Mike Perry commited on 2011-04-04 23:05:05
              Zeige 1 geänderte Dateien mit 47 Einfügungen und 6 Löschungen.
            
| ... | ... | 
                      @@ -12,6 +12,7 @@  | 
                  
| 12 | 12 | 
                        <div id="maincol">  | 
                    
| 13 | 13 | 
                        <!-- PUT CONTENT AFTER THIS TAG -->  | 
                    
| 14 | 14 | 
                        <h1>Abuse FAQ</h1>  | 
                    
| 15 | 
                        + <hr>  | 
                    |
| 15 | 16 | 
                        #<!-- BEGIN SIDEBAR -->  | 
                    
| 16 | 17 | 
                        #<div class="sidebar-left">  | 
                    
| 17 | 18 | 
                        #<h3>Questions</h3>  | 
                    
| ... | ... | 
                      @@ -30,7 +31,21 @@  | 
                  
| 30 | 31 | 
                        #</ul>  | 
                    
| 31 | 32 | 
                        #</div>  | 
                    
| 32 | 33 | 
                        #<!-- END SIDEBAR -->  | 
                    
| 33 | 
                        - #<hr>  | 
                    |
| 34 | 
                        + <h3>Questions</h3>  | 
                    |
| 35 | 
                        + <ul>  | 
                    |
| 36 | 
                        + <li><a href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li>  | 
                    |
| 37 | 
                        + <li><a href="#DDoS">What about distributed denial of service attacks?</a></li>  | 
                    |
| 38 | 
                        + <li><a href="#WhatAboutSpammers">What about spammers?</a></li>  | 
                    |
| 39 | 
                        + <li><a href="#HowMuchAbuse">Does Tor get much abuse?</a></li>  | 
                    |
| 40 | 
                        + <li><a href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></li>  | 
                    |
| 41 | 
                        + <li><a href="#IrcBans">Tor is banned from the IRC network I want to use.</a></li>  | 
                    |
| 42 | 
                        + <li><a href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>  | 
                    |
| 43 | 
                        + <li><a href="#Bans">I want to ban the Tor network from my service.</a></li>  | 
                    |
| 44 | 
                        + <li><a href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>  | 
                    |
| 45 | 
                        + <li><a href="#RemoveContent">I want some content removed from a .onion address.</a></li>  | 
                    |
| 46 | 
                        + <li><a href="#LegalQuestions">I have legal questions about Tor abuse.</a></li>  | 
                    |
| 47 | 
                        + </ul>  | 
                    |
| 48 | 
                        + <hr>  | 
                    |
| 34 | 49 | 
                         | 
                    
| 35 | 50 | 
                        <a id="WhatAboutCriminals"></a>  | 
                    
| 36 | 51 | 
                        <h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3>  | 
                    
| ... | ... | 
                      @@ -158,6 +173,13 @@  | 
                  
| 158 | 173 | 
                        the notice without any liability. [Arbitrary ports]</li>  | 
                    
| 159 | 174 | 
                        </ul>  | 
                    
| 160 | 175 | 
                         | 
                    
| 176 | 
                        + <p>For a complete set of template responses to different abuse complaint  | 
                    |
| 177 | 
                        + types, see <a  | 
                    |
| 178 | 
                        + href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates  | 
                    |
| 179 | 
                        + on the Tor wiki</a>. You can also proactively reduce the amount of abuse you  | 
                    |
| 180 | 
                        + get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips  | 
                    |
| 181 | 
                        + for running an exit node with minimal harassment</a>.  | 
                    |
| 182 | 
                        +  | 
                    |
| 161 | 183 | 
                        <p>You might also find that your Tor relay's IP is blocked from accessing  | 
                    
| 162 | 184 | 
                        some Internet sites/services. This might happen regardless of your exit  | 
                    
| 163 | 185 | 
                        policy, because some groups don't seem to know or care that Tor has  | 
                    
| ... | ... | 
                      @@ -339,13 +361,26 @@  | 
                  
| 339 | 361 | 
                        using them as bounce points, etc).  | 
                    
| 340 | 362 | 
                        </p>  | 
                    
| 341 | 363 | 
                         | 
                    
| 364 | 
                        + <p>  | 
                    |
| 365 | 
                        + This ultimately means that it is the responsibility of site owners to protect  | 
                    |
| 366 | 
                        + themselves against compromise and security issues that can come from  | 
                    |
| 367 | 
                        + anywhere. This is just part of signing up for the benefits of the  | 
                    |
| 368 | 
                        + Internet. You must be prepared to secure yourself against the bad elements,  | 
                    |
| 369 | 
                        + wherever they may come from. Tracking and increased surveillance are not  | 
                    |
| 370 | 
                        + the answer to preventing abuse.  | 
                    |
| 371 | 
                        + </p>  | 
                    |
| 372 | 
                        +  | 
                    |
| 342 | 373 | 
                        <p>  | 
                    
| 343 | 374 | 
                        But remember that this doesn't mean that Tor is invulnerable. Traditional  | 
                    
| 344 | 375 | 
                        police techniques can still be very effective against Tor, such as  | 
                    
| 345 | 
                        - interviewing suspects, surveillance and keyboard taps, writing style  | 
                    |
| 346 | 
                        - analysis, sting operations, and other physical investigations.  | 
                    |
| 376 | 
                        + investigating means, motive, and opportunity, interviewing suspects,  | 
                    |
| 377 | 
                        + writing style analysis, technical analysis of the content itself, sting operations,  | 
                    |
| 378 | 
                        + keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone  | 
                    |
| 379 | 
                        + including law enforcement groups to train them how to use the Tor software to safely conduct  | 
                    |
| 380 | 
                        + investigations or anonymized activities online.  | 
                    |
| 347 | 381 | 
                        </p>  | 
                    
| 348 | 382 | 
                         | 
                    
| 383 | 
                        +  | 
                    |
| 349 | 384 | 
                        <a id="RemoveContent"></a>  | 
                    
| 350 | 385 | 
                        <h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>  | 
                    
| 351 | 386 | 
                        <p>The Tor Project does not host, control, nor have the ability to  | 
                    
| ... | ... | 
                      @@ -359,15 +394,21 @@  | 
                  
| 359 | 394 | 
                        owner and location of the .onion site is hidden even from us.</p>  | 
                    
| 360 | 395 | 
                        <p>But remember that this doesn't mean that hidden services are  | 
                    
| 361 | 396 | 
                        invulnerable. Traditional police techniques can still be very effective  | 
                    
| 362 | 
                        - against them, such as interviewing suspects, surveillance and keyboard  | 
                    |
| 363 | 
                        - taps, writing style analysis, sting operations, and other physical  | 
                    |
| 364 | 
                        - investigations.</p>  | 
                    |
| 397 | 
                        + against them, such as interviewing suspects, writing style analysis,  | 
                    |
| 398 | 
                        + technical analysis of the content itself, sting operations, keyboard taps,  | 
                    |
| 399 | 
                        + and other physical investigations.</p>  | 
                    |
| 400 | 
                        +  | 
                    |
| 365 | 401 | 
                        <p>If you have a complaint about child pornography, you may wish to report  | 
                    
| 366 | 402 | 
                        it to the National Center for Missing and Exploited Children, which serves  | 
                    
| 367 | 403 | 
                        as a national coordination point for investigation of child pornography:  | 
                    
| 368 | 404 | 
                        <a href="http://www.missingkids.com/">http://www.missingkids.com/</a>.  | 
                    
| 369 | 405 | 
                        We do not view links you report.</p>  | 
                    
| 370 | 406 | 
                         | 
                    
| 407 | 
                        + <p>The Tor Project also encourages the use of Tor by law enforcement in  | 
                    |
| 408 | 
                        + the investigation, stings, and infiltration of child pornography rings.  | 
                    |
| 409 | 
                        + Please contact us for information on Tor trainings.  | 
                    |
| 410 | 
                        + </p>  | 
                    |
| 411 | 
                        +  | 
                    |
| 371 | 412 | 
                        <a id="LegalQuestions"></a>  | 
                    
| 372 | 413 | 
                        <h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>  | 
                    
| 373 | 414 | 
                         | 
                    
| 374 | 415 |