Roger Dingledine commited on 2005-09-12 12:33:13
Zeige 3 geänderte Dateien mit 15 Einfügungen und 8 Löschungen.
... | ... |
@@ -57,14 +57,13 @@ |
57 | 57 |
<a id="RunningTor"></a> |
58 | 58 |
<h2><a class="anchor" href="#RunningTor">Running Tor</a></h2> |
59 | 59 |
<ul> |
60 |
-<li><a href="/cvs/tor/doc/tor-doc.html">Why should I run Tor?</a></li> |
|
60 |
+<li><a href="/overview.html">Why should I run Tor?</a></li> |
|
61 | 61 |
<li><a href="/cvs/tor/doc/tor-doc-win32.html">Installing Tor on Win32</a></li> |
62 | 62 |
<li><a href="/cvs/tor/doc/tor-doc-osx.html">Installing Tor on Mac OS X</a></li> |
63 | 63 |
<li><a href="/cvs/tor/doc/tor-doc-unix.html">Installing Tor on Linux/BSD/Unix</a></li> |
64 | 64 |
<li><a href="/cvs/tor/doc/tor-switchproxy.html">Installing SwitchProxy for Tor</a></li> |
65 | 65 |
<li><a href="/cvs/tor/doc/tor-doc-server.html">Configuring a Tor server</a></li> |
66 | 66 |
<li><a href="/cvs/tor/doc/tor-hidden-service.html">Configuring a Tor hidden service</a></li> |
67 |
-<li><a href="/cvs/tor/doc/tor-doc.html#own-network">Setting up your own Tor network</a></li> |
|
68 | 67 |
</ul> |
69 | 68 |
|
70 | 69 |
<a id="DesignDoc"></a> |
... | ... |
@@ -144,7 +144,7 @@ with exit abuse complaints," so we hope our network is more sustainable |
144 | 144 |
than past attempts at anonymity networks. </p> |
145 | 145 |
|
146 | 146 |
<p>Since Tor has <a |
147 |
-href="/cvs/tor/doc/tor-doc.html">many good uses as |
|
147 |
+href="/overview.html">many good uses as |
|
148 | 148 |
well</a>, we feel that we're doing pretty well at striking a balance |
149 | 149 |
currently. </p> |
150 | 150 |
|
... | ... |
@@ -82,11 +82,19 @@ online privacy and security. Activist groups like the Electronic Frontier |
82 | 82 |
Foundation (EFF) are supporting Tor's development as a mechanism for |
83 | 83 |
maintaining civil liberties online. Corporations use Tor as a safe way |
84 | 84 |
to conduct competitive analysis, and to protect sensitive procurement |
85 |
-patterns from eavesdroppers. A branch of the U.S. Navy uses Tor for |
|
86 |
-open source intelligence gathering, and one of its teams used Tor |
|
87 |
-while deployed in the Middle East recently. Law enforcement uses Tor |
|
88 |
-for visiting or surveilling web sites without leaving government IP |
|
89 |
-addresses in their web logs. |
|
85 |
+patterns from eavesdroppers. They also use it to replace traditional |
|
86 |
+VPNs, which reveal the exact amount and timing of communication. Which |
|
87 |
+locations have employees working late? Which locations have employees |
|
88 |
+consulting job-hunting websites? Which research divisions are communicating |
|
89 |
+with the company's patent lawyers? |
|
90 |
+</p> |
|
91 |
+ |
|
92 |
+<p> |
|
93 |
+A branch of the U.S. Navy uses Tor for open source intelligence |
|
94 |
+gathering, and one of its teams used Tor while deployed in the Middle |
|
95 |
+East recently. Law enforcement uses Tor for visiting or surveilling |
|
96 |
+web sites without leaving government IP addresses in their web logs, |
|
97 |
+and for security during sting operations. |
|
90 | 98 |
</p> |
91 | 99 |
|
92 | 100 |
<p> |
93 | 101 |