Roger Dingledine commited on 2010-10-10 02:25:46
Zeige 1 geänderte Dateien mit 2 Einfügungen und 2 Löschungen.
... | ... |
@@ -311,11 +311,11 @@ |
311 | 311 |
debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
312 | 312 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
313 | 313 |
href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not |
314 |
- just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
314 |
+ just a good idea some of the time — it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
315 | 315 |
<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
316 | 316 |
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
317 | 317 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
318 |
- and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there |
|
318 |
+ and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there |
|
319 | 319 |
are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of |
320 | 320 |
the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
321 | 321 |
purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the |
322 | 322 |