Roger Dingledine commited on 2004-12-09 18:55:04
Zeige 2 geänderte Dateien mit 47 Einfügungen und 22 Löschungen.
... | ... |
@@ -26,36 +26,61 @@ |
26 | 26 |
<h2>Tor: an anonymous Internet communication system</h2> |
27 | 27 |
|
28 | 28 |
<p> |
29 |
-The right to speak anonymously is <a |
|
30 |
-href="http://www.eff.org/Privacy/Anonymity/">protected by the First |
|
31 |
-Amendment</a> in the United States and is crucial for safety, privacy, |
|
32 |
-and free expression on the global Internet. People who need anonymity |
|
33 |
-online range from whistleblowers and political dissidents to people |
|
34 |
-giving tips to the police and kids who are exploring online. |
|
29 |
+Tor is a toolset for a wide range of organizations and people who want |
|
30 |
+to improve their safety and security on the Internet. Using Tor can help |
|
31 |
+you anonymize web browsing and publishing, instant messaging, IRC, SSH, |
|
32 |
+and more. Tor also provides a platform on which software developers can |
|
33 |
+build new applications with built-in anonymity, safety, and privacy |
|
34 |
+features. |
|
35 | 35 |
</p> |
36 | 36 |
|
37 | 37 |
<p> |
38 |
-Tor helps these people by allowing them to communicate anonymously on the |
|
39 |
-Internet. It can anonymize web browsing, instant messaging, IRC, SSH, and |
|
40 |
-more. Your identity is hidden because communications are bounced around |
|
41 |
-a distributed network of servers called <a href="howitworks.html">onion |
|
42 |
-routers</a> -- this system makes it hard for recipients, observers, |
|
43 |
-and even the onion routers themselves to track the source of the stream. |
|
38 |
+Your traffic is safer when you use Tor because communications |
|
39 |
+are bounced around a distributed network of servers called <a |
|
40 |
+href="howitworks.html">onion routers</a> -- this makes it hard for |
|
41 |
+recipients, observers, and even the onion routers themselves to figure |
|
42 |
+out who and where you are. Tor's technology aims to provide Internet |
|
43 |
+users with protection against <em>traffic analysis</em>, a form of |
|
44 |
+network surveillance that threatens personal anonymity and privacy, |
|
45 |
+confidential business activities and relationships, and state security. |
|
44 | 46 |
</p> |
45 | 47 |
|
46 | 48 |
<p> |
47 |
-Tor development is now supported by a grant from |
|
48 |
-the <a href="http://www.eff.org/">Electronic Frontier |
|
49 |
-Foundation</a>. The more people use Tor and volunteer to |
|
50 |
-run servers, the better this service will be. Please consider <a |
|
51 |
-href="cvs/tor/doc/tor-doc.html#installing">installing |
|
52 |
-it</a> and then <a |
|
53 |
-href="cvs/tor/doc/tor-doc.html#server">helping |
|
54 |
-out</a>. You can also <a href="documentation.html">learn more about Tor here</a>. |
|
49 |
+Traffic analysis is used every day by companies, governments, and |
|
50 |
+individuals who want to keep track of where people and organizations go |
|
51 |
+and what they do on the Internet. Instead of looking at the content of |
|
52 |
+your communications, traffic analysis tracks where they go. For example, |
|
53 |
+online advertising company Doubleclick uses traffic analysis to record |
|
54 |
+what webpages you've visited, and can build a profile of your interests |
|
55 |
+from that. A pharmaceutical company could use traffic analysis to monitor |
|
56 |
+when the research wing of a competitor visits its website, and track |
|
57 |
+what pages or products the competitor is interested in. IBM hosts a |
|
58 |
+searchable patent index, and it could keep a list of every query your |
|
59 |
+company makes. A stalker could use traffic analysis to learn whether |
|
60 |
+you're in a certain Internet cafe. |
|
55 | 61 |
</p> |
56 | 62 |
|
57 | 63 |
<p> |
58 |
-Remember that this is development code -- it's not a good idea to rely |
|
64 |
+Tor aims to make traffic analysis more difficult by preventing |
|
65 |
+eavesdroppers from finding out where your communications are going |
|
66 |
+online, and by letting you decide whether to identify yourself when |
|
67 |
+you communicate. |
|
68 |
+</p> |
|
69 |
+ |
|
70 |
+<p> |
|
71 |
+Currently, Tor development is supported by the <a |
|
72 |
+href="http://www.eff.org/">Electronic Frontier Foundation</a>. |
|
73 |
+Tor's security is improved as its user base grows and as |
|
74 |
+more people volunteer to run servers. Please consider <a |
|
75 |
+href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then |
|
76 |
+<a href="cvs/tor/doc/tor-doc.html#server">helping out</a>. You can also |
|
77 |
+<a href="documentation.html">learn more about Tor here</a>. |
|
78 |
+</p> |
|
79 |
+ |
|
80 |
+<p> |
|
81 |
+Tor is an important piece of building more safety, privacy, and anonymity |
|
82 |
+online, but it is not a complete solution. |
|
83 |
+And remember that this is development code; it's not a good idea to rely |
|
59 | 84 |
on the current Tor network if you really need strong anonymity. |
60 | 85 |
</p> |
61 | 86 |
|
62 | 87 |