git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
40ab2eb55
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
en
index.wml
Update links
Peter Palfrader
commited
40ab2eb55
at 2006-01-27 00:37:35
index.wml
Blame
History
Raw
## translation metadata # Revision: $Revision$ #include "head.wmi" TITLE="An anonymous Internet communication system" <!-- SIDEBAR (OPTIONAL) --> <div class="sidebar"> <a href="<page download>"><img src="$(IMGROOT)/download_tor.png" alt="Download Tor" /></a> <br /> <a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a> <div class="donatebutton"> <a href="<page donate>">Support Tor: donate!</a> </div> <div class="donatebutton"> <a href="<page gui/index>">Want a better Tor GUI?</a> </div> </div> <!-- END SIDEBAR --> <div class="main-column"> <!-- PUT CONTENT AFTER THIS TAG --> <h2>Tor: An anonymous Internet communication system</h2> <p> Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. </p> <p> Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called <a href="<page overview>">onion routers</a>. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. </p> <p> Instead of looking at the content of your communications, traffic analysis tracks where your data goes and when, as well as how much is sent. Tor aims to make traffic analysis more difficult by preventing websites, eavesdroppers, and even the onion routers themselves from tracing your communications online. This means Tor lets you decide whether to identify yourself when you communicate. </p> <p> Tor's security is improved as its user base grows and as more people volunteer to run servers. Please consider <a href="<page volunteer>">volunteering your time</a> or <a href="<cvssandbox>tor/doc/tor-doc-server.html">volunteering your bandwidth</a>. And remember that this is development code—it's not a good idea to rely on the current Tor network if you really need strong anonymity. </p> <p><b>We are now actively looking for new sponsors and funding.</b> If your organization has an interest in keeping the Tor network usable and fast, please <a href="<page people>">contact us</a>. Sponsors of Tor also get personal attention, better support, publicity (if they want it), and get to influence the direction of our research and development! Previous funders include <a href="http://www.onr.navy.mil/">ONR</a>, <a href="http://www.darpa.mil/">DARPA</a>, and the <a href="http://www.eff.org/">Electronic Frontier Foundation</a> (who still kindly hosts our website). </p> </div><!-- #main --> #include <foot.wmi>