Roger Dingledine commited on 2006-02-21 06:42:06
Zeige 1 geänderte Dateien mit 10 Einfügungen und 4 Löschungen.
... | ... |
@@ -22,16 +22,16 @@ can use spyware, viruses, and other techniques to take control of |
22 | 22 |
literally millions of Windows machines around the world. </p> |
23 | 23 |
|
24 | 24 |
<p>Tor aims to provide protection for ordinary people who want to follow |
25 |
-the law. Only criminals have privacy right now; we need to fix that. </p> |
|
25 |
+the law. Only criminals have privacy right now, and we need to fix that. </p> |
|
26 | 26 |
|
27 | 27 |
<p>Some advocates of anonymity explain that it's just a tradeoff — |
28 |
-accepting the bad uses for the good ones — but we don't think that's |
|
29 |
-how it works in the case of Tor. |
|
28 |
+accepting the bad uses for the good ones — but there's more to it |
|
29 |
+than that. |
|
30 | 30 |
Criminals and other bad people have the motivation to learn how to |
31 | 31 |
get good anonymity, and many have the motivation to pay well to achieve |
32 | 32 |
it. Being able to steal and reuse the identities of innocent victims |
33 | 33 |
(identify theft) makes it even easier. Normal people, on the other hand, |
34 |
-don't typically have the time or money to spend figuring out how to get |
|
34 |
+don't have the time or money to spend figuring out how to get |
|
35 | 35 |
privacy online. This is the worst of all possible worlds. </p> |
36 | 36 |
|
37 | 37 |
<p>So yes, criminals could in theory use Tor, but they already have |
... | ... |
@@ -40,6 +40,12 @@ world will stop them from doing their bad things. At the same time, Tor |
40 | 40 |
and other privacy measures can <em>fight</em> identity theft, physical |
41 | 41 |
crimes like stalking, and so on. </p> |
42 | 42 |
|
43 |
+<!-- |
|
44 |
+<a id="Pervasive"></a> |
|
45 |
+<h3><a class="anchor" href="#Pervasive">If the whole world starts using |
|
46 |
+Tor, won't civilization collapse?</a></h3> |
|
47 |
+--> |
|
48 |
+ |
|
43 | 49 |
<a id="DDoS"></a> |
44 | 50 |
<h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3> |
45 | 51 |
|
46 | 52 |