Andrew Lewman commited on 2009-03-03 05:26:52
Zeige 1 geänderte Dateien mit 8 Einfügungen und 3 Löschungen.
... | ... |
@@ -17,9 +17,10 @@ link some important financial or personal information to you!</p> |
17 | 17 |
<ul> |
18 | 18 |
<li>Your Internet service provider</li> |
19 | 19 |
<li>Your favorite website or online store</li> |
20 |
+<li>Your favorite coffee shop or cafe with free wifi</li> |
|
20 | 21 |
</ul> |
21 | 22 |
|
22 |
-<p>These activities are commonly called traffic analysis and corporations, |
|
23 |
+<p>These snooping activities are commonly called traffic analysis. Corporations, |
|
23 | 24 |
marketing organizations, governments, and other parties are becoming |
24 | 25 |
increasingly sophisticated at it.</p> |
25 | 26 |
|
... | ... |
@@ -29,6 +30,7 @@ increasingly sophisticated at it.</p> |
29 | 30 |
journals</li> |
30 | 31 |
<li>Thieves, spammers, and phishers to launch progressively sophisticated and |
31 | 32 |
personalized attacks</li> |
33 |
+<li>Corporations can collect and aggregate online browsing and chatting behavior for better ad-targeting and profiling.</li> |
|
32 | 34 |
</ul> |
33 | 35 |
|
34 | 36 |
<p>For some people, this electronic spying is a nuisance that can affect their |
... | ... |
@@ -37,11 +39,11 @@ pocketbook; for others, it jeopardizes their personal security.</p> |
37 | 39 |
<p>Since 2001, the Tor Project has been developing free and |
38 | 40 |
open-source software that helps provide anonymity for Internet users. It works |
39 | 41 |
by allowing users |
40 |
-to travel the web on a circuitous route on a set of servers positioned |
|
42 |
+to travel the web on a circuitous route over 1500 servers positioned |
|
41 | 43 |
around the world. When you use Tor, your route on the Internet is indirect, |
42 | 44 |
so snoops have a difficult time following your path and seizing vital |
43 | 45 |
information. Tor also has special functionality, called hidden services, |
44 |
-that allows users to run websites without revealing their location.</p> |
|
46 |
+that allows you to run websites without revealing their location.</p> |
|
45 | 47 |
|
46 | 48 |
<p>Tor is compatible with different operating systems, such as Microsoft |
47 | 49 |
Windows, Apple Mac, and various versions of Linux. Tor works with most |
... | ... |
@@ -53,7 +55,10 @@ online:</p> |
53 | 55 |
<li>Journalists who need to protect their sources</li> |
54 | 56 |
<li>Human rights workers</li> |
55 | 57 |
<li>Dissidents in politically rigid countries</li> |
58 |
+<li>Corporations who wish to protect their employees web traffic</li> |
|
59 |
+ |
|
56 | 60 |
<li>Whistle blowers who fear retribution</li> |
61 |
+<li>Governments wishing to protect their agents and employees traffic</li> |
|
57 | 62 |
<li>Law enforcement officers on Internet sting operations</li> |
58 | 63 |
<li>People wanting to post socially sensitive information in chat |
59 | 64 |
rooms, like rape or abuse survivors and those with stigmatized illnesses.</li> |
60 | 65 |