Mike Perry commited on 2011-04-04 23:05:05
Zeige 1 geänderte Dateien mit 47 Einfügungen und 6 Löschungen.
... | ... |
@@ -12,6 +12,7 @@ |
12 | 12 |
<div id="maincol"> |
13 | 13 |
<!-- PUT CONTENT AFTER THIS TAG --> |
14 | 14 |
<h1>Abuse FAQ</h1> |
15 |
+ <hr> |
|
15 | 16 |
#<!-- BEGIN SIDEBAR --> |
16 | 17 |
#<div class="sidebar-left"> |
17 | 18 |
#<h3>Questions</h3> |
... | ... |
@@ -30,7 +31,21 @@ |
30 | 31 |
#</ul> |
31 | 32 |
#</div> |
32 | 33 |
#<!-- END SIDEBAR --> |
33 |
- #<hr> |
|
34 |
+ <h3>Questions</h3> |
|
35 |
+ <ul> |
|
36 |
+ <li><a href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li> |
|
37 |
+ <li><a href="#DDoS">What about distributed denial of service attacks?</a></li> |
|
38 |
+ <li><a href="#WhatAboutSpammers">What about spammers?</a></li> |
|
39 |
+ <li><a href="#HowMuchAbuse">Does Tor get much abuse?</a></li> |
|
40 |
+ <li><a href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></li> |
|
41 |
+ <li><a href="#IrcBans">Tor is banned from the IRC network I want to use.</a></li> |
|
42 |
+ <li><a href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li> |
|
43 |
+ <li><a href="#Bans">I want to ban the Tor network from my service.</a></li> |
|
44 |
+ <li><a href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li> |
|
45 |
+ <li><a href="#RemoveContent">I want some content removed from a .onion address.</a></li> |
|
46 |
+ <li><a href="#LegalQuestions">I have legal questions about Tor abuse.</a></li> |
|
47 |
+ </ul> |
|
48 |
+ <hr> |
|
34 | 49 |
|
35 | 50 |
<a id="WhatAboutCriminals"></a> |
36 | 51 |
<h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3> |
... | ... |
@@ -158,6 +173,13 @@ |
158 | 173 |
the notice without any liability. [Arbitrary ports]</li> |
159 | 174 |
</ul> |
160 | 175 |
|
176 |
+ <p>For a complete set of template responses to different abuse complaint |
|
177 |
+ types, see <a |
|
178 |
+ href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates |
|
179 |
+ on the Tor wiki</a>. You can also proactively reduce the amount of abuse you |
|
180 |
+ get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips |
|
181 |
+ for running an exit node with minimal harassment</a>. |
|
182 |
+ |
|
161 | 183 |
<p>You might also find that your Tor relay's IP is blocked from accessing |
162 | 184 |
some Internet sites/services. This might happen regardless of your exit |
163 | 185 |
policy, because some groups don't seem to know or care that Tor has |
... | ... |
@@ -339,13 +361,26 @@ |
339 | 361 |
using them as bounce points, etc). |
340 | 362 |
</p> |
341 | 363 |
|
364 |
+ <p> |
|
365 |
+ This ultimately means that it is the responsibility of site owners to protect |
|
366 |
+ themselves against compromise and security issues that can come from |
|
367 |
+ anywhere. This is just part of signing up for the benefits of the |
|
368 |
+ Internet. You must be prepared to secure yourself against the bad elements, |
|
369 |
+ wherever they may come from. Tracking and increased surveillance are not |
|
370 |
+ the answer to preventing abuse. |
|
371 |
+ </p> |
|
372 |
+ |
|
342 | 373 |
<p> |
343 | 374 |
But remember that this doesn't mean that Tor is invulnerable. Traditional |
344 | 375 |
police techniques can still be very effective against Tor, such as |
345 |
- interviewing suspects, surveillance and keyboard taps, writing style |
|
346 |
- analysis, sting operations, and other physical investigations. |
|
376 |
+ investigating means, motive, and opportunity, interviewing suspects, |
|
377 |
+ writing style analysis, technical analysis of the content itself, sting operations, |
|
378 |
+ keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone |
|
379 |
+ including law enforcement groups to train them how to use the Tor software to safely conduct |
|
380 |
+ investigations or anonymized activities online. |
|
347 | 381 |
</p> |
348 | 382 |
|
383 |
+ |
|
349 | 384 |
<a id="RemoveContent"></a> |
350 | 385 |
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3> |
351 | 386 |
<p>The Tor Project does not host, control, nor have the ability to |
... | ... |
@@ -359,15 +394,21 @@ |
359 | 394 |
owner and location of the .onion site is hidden even from us.</p> |
360 | 395 |
<p>But remember that this doesn't mean that hidden services are |
361 | 396 |
invulnerable. Traditional police techniques can still be very effective |
362 |
- against them, such as interviewing suspects, surveillance and keyboard |
|
363 |
- taps, writing style analysis, sting operations, and other physical |
|
364 |
- investigations.</p> |
|
397 |
+ against them, such as interviewing suspects, writing style analysis, |
|
398 |
+ technical analysis of the content itself, sting operations, keyboard taps, |
|
399 |
+ and other physical investigations.</p> |
|
400 |
+ |
|
365 | 401 |
<p>If you have a complaint about child pornography, you may wish to report |
366 | 402 |
it to the National Center for Missing and Exploited Children, which serves |
367 | 403 |
as a national coordination point for investigation of child pornography: |
368 | 404 |
<a href="http://www.missingkids.com/">http://www.missingkids.com/</a>. |
369 | 405 |
We do not view links you report.</p> |
370 | 406 |
|
407 |
+ <p>The Tor Project also encourages the use of Tor by law enforcement in |
|
408 |
+ the investigation, stings, and infiltration of child pornography rings. |
|
409 |
+ Please contact us for information on Tor trainings. |
|
410 |
+ </p> |
|
411 |
+ |
|
371 | 412 |
<a id="LegalQuestions"></a> |
372 | 413 |
<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3> |
373 | 414 |
|
374 | 415 |