Roger Dingledine commited on 2006-02-21 06:42:06
              Zeige 1 geänderte Dateien mit 10 Einfügungen und 4 Löschungen.
            
| ... | ... | 
                      @@ -22,16 +22,16 @@ can use spyware, viruses, and other techniques to take control of  | 
                  
| 22 | 22 | 
                        literally millions of Windows machines around the world. </p>  | 
                    
| 23 | 23 | 
                         | 
                    
| 24 | 24 | 
                        <p>Tor aims to provide protection for ordinary people who want to follow  | 
                    
| 25 | 
                        -the law. Only criminals have privacy right now; we need to fix that. </p>  | 
                    |
| 25 | 
                        +the law. Only criminals have privacy right now, and we need to fix that. </p>  | 
                    |
| 26 | 26 | 
                         | 
                    
| 27 | 27 | 
                        <p>Some advocates of anonymity explain that it's just a tradeoff —  | 
                    
| 28 | 
                        -accepting the bad uses for the good ones — but we don't think that's  | 
                    |
| 29 | 
                        -how it works in the case of Tor.  | 
                    |
| 28 | 
                        +accepting the bad uses for the good ones — but there's more to it  | 
                    |
| 29 | 
                        +than that.  | 
                    |
| 30 | 30 | 
                        Criminals and other bad people have the motivation to learn how to  | 
                    
| 31 | 31 | 
                        get good anonymity, and many have the motivation to pay well to achieve  | 
                    
| 32 | 32 | 
                        it. Being able to steal and reuse the identities of innocent victims  | 
                    
| 33 | 33 | 
                        (identify theft) makes it even easier. Normal people, on the other hand,  | 
                    
| 34 | 
                        -don't typically have the time or money to spend figuring out how to get  | 
                    |
| 34 | 
                        +don't have the time or money to spend figuring out how to get  | 
                    |
| 35 | 35 | 
                        privacy online. This is the worst of all possible worlds. </p>  | 
                    
| 36 | 36 | 
                         | 
                    
| 37 | 37 | 
                        <p>So yes, criminals could in theory use Tor, but they already have  | 
                    
| ... | ... | 
                      @@ -40,6 +40,12 @@ world will stop them from doing their bad things. At the same time, Tor  | 
                  
| 40 | 40 | 
                        and other privacy measures can <em>fight</em> identity theft, physical  | 
                    
| 41 | 41 | 
                        crimes like stalking, and so on. </p>  | 
                    
| 42 | 42 | 
                         | 
                    
| 43 | 
                        +<!--  | 
                    |
| 44 | 
                        +<a id="Pervasive"></a>  | 
                    |
| 45 | 
                        +<h3><a class="anchor" href="#Pervasive">If the whole world starts using  | 
                    |
| 46 | 
                        +Tor, won't civilization collapse?</a></h3>  | 
                    |
| 47 | 
                        +-->  | 
                    |
| 48 | 
                        +  | 
                    |
| 43 | 49 | 
                        <a id="DDoS"></a>  | 
                    
| 44 | 50 | 
                        <h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3>  | 
                    
| 45 | 51 | 
                         | 
                    
| 46 | 52 |