press/en/2010-09-16-ten-things-circumvention-tools.wml
d1f14561
 ## translation metadata
40e07e2e
 # Revision: $Revision$
d1f14561
 # Translation-Priority: 4-optional
 
75cf35c6
 #include "head.wmi" TITLE="The Tor Project releases circumvention tool article" CHARSET="UTF-8"
d1f14561
 <div id="content" class="clearfix">
   <div id="breadcrumbs">
     <a href="<page index>">Home &raquo; </a>
0860cffa
     <a href="<page press/press>">Press &raquo; </a>
75cf35c6
     <a href="<page press/2010-09-16-ten-things-circumvention-tools>">The Tor Project releases circumvention tool article</a>
d1f14561
   </div> 
   <div id="maincol"> 
 <!-- PUT CONTENT AFTER THIS TAG -->
 
 <h2>FOR IMMEDIATE RELEASE</h2>
 
 <h2><strong>TOR PROJECT RELEASES CIRCUMVENTION TOOL ARTICLE</strong></h2>
 
 <p><strong>WALPOLE, MA</strong> The Tor Project releases an article about
805d3d95
 the <a href="../press/presskit/2010-09-16-circumvention-features.pdf">"Ten
d1f14561
 Things to Look for in a Circumvention Tool"</a>. As more countries
 crack down on Internet use, people around the world are turning to
 anti-censorship software that lets them reach blocked websites. Many
 types of software, also known as circumvention tools, have been created
 to answer the threat to freedom online. These tools provide different
 features and levels of security, and it's important for users to
 understand the tradeoffs.</p>
   
 <p>This article lays out ten features you should consider when evaluating
 a circumvention tool. The goal isn't to advocate for any specific
 tool, but to point out what kind of tools are useful for different
 situations.</p>
 
 <p>Tor's tools and technologies are already used by millions of people
 to protect their activities online.  These users include journalists and
 human rights workers in politically rigid countries communicating with
 whistleblowers and dissidents.  Law enforcement officers on Internet
 sting operations stay anonymous with Tor, as do people wanting to post
 socially sensitive information in chat rooms, like rape or abuse survivors
 and those with illnesses.  The Tor network also provides protection
 for people looking for another layer of privacy from the millions of
 websites and ISPs bent on collecting private information and tracking
 their moves online.</p>
 
 <h2>ABOUT THE TOR PROJECT</h2>
 
 <p>Based in Walpole, MA, The Tor Project develops free and open-source
 software that provides online anonymity to the everyday Internet
 user. Tor was born out of a collaboration with the U.S. Naval Research
 Lab starting in 2001, and it became an official U.S. 501(c)(3) non-profit
 in 2006. The Tor Project now works with many individuals, NGOs, law
 enforcement agencies, and businesses globally to help them protect their
 anonymity online.</p>
 
 <p>In addition to its efforts developing and maintaining the Tor anonymity
 software and the Tor network, The Tor Project also helps to lead the
 research community in understanding how to build and measure scalable and
 secure anonymity networks. The Tor developers publish several new research
 papers each year in major academic security conferences, and just about
 every major security conference these days includes a Tor-related paper.
 Tor is a project-funded organization with a staff of 15.</p>
 
 <p>The "Onion Logo" and "Tor" wordmark are registered trademarks
 of The Tor Project, Inc.</p>
 
 <p>Contact: Andrew Lewman</p>
1ef45efc
 <p>Tel: +1-781-948-1982</p>
d1f14561
 <p>Email: execdir@torproject.org</p>
 <p><a href="https://www.torproject.org/">Website: Tor Project</a></p>
 <div align=center>###</div>
 
 </div>
   <!-- END MAINCOL -->
   <div id = "sidecol">
 #include "side.wmi"
 #include "info.wmi"
   </div>
   <!-- END SIDECOL -->
 </div>
 <!-- END CONTENT -->
 #include <foot.wmi>