Nick Mathewson commited on 2004-12-21 05:48:55
Zeige 5 geänderte Dateien mit 24 Einfügungen und 20 Löschungen.
... | ... |
@@ -78,7 +78,7 @@ so we can go in the system tray?</li> |
78 | 78 |
</ul> |
79 | 79 |
</p> |
80 | 80 |
|
81 |
-<p>People who want to donate to Tor: |
|
81 |
+<p>Donors: |
|
82 | 82 |
<ul> |
83 | 83 |
<li>Go take a look at the <a href="http://www.eff.org/">Electronic |
84 | 84 |
Frontier Foundation</a>. More EFF donations means more Tor development.</li> |
... | ... |
@@ -31,10 +31,10 @@ directory</a>. It should run on Linux, BSD, OS X, Win32, Solaris, |
31 | 31 |
and more. |
32 | 32 |
<ul> |
33 | 33 |
<!-- |
34 |
-<li>Latest experimental: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a> |
|
34 |
+<li>Latest experimental source: <a href="dist/tor-0.0.9.tar.gz">0.0.9</a> |
|
35 | 35 |
(<a href="dist/tor-0.0.9.tar.gz.asc">sig</a>)</li> |
36 | 36 |
--> |
37 |
-<li>Latest stable: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a> |
|
37 |
+<li>Latest stable source: <a href="dist/tor-0.0.9.1.tar.gz">0.0.9.1</a> |
|
38 | 38 |
(<a href="dist/tor-0.0.9.1.tar.gz.asc">sig</a>)</li> |
39 | 39 |
<li>Win32 installer (experimental): |
40 | 40 |
<a href="dist/win32/tor-0.0.9.1-win32.exe">0.0.9.1</a> (<a |
... | ... |
@@ -48,7 +48,7 @@ href="cvs/tor/doc/tor-doc.html#installing">here</a>. |
48 | 48 |
</p> |
49 | 49 |
|
50 | 50 |
<p>See the <a href="developers.html">developers page</a> for instructions |
51 |
-on fetching Tor CVS. |
|
51 |
+on fetching Tor from CVS. |
|
52 | 52 |
</p> |
53 | 53 |
|
54 | 54 |
<p> |
... | ... |
@@ -66,7 +66,7 @@ features. |
66 | 66 |
<p> |
67 | 67 |
Your traffic is safer when you use Tor because communications |
68 | 68 |
are bounced around a distributed network of servers called <a |
69 |
-href="howitworks.html">onion routers</a> -- this makes it hard for |
|
69 |
+href="howitworks.html">onion routers</a>—this makes it hard for |
|
70 | 70 |
recipients, observers, and even the onion routers themselves to figure |
71 | 71 |
out who and where you are. Tor's technology aims to provide Internet |
72 | 72 |
users with protection against "traffic analysis," a form of |
... | ... |
@@ -108,7 +108,7 @@ href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then |
108 | 108 |
<p> |
109 | 109 |
Tor is an important piece of building more safety, privacy, and anonymity |
110 | 110 |
online, but it is not a complete solution. |
111 |
-And remember that this is development code -- it's not a good idea to rely |
|
111 |
+And remember that this is development code—it's not a good idea to rely |
|
112 | 112 |
on the current Tor network if you really need strong anonymity. |
113 | 113 |
</p> |
114 | 114 |
|
... | ... |
@@ -29,16 +29,17 @@ |
29 | 29 |
<p> |
30 | 30 |
Tor is a network-within-a-network that allows people and groups to |
31 | 31 |
improve their privacy and security on the Internet. It also enables |
32 |
-future software developers to create new kinds of communication tools |
|
33 |
-that have built-in privacy features. Tor can provide the foundation for |
|
34 |
-a whole range of applications that allow organizations and individuals |
|
32 |
+software developers to create new communication tools |
|
33 |
+with built-in privacy features. Tor provides the foundation for |
|
34 |
+a range of applications that allow organizations and individuals |
|
35 | 35 |
to share information over public networks without compromising their |
36 | 36 |
privacy. |
37 | 37 |
</p> |
38 | 38 |
|
39 | 39 |
<p> |
40 |
-Individuals can use Tor to shield themselves and their family members |
|
41 |
-from being tracked by remote websites. They can also use it to connect |
|
40 |
+Individuals can use Tor to keep remote websites from tracking them and their |
|
41 |
+family members. |
|
42 |
+They can also use it to connect |
|
42 | 43 |
to resources such as news sites or instant messaging services that are |
43 | 44 |
blocked by their local Internet service providers (ISPs). |
44 | 45 |
</p> |
... | ... |
@@ -57,7 +58,8 @@ teams used Tor while deployed in the Middle East recently. |
57 | 58 |
|
58 | 59 |
<p> |
59 | 60 |
The variety of people who use Tor is actually part of what makes it |
60 |
-so secure. The more populous and diverse the user base for Tor is, |
|
61 |
+so secure. Tor hides you among the other users on the network, so the more |
|
62 |
+populous and diverse the user base for Tor is, |
|
61 | 63 |
the more your anonymity will be protected. |
62 | 64 |
</p> |
63 | 65 |
|
... | ... |
@@ -74,7 +76,7 @@ institution of origin. It can even threaten your job and physical safety |
74 | 76 |
by revealing who and where you are. For example, if you're travelling |
75 | 77 |
abroad and you connect to your employer's computers to check or send mail, |
76 | 78 |
you can inadvertently reveal your national origin and professional |
77 |
-affiliation to any local observing the network, even if the connection |
|
79 |
+affiliation to anyone observing the network, even if the connection |
|
78 | 80 |
is encrypted. |
79 | 81 |
</p> |
80 | 82 |
|
... | ... |
@@ -101,7 +103,9 @@ the network, looking at headers. |
101 | 103 |
But there are also more powerful kinds of traffic analysis. Some |
102 | 104 |
attackers spy on multiple parts of the Internet and use sophisticated |
103 | 105 |
statistical techniques to track the communications patterns of many |
104 |
-different organizations and individuals. |
|
106 |
+different organizations and individuals. Encryption does not help against |
|
107 |
+these attackers, since it only hides the content of Internet traffic, not |
|
108 |
+the headers. |
|
105 | 109 |
</p> |
106 | 110 |
|
107 | 111 |
<h3>The solution: a distributed, anonymous network</h3> |
... | ... |
@@ -111,7 +115,7 @@ Tor helps to reduce the risks of both simple and sophisticated traffic |
111 | 115 |
analysis by distributing your transactions over several places on the |
112 | 116 |
Internet, so no single point can link you to your destination. The idea |
113 | 117 |
is similar to using a twisty, hard-to-follow route in order to throw off |
114 |
-somebody who is tailing you -- and then periodically erasing your |
|
118 |
+somebody who is tailing you—and then periodically erasing your |
|
115 | 119 |
footprints. Instead of taking a direct route from source to |
116 | 120 |
destination, data packets on the Tor network take a random pathway |
117 | 121 |
through several servers that cover your tracks so no observer at any |
... | ... |
@@ -126,10 +130,10 @@ To create a private network pathway with Tor, the user's software or |
126 | 130 |
client incrementally builds a circuit of encrypted connections through |
127 | 131 |
servers on the network. The circuit is extended one hop at a time, and |
128 | 132 |
each server along the way knows only which server gave it data and which |
129 |
-server it is giving data to. No individual server will ever know the |
|
133 |
+server it is giving data to. No individual server ever knows the |
|
130 | 134 |
complete path that a data packet has taken. The client negotiates a |
131 | 135 |
separate set of encryption keys for each hop along the circuit to ensure |
132 |
-that each hop can't see what these connections are as they pass through. |
|
136 |
+that each hop can't trace these connections as they pass through. |
|
133 | 137 |
</p> |
134 | 138 |
|
135 | 139 |
<img alt="tor circuit step three" src="img/htw3.png" /> |
... | ... |
@@ -169,7 +173,7 @@ the site, and nobody who offered the site would know who was posting to it. |
169 | 173 |
<h3>Staying anonymous</h3> |
170 | 174 |
|
171 | 175 |
<p> |
172 |
-Of course, Tor can't solve all anonymity problems. It focuses only on |
|
176 |
+Tor can't solve all anonymity problems. It focuses only on |
|
173 | 177 |
protecting the transport of data. You need to use protocol-specific |
174 | 178 |
support software if you don't want the sites you visit to see your |
175 | 179 |
identifying information. For example, you can use web proxies such as |
... | ... |
@@ -27,7 +27,7 @@ |
27 | 27 |
<h2>Tor: People</h2> |
28 | 28 |
|
29 | 29 |
<p>Tor is managed by <a href="http://freehaven.net/">The Free |
30 |
-Haven Project</a> as one of the building blocks necessary for |
|
30 |
+Haven Project</a> as a building block for |
|
31 | 31 |
a robust censorship-resistant data haven. It is developed by <a |
32 | 32 |
href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a |
33 | 33 |
href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from |
... | ... |
@@ -39,7 +39,7 @@ href="http://www.syverson.org/">Paul Syverson</a> and based on the |
39 | 39 |
original <a href="http://www.onion-router.net/">onion routing</a> idea |
40 | 40 |
developed there.</p> |
41 | 41 |
|
42 |
-<p>As of November 2004, Tor development is now supported by the <a |
|
42 |
+<p>Since November 2004, Tor development has been supported by the <a |
|
43 | 43 |
href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p> |
44 | 44 |
|
45 | 45 |
</div><!-- #main --> |
46 | 46 |