Roger Dingledine commited on 2007-10-21 10:48:45
              Zeige 1 geänderte Dateien mit 68 Einfügungen und 23 Löschungen.
            
| ... | ... | 
                      @@ -25,35 +25,69 @@  | 
                  
| 25 | 25 | 
                        <hr />  | 
                    
| 26 | 26 | 
                         | 
                    
| 27 | 27 | 
                        <p>  | 
                    
| 28 | 
                        -Tor is a toolset for a wide range of organizations and people that want  | 
                    |
| 29 | 
                        -to improve their safety and security on the Internet. Using Tor can help  | 
                    |
| 30 | 
                        -you anonymize web browsing and publishing, instant messaging, IRC, SSH,  | 
                    |
| 31 | 
                        -and other applications that use the TCP protocol. Tor also provides a  | 
                    |
| 32 | 
                        -platform on which software developers can build new applications with  | 
                    |
| 33 | 
                        -built-in anonymity, safety, and privacy features.  | 
                    |
| 28 | 
                        +Tor covers your tracks on the web. When you connect to the Internet from  | 
                    |
| 29 | 
                        +your computer, you leave a return address that's like a calling card,  | 
                    |
| 30 | 
                        +everywhere you go. Even if you don't log into a site with a username and  | 
                    |
| 31 | 
                        +password, you leave information on what IP address you came from and when.  | 
                    |
| 34 | 32 | 
                        </p>  | 
                    
| 35 | 33 | 
                         | 
                    
| 36 | 34 | 
                        <p>  | 
                    
| 37 | 
                        -Tor aims to defend against <a href="<page overview>">traffic analysis</a>,  | 
                    |
| 38 | 
                        -a form of network surveillance that threatens personal  | 
                    |
| 39 | 
                        -anonymity and privacy, confidential business activities and relationships,  | 
                    |
| 40 | 
                        -and state security.  | 
                    |
| 41 | 
                        -Communications are bounced around a distributed network of servers called  | 
                    |
| 42 | 
                        -onion routers, <a  | 
                    |
| 43 | 
                        -href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#WhatProtections">protecting you</a>  | 
                    |
| 44 | 
                        -from websites that build profiles of your interests,  | 
                    |
| 45 | 
                        -local eavesdroppers that read your data or learn what sites you visit,  | 
                    |
| 46 | 
                        -and even the onion routers themselves.  | 
                    |
| 35 | 
                        +Since this is all the information that is usually needed to find out  | 
                    |
| 36 | 
                        +who was on the other end of the wire, marketers, governments, and other  | 
                    |
| 37 | 
                        +curious parties can trace you by tracing the activity associated with  | 
                    |
| 38 | 
                        +your IP address.  | 
                    |
| 47 | 39 | 
                        </p>  | 
                    
| 48 | 40 | 
                         | 
                    
| 49 | 41 | 
                        <p>  | 
                    
| 50 | 
                        -Tor's security is improved as its user base grows and as  | 
                    |
| 51 | 
                        -more people volunteer to run servers. Please consider  | 
                    |
| 52 | 
                        -<a href="<page volunteer>">volunteering your time</a> or  | 
                    |
| 53 | 
                        -<a href="<page docs/tor-doc-server>">volunteering your  | 
                    |
| 54 | 
                        -bandwidth</a>.  | 
                    |
| 55 | 
                        -And remember that this is development code—it's not a good idea to rely  | 
                    |
| 56 | 
                        -solely on the current Tor network if you really need strong anonymity.  | 
                    |
| 42 | 
                        +Tor hides your IP address. It's like blocking your caller ID.  | 
                    |
| 43 | 
                        +</p>  | 
                    |
| 44 | 
                        +  | 
                    |
| 45 | 
                        +<p>  | 
                    |
| 46 | 
                        +Hundreds of thousands of people around the world use Tor — <a  | 
                    |
| 47 | 
                        +href="<page whousestor>">journalists and bloggers, human rights workers,  | 
                    |
| 48 | 
                        +law enforcement officers, soldiers, corporations, citizens of repressive  | 
                    |
| 49 | 
                        +regimes, and just ordinary citizens</a>. We have a full page devoted  | 
                    |
| 50 | 
                        +to explaining exactly <a href="<page overview>">what Tor does, why this  | 
                    |
| 51 | 
                        +diversity of users is important, and how Tor works</a>.  | 
                    |
| 52 | 
                        +</p>  | 
                    |
| 53 | 
                        +  | 
                    |
| 54 | 
                        +<p>  | 
                    |
| 55 | 
                        +To quickly start using Tor, we recommend the  | 
                    |
| 56 | 
                        +<a href="<page download>">Vidalia bundle</a>  | 
                    |
| 57 | 
                        +as the easiest to install and get working.  | 
                    |
| 58 | 
                        +</p>  | 
                    |
| 59 | 
                        +  | 
                    |
| 60 | 
                        +<p>  | 
                    |
| 61 | 
                        +There are three pieces of fine print you need to know about.  | 
                    |
| 62 | 
                        +First, Tor does not protect you if you do not use it correctly.  | 
                    |
| 63 | 
                        +Read <a href="<page download>#Warnings">our list of warnings</a> and  | 
                    |
| 64 | 
                        +make sure to follow the  | 
                    |
| 65 | 
                        +<a href="<page documentation>#RunningTor">instructions for your platform</a>  | 
                    |
| 66 | 
                        +carefully. Second, even if you configure and use Tor correctly,  | 
                    |
| 67 | 
                        +there are still  | 
                    |
| 68 | 
                        +<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks"  | 
                    |
| 69 | 
                        +>  | 
                    |
| 70 | 
                        +potential attacks that could compromise Tor's ability to protect you</a>.  | 
                    |
| 71 | 
                        +Third, no anonymity system is perfect these days, and Tor is no exception:  | 
                    |
| 72 | 
                        +you should not rely solely on the current Tor network if you really need  | 
                    |
| 73 | 
                        +strong anonymity.  | 
                    |
| 74 | 
                        +</p>  | 
                    |
| 75 | 
                        +  | 
                    |
| 76 | 
                        +<p>  | 
                    |
| 77 | 
                        +Tor works by bouncing your traffic around a set of relays run by  | 
                    |
| 78 | 
                        +volunteers all around the world. Tor's security improves as its user  | 
                    |
| 79 | 
                        +base grows and as more people volunteer to  | 
                    |
| 80 | 
                        +<a href="<page docs/tor-doc-relay>">run a relay</a>. It isn't  | 
                    |
| 81 | 
                        +nearly as hard to set up as you might think, and can significantly  | 
                    |
| 82 | 
                        +<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">  | 
                    |
| 83 | 
                        +enhance your own security against some attacks</a>.  | 
                    |
| 84 | 
                        +If running a relay isn't for you, we need  | 
                    |
| 85 | 
                        +<a href="<page volunteer>">help with many other aspects of the project</a>,  | 
                    |
| 86 | 
                        +and we need funds to <a  | 
                    |
| 87 | 
                        +href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Funding">continue  | 
                    |
| 88 | 
                        +making the Tor network faster and easier to use while maintaining good  | 
                    |
| 89 | 
                        +security</a>.  | 
                    |
| 90 | 
                        +<a href="<page donate>">Please donate.</a>  | 
                    |
| 57 | 91 | 
                        </p>  | 
                    
| 58 | 92 | 
                         | 
                    
| 59 | 93 | 
                        <a id="News"></a>  | 
                    
| ... | ... | 
                      @@ -61,6 +95,17 @@ solely on the current Tor network if you really need strong anonymity.  | 
                  
| 61 | 95 | 
                        <hr />  | 
                    
| 62 | 96 | 
                         | 
                    
| 63 | 97 | 
                        <ul>  | 
                    
| 98 | 
                        +<li>Oct 2007: As many of you know, The Tor Project became an <a  | 
                    |
| 99 | 
                        +href="<page people>">independent and official nonprofit</a> this past  | 
                    |
| 100 | 
                        +February. We did this so we could accept grants from groups who  | 
                    |
| 101 | 
                        +only donate to NGOs, and so our donors could deduct qualifying  | 
                    |
| 102 | 
                        +<a href="<page donate>">donations</a> made to us.  | 
                    |
| 103 | 
                        +<br />  | 
                    |
| 104 | 
                        +We'd like to extend our profound thanks to the <a  | 
                    |
| 105 | 
                        +href="https://www.eff.org/">Electronic Frontier Foundation</a> for their  | 
                    |
| 106 | 
                        +past support, fiscal sponsorship, and help in hosting some of our web  | 
                    |
| 107 | 
                        +pages, and for their continued mentorship of and counsel to our  | 
                    |
| 108 | 
                        +fledgling nonprofit organization.</li>  | 
                    |
| 64 | 109 | 
                        <li>Sep 2007: If you have received email claiming to be Tor, it wasn't  | 
                    
| 65 | 110 | 
                        from us. The <a href="<page download>">official Tor bundles</a> can be <a  | 
                    
| 66 | 111 | 
                        href="http://wiki.noreply.org/noreply/TheOnionRouter/VerifyingSignatures">verified  | 
                    
| 67 | 112 |