try out some new frontpage text
Roger Dingledine

Roger Dingledine commited on 2004-12-09 18:55:04
Zeige 2 geänderte Dateien mit 47 Einfügungen und 22 Löschungen.

... ...
@@ -25,7 +25,7 @@
25 25
 <h2>Tor: How It Works</h2>
26 26
 
27 27
 <p>
28
-<a href="overview.html">Basic Tor Overview</a>: what Tor does, why it
28
+<a href="overview.html">Basic Tor Overview</a>: what Tor provides, why it
29 29
 matters, how it works.
30 30
 </p>
31 31
 
... ...
@@ -26,36 +26,61 @@
26 26
 <h2>Tor: an anonymous Internet communication system</h2>
27 27
 
28 28
 <p>
29
-The right to speak anonymously is <a
30
-href="http://www.eff.org/Privacy/Anonymity/">protected by the First
31
-Amendment</a> in the United States and is crucial for safety, privacy,
32
-and free expression on the global Internet. People who need anonymity
33
-online range from whistleblowers and political dissidents to people
34
-giving tips to the police and kids who are exploring online.
29
+Tor is a toolset for a wide range of organizations and people who want
30
+to improve their safety and security on the Internet. Using Tor can help
31
+you anonymize web browsing and publishing, instant messaging, IRC, SSH,
32
+and more. Tor also provides a platform on which software developers can
33
+build new applications with built-in anonymity, safety, and privacy
34
+features.
35 35
 </p>
36 36
 
37 37
 <p>
38
-Tor helps these people by allowing them to communicate anonymously on the
39
-Internet. It can anonymize web browsing, instant messaging, IRC, SSH, and
40
-more. Your identity is hidden because communications are bounced around
41
-a distributed network of servers called <a href="howitworks.html">onion
42
-routers</a> -- this system makes it hard for recipients, observers,
43
-and even the onion routers themselves to track the source of the stream.
38
+Your traffic is safer when you use Tor because communications
39
+are bounced around a distributed network of servers called <a
40
+href="howitworks.html">onion routers</a> -- this makes it hard for
41
+recipients, observers, and even the onion routers themselves to figure
42
+out who and where you are. Tor's technology aims to provide Internet
43
+users with protection against <em>traffic analysis</em>, a form of
44
+network surveillance that threatens personal anonymity and privacy,
45
+confidential business activities and relationships, and state security.
44 46
 </p>
45 47
 
46 48
 <p>
47
-Tor development is now supported by a grant from
48
-the <a href="http://www.eff.org/">Electronic Frontier
49
-Foundation</a>. The more people use Tor and volunteer to
50
-run servers, the better this service will be. Please consider <a
51
-href="cvs/tor/doc/tor-doc.html#installing">installing
52
-it</a> and then <a
53
-href="cvs/tor/doc/tor-doc.html#server">helping
54
-out</a>. You can also <a href="documentation.html">learn more about Tor here</a>.
49
+Traffic analysis is used every day by companies, governments, and
50
+individuals who want to keep track of where people and organizations go
51
+and what they do on the Internet.  Instead of looking at the content of
52
+your communications, traffic analysis tracks where they go. For example,
53
+online advertising company Doubleclick uses traffic analysis to record
54
+what webpages you've visited, and can build a profile of your interests
55
+from that. A pharmaceutical company could use traffic analysis to monitor
56
+when the research wing of a competitor visits its website, and track
57
+what pages or products the competitor is interested in. IBM hosts a
58
+searchable patent index, and it could keep a list of every query your
59
+company makes. A stalker could use traffic analysis to learn whether
60
+you're in a certain Internet cafe.
55 61
 </p>
56 62
 
57 63
 <p>
58
-Remember that this is development code -- it's not a good idea to rely
64
+Tor aims to make traffic analysis more difficult by preventing
65
+eavesdroppers from finding out where your communications are going
66
+online, and by letting you decide whether to identify yourself when
67
+you communicate.
68
+</p>
69
+
70
+<p>
71
+Currently, Tor development is supported by the <a
72
+href="http://www.eff.org/">Electronic Frontier Foundation</a>.
73
+Tor's security is improved as its user base grows and as
74
+more people volunteer to run servers.  Please consider <a
75
+href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then
76
+<a href="cvs/tor/doc/tor-doc.html#server">helping out</a>. You can also
77
+<a href="documentation.html">learn more about Tor here</a>.
78
+</p>
79
+
80
+<p>
81
+Tor is an important piece of building more safety, privacy, and anonymity
82
+online, but it is not a complete solution.
83
+And remember that this is development code; it's not a good idea to rely
59 84
 on the current Tor network if you really need strong anonymity.
60 85
 </p>
61 86
 
62 87