ff37204bc14f38b67a18c433c7b668d3d4913ed5
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

1) ## translation metadata
Roger Dingledine looks like we never set the...

Roger Dingledine authored 13 years ago

2) # Revision: $Revision$
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

3) # Translation-Priority: 2-medium
4) 
5) #include "head.wmi" TITLE="Tor Project: Overview" CHARSET="UTF-8"
6) <div id="content" class="clearfix">
7)   <div id="breadcrumbs">
Andrew Lewman change all of the breadcrum...

Andrew Lewman authored 13 years ago

8)     <a href="<page index>">Home &raquo; </a>
Andrew Lewman increase max img width, lin...

Andrew Lewman authored 13 years ago

9)     <a href="<page about/overview>">About &raquo; </a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

10)   </div>
11)   <div id="maincol">
12)     <a name="overview"></a>
13)     <h2><a class="anchor" href="#overview">Tor: Overview</a></h2>
14)     <!-- BEGIN SIDEBAR -->
15)     <div class="sidebar-left">
16)       <h3>Topics</h3>
17)       <ul>
18)         <li><a href="<page about/overview>#overview">Overview</a></li>
Andrew Lewman copy the inception paragrap...

Andrew Lewman authored 13 years ago

19)         <li><a href="<page about/overview>#inception">Inception</a></li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

20)         <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li>
21)         <li><a href="<page about/overview>#thesolution">The Solution</a></li>
22)         <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li>
23)         <li><a href="<page about/overview>#stayinganonymous">Staying anonymous</a></li>
24)         <li><a href="<page about/overview>#thefutureoftor">The future of Tor</a></li>
25)       </ul>
26)     </div>
27)     <!-- END SIDEBAR -->
28)     
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

29)     <hr>
Andrew Lewman copy the inception paragrap...

Andrew Lewman authored 13 years ago

30) 
31)     <a name="inception"></a>
32)     <h3><a class="anchor" href="#inception">Inception</a></h3>
33) 
34)     <p>
35)     Tor was originally designed, implemented, and deployed as a
36)     third-generation <a href="http://www.onion-router.net/">onion routing
37)     project of the U.S. Naval Research Laboratory</a>.  It was originally
38)     developed with the U.S. Navy in mind, for the primary purpose of
39)     protecting government communications.  Today, it is used every day
40)     for a wide variety of purposes by normal people, the military,
41)     journalists, law enforcement officers, activists, and many
42)     others. </p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

43)     
44)     <p>
45)     Tor is a network of virtual tunnels that allows people and groups to
46)     improve their privacy and security on the Internet.  It also enables
47)     software developers to create new communication tools
48)     with built-in privacy features.  Tor provides the foundation for
49)     a range of applications that allow organizations and individuals
50)     to share information over public networks without compromising their
51)     privacy.
52)     </p>
53)     
54)     <p>
55)     Individuals use Tor to keep websites from tracking them and their family
56)     members, or to connect to news sites, instant messaging services, or the
57)     like when these are blocked by their local Internet providers.  Tor's <a
58)     href="<page docs/hidden-services>">hidden services</a>
59)     let users publish web sites and other services without needing to reveal
60)     the location of the site. Individuals also use Tor for socially sensitive
61)     communication: chat rooms and web forums for rape and abuse survivors,
62)     or people with illnesses.
63)     </p>
64)     
65)     <p>
66)     Journalists use Tor to communicate more safely with whistleblowers and
67)     dissidents. Non-governmental organizations (NGOs) use Tor to allow their
68)     workers to connect to their home website while they're in a foreign
69)     country, without notifying everybody nearby that they're working with
70)     that organization.
71)     </p>
72)     
73)     <p>
74)     Groups such as Indymedia recommend Tor for safeguarding their members'
75)     online privacy and security. Activist groups like the Electronic Frontier
76)     Foundation (EFF) recommend Tor as a mechanism for
77)     maintaining civil liberties online. Corporations use Tor as a safe way
78)     to conduct competitive analysis, and to protect sensitive procurement
79)     patterns from eavesdroppers. They also use it to replace traditional
80)     VPNs, which reveal the exact amount and timing of communication. Which
81)     locations have employees working late? Which locations have employees
82)     consulting job-hunting websites? Which research divisions are communicating
83)     with the company's patent lawyers?
84)     </p>
85)     
86)     <p>
87)     A branch of the U.S. Navy uses Tor for open source intelligence
88)     gathering, and one of its teams used Tor while deployed in the Middle
89)     East recently. Law enforcement uses Tor for visiting or surveilling
90)     web sites without leaving government IP addresses in their web logs,
91)     and for security during sting operations.
92)     </p>
93)     
94)     <p>
95)     The variety of people who use Tor is actually <a
96)     href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
97)     it so secure</a>.  Tor hides you among <a href="<page about/torusers>">the
98)     other users on the network</a>,
99)     so the more populous and diverse the user base for Tor is, the more your
100)     anonymity will be protected.
101)     </p>
102)     
103)     <a name="whyweneedtor"></a>
104)     <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
105)     
106)     <p>
107)     Using Tor protects you against a common form of Internet surveillance
108)     known as "traffic analysis."  Traffic analysis can be used to infer
109)     who is talking to whom over a public network.  Knowing the source
110)     and destination of your Internet traffic allows others to track your
111)     behavior and interests.  This can impact your checkbook if, for example,
112)     an e-commerce site uses price discrimination based on your country or
113)     institution of origin.  It can even threaten your job and physical safety
114)     by revealing who and where you are. For example, if you're travelling
115)     abroad and you connect to your employer's computers to check or send mail,
116)     you can inadvertently reveal your national origin and professional
117)     affiliation to anyone observing the network, even if the connection
118)     is encrypted.
119)     </p>
120)     
121)     <p>
122)     How does traffic analysis work?  Internet data packets have two parts:
123)     a data payload and a header used for routing.  The data payload is
124)     whatever is being sent, whether that's an email message, a web page, or an
125)     audio file.  Even if you encrypt the data payload of your communications,
126)     traffic analysis still reveals a great deal about what you're doing and,
127)     possibly, what you're saying.  That's because it focuses on the header,
128)     which discloses source, destination, size, timing, and so on.
129)     </p>
130)     
131)     <p>
132)     A basic problem for the privacy minded is that the recipient of your
133)     communications can see that you sent it by looking at headers.  So can
134)     authorized intermediaries like Internet service providers, and sometimes
135)     unauthorized intermediaries as well.  A very simple form of traffic
136)     analysis might involve sitting somewhere between sender and recipient on
137)     the network, looking at headers.
138)     </p>
139)     
140)     <p>
141)     But there are also more powerful kinds of traffic analysis.  Some
142)     attackers spy on multiple parts of the Internet and use sophisticated
143)     statistical techniques to track the communications patterns of many
144)     different organizations and individuals.  Encryption does not help against
145)     these attackers, since it only hides the content of Internet traffic, not
146)     the headers.
147)     </p>
148)     
149)     <a name="thesolution"></a>
150)     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

151)     <img src="$(IMGROOT)/htw1.png" alt="How Tor works">
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

152)     
153)     <p>
154)     Tor helps to reduce the risks of both simple and sophisticated traffic
155)     analysis by distributing your transactions over several places on the
156)     Internet, so no single point can link you to your destination.  The idea
157)     is similar to using a twisty, hard-to-follow route in order to throw off
158)     somebody who is tailing you &mdash; and then periodically erasing your
159)     footprints.  Instead of taking a direct route from source to
160)     destination, data packets on the Tor network take a random pathway
161)     through several relays that cover your tracks so no observer at any
162)     single point can tell where the data came from or where it's going.
163)     </p>
164)     
165)     <p>
166)     To create a private network pathway with Tor, the user's software or
167)     client incrementally builds a circuit of encrypted connections through
168)     relays on the network.  The circuit is extended one hop at a time, and
169)     each relay along the way knows only which relay gave it data and which
170)     relay it is giving data to.  No individual relay ever knows the
171)     complete path that a data packet has taken.  The client negotiates a
172)     separate set of encryption keys for each hop along the circuit to ensure
173)     that each hop can't trace these connections as they pass through.
174)     </p>
175)     
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

176)     <p><img alt="Tor circuit step two"  src="$(IMGROOT)/htw2.png"></p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

177)     
178)     <p>
179)     Once a circuit has been established, many kinds of data can be exchanged
180)     and several different sorts of software applications can be deployed
181)     over the Tor network.  Because each relay sees no more than one hop in
182)     the circuit, neither an eavesdropper nor a compromised relay can use
183)     traffic analysis to link the connection's source and destination.  Tor
184)     only works for TCP streams and can be used by any application with SOCKS
185)     support.
186)     </p>
187)     
188)     <p>
189)     For efficiency, the Tor software uses the same circuit for connections
190)     that happen within the same ten minutes or so.  Later requests are given a
191)     new circuit, to keep people from linking your earlier actions to the new
192)     ones.
193)     </p>
194)     
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

195)     <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>