Roger Dingledine commited on 2006-01-23 01:00:44
Zeige 1 geänderte Dateien mit 0 Einfügungen und 13 Löschungen.
... | ... |
@@ -48,19 +48,6 @@ and state security. |
48 | 48 |
<p> |
49 | 49 |
Instead of looking at the content of your communications, traffic analysis |
50 | 50 |
tracks where your data goes and when, as well as how much is sent. |
51 |
-<!-- |
|
52 |
-For example, online advertising companies like Doubleclick use traffic |
|
53 |
-analysis to record what web pages you've visited, and can build a |
|
54 |
-profile of your interests from that. A pharmaceutical company could |
|
55 |
-use traffic analysis to monitor when the research wing of a competitor |
|
56 |
-visits its website, and track what pages or products that interest the |
|
57 |
-competitor. IBM hosts a searchable patent index, and it could keep a list |
|
58 |
-of every query your company makes. A stalker could use traffic analysis |
|
59 |
-to learn whether you're in a certain Internet cafe. |
|
60 |
-</p> |
|
61 |
- |
|
62 |
-<p> |
|
63 |
---> |
|
64 | 51 |
Tor aims to make traffic analysis more difficult by preventing websites, |
65 | 52 |
eavesdroppers, and even the onion routers themselves from tracing your |
66 | 53 |
communications online. This means Tor lets you decide whether to identify |
67 | 54 |