinese Internet Censorship</a>.” The study
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 235) co-author interviewed Roger Dingledine, Tor project leader,
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 236) on Tor use. They cover Tor in the section on how to breach the <a
en/whousestor.wml 237) href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 238) Firewall of China,”</a>
en/torusers.wml 239) and recommend that human rights workers throughout
en/torusers.wml 240) the globe use Tor for “secure browsing and communications.”
en/torusers.wml 241) </li>
en/torusers.wml 242)
en/torusers.wml 243) <li>
en/torusers.wml 244) Tor has consulted with and volunteered help to <strong>Amnesty International's
en/torusers.wml 245) recent
en/torusers.wml 246) <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 247) See also their <a
en/whousestor.wml 248) href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 249) report</a> on China Internet issues.
en/torusers.wml 250) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 251)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 252) <li>
en/torusers.wml 253) <a href="http://www.globalvoicesonline.org">Global Voices</a>
en/torusers.wml 254) can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,
en/torusers.wml 255) throughout their <a
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 256) href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 257) web site.</a>
en/torusers.wml 258) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 259)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 260) <li>
en/torusers.wml 261) In the US, the Supreme Court recently stripped legal protections from
en/torusers.wml 262) government whistleblowers. But whistleblowers working for governmental
en/torusers.wml 263) transparency or corporate accountability can use Tor to seek justice
en/torusers.wml 264) without personal repercussions.
en/torusers.wml 265) </li>
en/torusers.wml 266)
en/torusers.wml 267) <li>
en/torusers.wml 268) A contact of ours who works with a public health nonprofit in
en/torusers.wml 269) Africa reports that his nonprofit
en/torusers.wml 270) <strong>must budget 10% to cover various sorts of corruption</strong>,
en/torusers.wml 271) mostly bribes and such. When that percentage
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 272) rises steeply, not only can they not afford the money, but they can
|
Website tweaks from sjmurdo...
Nick Mathewson authored 16 years ago
|
en/whousestor.wml 273) not afford to complain — this is the point at which open objection can
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 274) become dangerous. So his nonprofit has been working to
en/torusers.wml 275) <strong>use Tor to safely whistleblow on governmental corruption</strong>
en/torusers.wml 276) in order to continue their work.
en/torusers.wml 277) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 278)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 279) <li>
en/torusers.wml 280) At a recent conference a Tor staffer ran into a woman who came from
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 281) a “company town” in a mountainous area of the
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 282) eastern United States. She was attempting to blog anonymously to rally
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 283) local residents to
en/torusers.wml 284) <strong>urge reform on the company</strong> that dominated the town's
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 285) economic and governmental affairs, fully cognizant that the kind of
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 286) organizing she was doing <strong>could lead to harm or “fatal
en/torusers.wml 287) accidents.”</strong>
en/torusers.wml 288) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 289)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 290) <li>
en/torusers.wml 291) In east Asia, some labor organizers use anonymity to <strong>reveal information
en/torusers.wml 292) regarding sweatshops</strong> that produce goods for western countries and to
en/torusers.wml 293) organize local labor.
en/torusers.wml 294) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 295)
en/whousestor.wml 296) </ul>
en/whousestor.wml 297)
en/whousestor.wml 298)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 299) <h2>Both high and low profile people use Tor</h2>
en/torusers.wml 300) <ul>
en/torusers.wml 301)
en/torusers.wml 302) <li>
en/torusers.wml 303) Does being in the public spotlight shut you off from having a private
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 304) life, forever, online? A rural lawyer in a small New England state keeps
en/whousestor.wml 305) an anonymous blog because, with the diverse clientele at his prestigious
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 306) law firm, <strong>his political beliefs are bound to offend someone</strong>. Yet, he
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 307) doesn't want to remain silent on issues he cares about. Tor helps him
en/whousestor.wml 308) feel secure that he can express his opinion without consequences to his
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 309) public role.
en/torusers.wml 310) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 311)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 312) <li>People living in poverty often don't participate fully in civil society
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 313) -- not out of ignorance or apathy, but out of fear. If something you
en/whousestor.wml 314) write were to get back to your boss, would you lose your job? If your
en/whousestor.wml 315) social worker read about your opinion of the system, would she treat
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 316) you differently? Anonymity gives a voice to the voiceless.
en/torusers.wml 317) To support this,
en/torusers.wml 318) <strong>Tor currently has an open Americorps/VISTA position</strong> pending. This
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 319) government grant will cover a full time stipend for a volunteer to create
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 320) curricula to <strong>show low-income populations how to use anonymity online for
en/torusers.wml 321) safer civic engagement</strong>. Although it's often said that the poor do not use
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 322) online access for civic engagment, failing to act in their self-interests,
en/whousestor.wml 323) it is our hypothesis (based on personal conversations and anecdotal
en/whousestor.wml 324) information) that it is precisely the “permanent record ”
en/whousestor.wml 325) left online that keeps many of the poor from speaking out on the Internet.
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 326) We hope to show people how to engage more safely online, and then at
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 327) the end of the year, evaluate how online and offline civic engagement has
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 328) changed, and how the population sees this continuing into the future.
en/torusers.wml 329) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 330)
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 331) </ul>
en/whousestor.wml 332)
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 333)
en/whousestor.wml 334) <h2>Business executives use Tor</h2>
en/whousestor.wml 335) <ul>
en/whousestor.wml 336)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 337) <li>
en/torusers.wml 338) <strong>Security breach information clearinghouses:</strong>
en/torusers.wml 339) Say a financial institution participates in a security clearinghouse
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 340) of information on Internet attacks. Such a repository requires members
en/whousestor.wml 341) to report breaches to a central group, who correlates attacks to detect
en/whousestor.wml 342) coordinated patterns and send out alerts. But if a specific bank in
en/whousestor.wml 343) St. Louis is breached, they don't want an attacker watching the incoming
en/whousestor.wml 344) traffic to such a repository to be able to track where information is
en/whousestor.wml 345) coming from. Even though every packet were encrypted, the Internet
en/whousestor.wml 346) address would betray the location of a compromised system. Tor allows
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 347) such repositories of sensitive information to resist compromises.
en/torusers.wml 348) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 349)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 350) <li>
en/torusers.wml 351) <strong>Seeing your competition as your market does:</strong>
en/torusers.wml 352) If you try to check out a competitor's pricing, you may find no
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 353) information or misleading information on their web site. This is because
en/whousestor.wml 354) their web server may be keyed to detect connections from competitors,
en/whousestor.wml 355) and block or spread disinformation to your staff. Tor allows a business
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 356) to view their sector as the general public would view it.
en/torusers.wml 357) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 358)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 359) <li>
en/torusers.wml 360) <strong>Keeping strategies confidential:</strong>
en/torusers.wml 361) An investment bank, for example, might not want industry snoopers to be
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 362) able to track what web sites their analysts are watching. The strategic
en/whousestor.wml 363) importance of traffic patterns, and the vulnerability of the surveillance
en/whousestor.wml 364) of such data, is starting to be more widely recognized in several areas
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 365) of the business world.
en/torusers.wml 366) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 367)
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 368) <li>
en/torusers.wml 369) <strong>Accountability:</strong>
en/torusers.wml 370) In an age when irresponsible and unreported corporate activity has
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 371) undermined multi-billion dollar businesses, an executive exercising true
en/whousestor.wml 372) stewardship wants the whole staff to feel free to disclose internal
en/whousestor.wml 373) malfeasance. Tor facilitates internal accountability before it turns
|
torusers from jeff
Andrew Lewman authored 16 years ago
|
en/torusers.wml 374) into whistleblowing.
en/torusers.wml 375) </li>
en/torusers.wml 376)
en/torusers.wml 377) </ul>
en/torusers.wml 378)
en/torusers.wml 379)
en/torusers.wml 380) <h2>Bloggers use Tor</h2>
en/torusers.wml 381) <ul>
en/torusers.wml 382) <li>
en/torusers.wml 383) Every day we hear about bloggers who are
en/torusers.wml 384) <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
en/torusers.wml 385) <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
en/torusers.wml 386) for saying perfectly legal things online, in their blog. In addition to following
en/torusers.wml 387) the advice in the
en/torusers.wml 388) <a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
en/torusers.wml 389) and Reporters Without Borders'
en/torusers.wml 390) <a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
en/torusers.wml 391) we recommend using Tor.
en/torusers.wml 392) </li>
|
the 'who uses tor' draft th...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 393)
|
make whousestor not quite a...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 394) </ul>
en/whousestor.wml 395)
|
some html fixes; whousestor...
Roger Dingledine authored 16 years ago
|
en/whousestor.wml 396) </div><!-- #main -->
en/whousestor.wml 397)
|