Andrew Lewman commited on 2008-10-22 04:51:17
Zeige 1 geänderte Dateien mit 74 Einfügungen und 52 Löschungen.
... | ... |
@@ -7,71 +7,93 @@ |
7 | 7 |
|
8 | 8 |
<h2>Why You Need Tor</h2> |
9 | 9 |
<hr /> |
10 |
-<p>Few issues affect the legitimacy of the Internet more than protecting |
|
11 |
-people's personal data while they're online. Because the vast majority |
|
12 |
-of Internet traffic passes along public routes, it is relatively easy |
|
13 |
-for prying eyes to view the comings and goings of Internet users -- and |
|
14 |
-even link some important financial or personal information to you. These |
|
15 |
-snoopers can get their information almost anywhere. Like your Internet |
|
16 |
-service provider. Or your favorite website, which may be disclosing your |
|
17 |
-shopping patterns. Or maybe a politically rigid government is compiling |
|
18 |
-a list of its citizens reading outlawed journals. </p> |
|
19 |
- |
|
20 |
-<p>These activities are commonly called "traffic analysis" and |
|
21 |
-corporations, governments and other parties are becoming increasingly |
|
22 |
-sophisticated at it. While these organizations remain vague in their |
|
23 |
-intentions, their effect on Internet users is clear. For some people, |
|
24 |
-this electronic spying is a nuisance that can affect their pocketbook; |
|
25 |
-for others, it could jeopardize their personal security.</p> |
|
26 |
- |
|
27 |
-<p>Since 2001, the Tor Project has been developing free and open-source |
|
28 |
-software that helps provide anonymity for Internet users. It works by |
|
29 |
-allowing users to travel the web on a circuitous route on a set of |
|
30 |
-servers positioned around the world. When you use Tor, your route on |
|
31 |
-the Internet is indirect, so snoops have a difficult time |
|
32 |
-following your path and seizing vital information. Tor also has special |
|
33 |
-functionality, called hidden services, that allows users to run |
|
34 |
-websites without revealing their location.</p> |
|
10 |
+ |
|
11 |
+<p>The vast majority of Internet traffic passes along public routes, making it |
|
12 |
+relatively easy for prying eyes to view your comings and goings -- and even |
|
13 |
+link some important financial or personal information to you!</p> |
|
14 |
+ |
|
15 |
+<p>Snoopers can get your information almost anywhere:</p> |
|
16 |
+<ul> |
|
17 |
+<li>Your Internet service provider</li> |
|
18 |
+<li>Your favorite website or online store</li> |
|
19 |
+</ul> |
|
20 |
+ |
|
21 |
+<p>These activities are commonly called traffic analysis and corporations, |
|
22 |
+marketing organizations, governments, and other parties are becoming |
|
23 |
+increasingly sophisticated at it.</p> |
|
24 |
+ |
|
25 |
+<p>Traffic Analysis enables: </p> |
|
26 |
+<ul> |
|
27 |
+<li>Politically rigid governments to compile lists of citizens reading outlawed |
|
28 |
+journals</li> |
|
29 |
+<li>Thieves, spammers, and phishers to launch progressively sophisticated and |
|
30 |
+personalized attacks</li> |
|
31 |
+</ul> |
|
32 |
+ |
|
33 |
+<p>For some people, this electronic spying is a nuisance that can affect their |
|
34 |
+pocketbook; for others, it jeopardizes their personal security.</p> |
|
35 |
+ |
|
36 |
+<p>Since 2001, the Tor Project has been developing free and |
|
37 |
+ open-source software that helps provide anonymity for Internet users. It works |
|
38 |
+by allowing users |
|
39 |
+to travel the web on a circuitous route on a set of servers positioned |
|
40 |
+around the world. When you use Tor, your route on the Internet is indirect, |
|
41 |
+so snoops have a difficult time following your path and seizing vital |
|
42 |
+information. Tor also has special functionality, called hidden services, |
|
43 |
+that allows users to run websites without revealing their location.</p> |
|
35 | 44 |
|
36 | 45 |
<p>Tor is compatible with different operating systems, such as Microsoft |
37 | 46 |
Windows, Apple Mac, and various versions of Linux. Tor works with most |
38 | 47 |
programs that connect your computer to the Internet.</p> |
39 | 48 |
|
40 |
-<p>Today, Tor is used by hundreds of thousands of people to protect their |
|
41 |
-activities online. These include journalists and human rights workers in |
|
42 |
-politically rigid countries communicating with whistle blowers and |
|
43 |
-dissidents. Law enforcement officers on Internet sting operations stay |
|
44 |
-anonymous with Tor, as do people wanting to post socially sensitive |
|
45 |
-information in chat rooms, like rape or abuse survivors and those with |
|
46 |
-illnesses. The Tor Network also provides protection for people looking |
|
47 |
-for another layer of privacy from the millions of websites bent on |
|
48 |
-collecting private information and tracking their moves online.</p> |
|
49 |
+<p>Tor is used by hundreds of thousands of people to protect their activities |
|
50 |
+online:</p> |
|
51 |
+<ul> |
|
52 |
+<li>Journalists who need to protect their sources</li> |
|
53 |
+<li>Human rights workers</li> |
|
54 |
+<li>Dissidents in politically rigid countries</li> |
|
55 |
+<li>Whistle blowers who fear retribution</li> |
|
56 |
+<li>Law enforcement officers on Internet sting operations</li> |
|
57 |
+<li>People wanting to post socially sensitive information in chat |
|
58 |
+rooms, like rape or abuse survivors and those with stigmatized illnesses.</li> |
|
59 |
+</ul> |
|
60 |
+ |
|
61 |
+<p>The Tor Network also provides protection for people looking for another |
|
62 |
+layer of privacy from the millions of websites bent on collecting private |
|
63 |
+information and tracking their moves online.</p> |
|
49 | 64 |
|
50 | 65 |
<h2>Why Tor Needs You</h2> |
51 | 66 |
<hr /> |
52 |
-<p>Other than a few developers, the Tor Project is largely run by |
|
53 |
-volunteers. To help keep Tor's worldwide server network running and its |
|
54 |
-open source software up-to-date, the Tor project is looking for new |
|
55 |
-sponsors and funding. Join organizations like Google, Bell Security |
|
56 |
-Solutions, SRI International, the National Science Foundation, the |
|
57 |
-NLnet Foundation from the Netherlands, Human Rights Watch, and more than |
|
58 |
-500 individuals who have donated funds to the Tor Project.</p> |
|
59 |
- |
|
60 |
-<p>We guarantee your money will be put to good use. For every dollar |
|
61 |
-donated to the Tor Project, 75 cents goes directly into development. We |
|
62 |
-also promise good service. Sponsors receive personal attention, better |
|
67 |
+<p>Other than a few developers, the Tor Project is largely run by volunteers. |
|
68 |
+To help keep Tor's worldwide server network running and its open source |
|
69 |
+software up-to-date, the Tor project is looking for new sponsors and |
|
70 |
+funding.</p> |
|
71 |
+ |
|
72 |
+<p>We guarantee your money will be put to good use. For every dollar donated |
|
73 |
+to the Tor Project, 75 cents goes directly into development.</p> |
|
74 |
+ |
|
75 |
+<p>Sponsors receive personal attention, better |
|
63 | 76 |
support, and the chance to help us choose which of our priorities we |
64 | 77 |
should focus on next.</p> |
65 | 78 |
|
66 |
-<p>The Tor Project is a registered 501(c)(3) non-profit, making donations |
|
67 |
-tax deductible for those living in the United States or those paying |
|
68 |
-taxes with charitable donation reciprocity with the U.S.</p> |
|
79 |
+<p>Your contribution is tax deductible! The Tor Project is a registered |
|
80 |
+501(c)(3) non-profit, making donations tax deductible for those living in |
|
81 |
+the United States or those paying taxes with charitable donation reciprocity |
|
82 |
+with the U.S.</p> |
|
69 | 83 |
|
70 |
-<p>In this day and age, Tor provides a vital layer of protection for you |
|
71 |
-and your data. Your donations will help keep this project on the cutting |
|
72 |
-edge. If you have any questions about funding the Tor Project, please |
|
73 |
-contact: donations@torproject.org</p> |
|
84 |
+<p>You'll be in good company! Our sponsors include Google, Bell Security |
|
85 |
+Solutions, SRI International, The National Science Foundation, The |
|
86 |
+Netherlands' NLnet Foundation, Human Rights Watch and more than 500 |
|
87 |
+individuals who have donated funds to the Tor Project.</p> |
|
74 | 88 |
|
89 |
+<p>You'll feel good because you're protecting your information and your |
|
90 |
+rights. In this day and age, Tor provides a vital layer of protection for |
|
91 |
+you and your data.</p> |
|
92 |
+ |
|
93 |
+<p>Please join us! Your donations will help keep this important project on the |
|
94 |
+cutting edge. If you have any questions about funding the Tor Project, please |
|
95 |
+contact: |
|
96 |
+donations@torproject.org</p> |
|
75 | 97 |
</div><!-- #main --> |
76 | 98 |
|
77 | 99 |
#include <foot.wmi> |
78 | 100 |
\ No newline at end of file |
79 | 101 |