Thomas Sjögren commited on 2005-06-08 04:37:51
Zeige 1 geänderte Dateien mit 20 Einfügungen und 20 Löschungen.
... | ... |
@@ -57,8 +57,8 @@ machines around the world. </p> |
57 | 57 |
<p>Tor aims to provide protection for ordinary people who want to follow |
58 | 58 |
the law. Only criminals have privacy right now; we need to fix that. </p> |
59 | 59 |
|
60 |
-<a name="Tradeoff"></a> |
|
61 |
-<h3>Isn't it just a tradeoff: accepting the bad uses for the good ones?</h3> |
|
60 |
+<a id="Tradeoff"></a> |
|
61 |
+<h3><a class="anchor" href="#Tradeoff">Isn't it just a tradeoff: accepting the bad uses for the good ones?</a></h3> |
|
62 | 62 |
|
63 | 63 |
<p>No, we don't think that's how it works in the case of Tor. </p> |
64 | 64 |
|
... | ... |
@@ -81,8 +81,8 @@ world will stop them from doing their bad things. At the same time, Tor |
81 | 81 |
and other privacy measures can <em>fight</em> identity theft, physical |
82 | 82 |
crimes like stalking, and so on. </p> |
83 | 83 |
|
84 |
-<a name="DDoS"></a> |
|
85 |
-<h3>What about distributed denial of service attacks?</h3> |
|
84 |
+<a id="DDoS"></a> |
|
85 |
+<h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3> |
|
86 | 86 |
|
87 | 87 |
<p>Distributed denial of service attacks typically rely on having a group |
88 | 88 |
of thousands of computers all sending floods of traffic to a victim. Since |
... | ... |
@@ -102,8 +102,8 @@ DDoS attack can do it just fine without Tor. </p> |
102 | 102 |
much aggregate throughput you can eke out of it, then come back to us |
103 | 103 |
if you're still worried. </p> |
104 | 104 |
|
105 |
-<a name="WhatAboutSpammers"></a> |
|
106 |
-<h3>What about spammers?</h3> |
|
105 |
+<a id="WhatAboutSpammers"></a> |
|
106 |
+<h3><a class="anchor" href="#WhatAboutSpammers">What about spammers?</a></h3> |
|
107 | 107 |
|
108 | 108 |
<p>The simple answer: The default Tor exit policy rejects all outgoing |
109 | 109 |
port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to |
... | ... |
@@ -120,8 +120,8 @@ complexity of getting new software installed and configured, and doing |
120 | 120 |
Tor's public key operations, etc, makes it not economically worthwhile |
121 | 121 |
for them to use Tor. </p> |
122 | 122 |
|
123 |
-<a name="ExitPolicies"></a> |
|
124 |
-<h3>How do Tor exit policies work?</h3> |
|
123 |
+<a id="ExitPolicies"></a> |
|
124 |
+<h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3> |
|
125 | 125 |
|
126 | 126 |
<p>Each Tor server has an exit policy that specifies what sort of |
127 | 127 |
outbound connections are allowed or refused from that server. The exit |
... | ... |
@@ -132,8 +132,8 @@ to their intended destination. </p> |
132 | 132 |
<p>This way each server can decide the services he wants to allow |
133 | 133 |
connections to, based on abuse potential and his own situation. </p> |
134 | 134 |
|
135 |
-<a name="HowMuchAbuse"></a> |
|
136 |
-<h3>Does Tor get much abuse?</h3> |
|
135 |
+<a id="HowMuchAbuse"></a> |
|
136 |
+<h3><a class="anchor" href="#HowMuchAbuse">Does Tor get much abuse?</a></h3> |
|
137 | 137 |
|
138 | 138 |
<p>Not much, in the grand scheme of things. We've been running the network |
139 | 139 |
since October 2003, and it's only generated a handful of complaints. Of |
... | ... |
@@ -148,8 +148,8 @@ href="http://tor.eff.org/cvs/tor/doc/tor-doc.html">many good uses as |
148 | 148 |
well</a>, we feel that we're doing pretty well at striking a balance |
149 | 149 |
currently. </p> |
150 | 150 |
|
151 |
-<a name="TypicalAbuses"></a> |
|
152 |
-<h3>So what should I expect if I run a server?</h3> |
|
151 |
+<a id="TypicalAbuses"></a> |
|
152 |
+<h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run a server?</a></h3> |
|
153 | 153 |
|
154 | 154 |
<p>If you run a Tor server that allows exit connections (such as the |
155 | 155 |
default exit policy), it's probably safe to say that you will eventually |
... | ... |
@@ -193,8 +193,8 @@ that not all software works this way. Until then, we recommend you avoid |
193 | 193 |
them, and teach your friends (if they use them) to avoid them too.</li> |
194 | 194 |
</ul> |
195 | 195 |
|
196 |
-<a name="IrcBans"></a> |
|
197 |
-<h3>Tor is banned from the IRC network I want to use.</h3> |
|
196 |
+<a id="IrcBans"></a> |
|
197 |
+<h3><a class="anchor" href="#IrcBans">Tor is banned from the IRC network I want to use.</a></h3> |
|
198 | 198 |
|
199 | 199 |
<p>Sometimes jerks make use of Tor to troll IRC channels. This abuse |
200 | 200 |
results in IP-specific temporary bans ("klines" in IRC lingo), as the |
... | ... |
@@ -247,8 +247,8 @@ IRC block tracker</a> |
247 | 247 |
so that others can share. At least one IRC network consults that page |
248 | 248 |
to unblock exit nodes that have been blocked inadvertently. </p> |
249 | 249 |
|
250 |
-<a name="SMTPBans"></a> |
|
251 |
-<h3>Your nodes are banned from the mail server I want to use.</h3> |
|
250 |
+<a id="SMTPBans"></a> |
|
251 |
+<h3><a class="anchor" href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></h3> |
|
252 | 252 |
|
253 | 253 |
<p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for |
254 | 254 |
spamming</a>, some over-zealous blacklisters seem to think that all |
... | ... |
@@ -258,8 +258,8 @@ understand it. If your server administrators decide to make use of these |
258 | 258 |
blacklists to refuse incoming mail, you should have a conversation with |
259 | 259 |
them and explain how Tor works. </p> |
260 | 260 |
|
261 |
-<a name="Bans"></a> |
|
262 |
-<h3>I want to ban the Tor network from my service.</h3> |
|
261 |
+<a id="Bans"></a> |
|
262 |
+<h3><a class="anchor" href="#Bans">I want to ban the Tor network from my service.</a></h3> |
|
263 | 263 |
|
264 | 264 |
<p>First, ask yourself if there's a way to do application-level decisions |
265 | 265 |
to separate the legitimate users from the jerks. For example, you might |
... | ... |
@@ -292,8 +292,8 @@ the overall list of nodes in the network). </p> |
292 | 292 |
python script to parse the Tor directory <a |
293 | 293 |
href="http://tor.eff.org/cvs/tor/contrib/exitlist">here</a>. </p> |
294 | 294 |
|
295 |
-<a name="LegalQuestions"></a> |
|
296 |
-<h3>I have legal questions about Tor abuse.</h3> |
|
295 |
+<a id="LegalQuestions"></a> |
|
296 |
+<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3> |
|
297 | 297 |
|
298 | 298 |
<p>We're only the developers. We can answer technical questions, but |
299 | 299 |
we're not the ones to talk to about legal questions or concerns. </p> |
300 | 300 |