put together a new website frontpage, as a frankenstein from shava's oct 2006 draft and jeff's new draft, plus some glue and some important topics that weren't in either of them.
Roger Dingledine

Roger Dingledine commited on 2007-10-21 10:48:45
Zeige 1 geänderte Dateien mit 68 Einfügungen und 23 Löschungen.

... ...
@@ -25,35 +25,69 @@
25 25
 <hr />
26 26
 
27 27
 <p>
28
-Tor is a toolset for a wide range of organizations and people that want
29
-to improve their safety and security on the Internet. Using Tor can help
30
-you anonymize web browsing and publishing, instant messaging, IRC, SSH,
31
-and other applications that use the TCP protocol. Tor also provides a
32
-platform on which software developers can build new applications with
33
-built-in anonymity, safety, and privacy features.
28
+Tor covers your tracks on the web. When you connect to the Internet from
29
+your computer, you leave a return address that's like a calling card,
30
+everywhere you go. Even if you don't log into a site with a username and
31
+password, you leave information on what IP address you came from and when.
34 32
 </p>
35 33
 
36 34
 <p>
37
-Tor aims to defend against <a href="<page overview>">traffic analysis</a>,
38
-a form of network surveillance that threatens personal
39
-anonymity and privacy, confidential business activities and relationships,
40
-and state security.
41
-Communications are bounced around a distributed network of servers called
42
-onion routers, <a
43
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#WhatProtections">protecting you</a>
44
-from websites that build profiles of your interests,
45
-local eavesdroppers that read your data or learn what sites you visit,
46
-and even the onion routers themselves.
35
+Since this is all the information that is usually needed to find out
36
+who was on the other end of the wire, marketers, governments, and other
37
+curious parties can trace you by tracing the activity associated with
38
+your IP address.
47 39
 </p>
48 40
 
49 41
 <p>
50
-Tor's security is improved as its user base grows and as
51
-more people volunteer to run servers.  Please consider
52
-<a href="<page volunteer>">volunteering your time</a> or
53
-<a href="<page docs/tor-doc-server>">volunteering your
54
-bandwidth</a>.
55
-And remember that this is development code&mdash;it's not a good idea to rely
56
-solely on the current Tor network if you really need strong anonymity.
42
+Tor hides your IP address. It's like blocking your caller ID.
43
+</p>
44
+
45
+<p>
46
+Hundreds of thousands of people around the world use Tor &mdash; <a
47
+href="<page whousestor>">journalists and bloggers, human rights workers,
48
+law enforcement officers, soldiers, corporations, citizens of repressive
49
+regimes, and just ordinary citizens</a>. We have a full page devoted
50
+to explaining exactly <a href="<page overview>">what Tor does, why this
51
+diversity of users is important, and how Tor works</a>.
52
+</p>
53
+
54
+<p>
55
+To quickly start using Tor, we recommend the
56
+<a href="<page download>">Vidalia bundle</a>
57
+as the easiest to install and get working.
58
+</p>
59
+
60
+<p>
61
+There are three pieces of fine print you need to know about.
62
+First, Tor does not protect you if you do not use it correctly.
63
+Read <a href="<page download>#Warnings">our list of warnings</a> and
64
+make sure to follow the
65
+<a href="<page documentation>#RunningTor">instructions for your platform</a>
66
+carefully. Second, even if you configure and use Tor correctly,
67
+there are still
68
+<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks"
69
+>
70
+potential attacks that could compromise Tor's ability to protect you</a>.
71
+Third, no anonymity system is perfect these days, and Tor is no exception:
72
+you should not rely solely on the current Tor network if you really need
73
+strong anonymity.
74
+</p>
75
+
76
+<p>
77
+Tor works by bouncing your traffic around a set of relays run by
78
+volunteers all around the world. Tor's security improves as its user
79
+base grows and as more people volunteer to
80
+<a href="<page docs/tor-doc-relay>">run a relay</a>. It isn't
81
+nearly as hard to set up as you might think, and can significantly
82
+<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">
83
+enhance your own security against some attacks</a>.
84
+If running a relay isn't for you, we need
85
+<a href="<page volunteer>">help with many other aspects of the project</a>,
86
+and we need funds to <a
87
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Funding">continue
88
+making the Tor network faster and easier to use while maintaining good
89
+security</a>.
90
+<a href="<page donate>">Please donate.</a>
57 91
 </p>
58 92
 
59 93
 <a id="News"></a>
... ...
@@ -61,6 +95,17 @@ solely on the current Tor network if you really need strong anonymity.
61 95
 <hr />
62 96
 
63 97
 <ul>
98
+<li>Oct 2007: As many of you know, The Tor Project became an <a
99
+href="<page people>">independent and official nonprofit</a> this past
100
+February. We did this so we could accept grants from groups who
101
+only donate to NGOs, and so our donors could deduct qualifying
102
+<a href="<page donate>">donations</a> made to us.
103
+<br />
104
+We'd like to extend our profound thanks to the <a
105
+href="https://www.eff.org/">Electronic Frontier Foundation</a> for their
106
+past support, fiscal sponsorship, and help in hosting some of our web
107
+pages, and for their continued mentorship of and counsel to our
108
+fledgling nonprofit organization.</li>
64 109
 <li>Sep 2007: If you have received email claiming to be Tor, it wasn't
65 110
 from us. The <a href="<page download>">official Tor bundles</a> can be <a
66 111
 href="http://wiki.noreply.org/noreply/TheOnionRouter/VerifyingSignatures">verified
67 112