Roger Dingledine commited on 2005-09-12 12:33:13
Zeige 3 geänderte Dateien mit 15 Einfügungen und 8 Löschungen.
| ... | ... |
@@ -57,14 +57,13 @@ |
| 57 | 57 |
<a id="RunningTor"></a> |
| 58 | 58 |
<h2><a class="anchor" href="#RunningTor">Running Tor</a></h2> |
| 59 | 59 |
<ul> |
| 60 |
-<li><a href="/cvs/tor/doc/tor-doc.html">Why should I run Tor?</a></li> |
|
| 60 |
+<li><a href="/overview.html">Why should I run Tor?</a></li> |
|
| 61 | 61 |
<li><a href="/cvs/tor/doc/tor-doc-win32.html">Installing Tor on Win32</a></li> |
| 62 | 62 |
<li><a href="/cvs/tor/doc/tor-doc-osx.html">Installing Tor on Mac OS X</a></li> |
| 63 | 63 |
<li><a href="/cvs/tor/doc/tor-doc-unix.html">Installing Tor on Linux/BSD/Unix</a></li> |
| 64 | 64 |
<li><a href="/cvs/tor/doc/tor-switchproxy.html">Installing SwitchProxy for Tor</a></li> |
| 65 | 65 |
<li><a href="/cvs/tor/doc/tor-doc-server.html">Configuring a Tor server</a></li> |
| 66 | 66 |
<li><a href="/cvs/tor/doc/tor-hidden-service.html">Configuring a Tor hidden service</a></li> |
| 67 |
-<li><a href="/cvs/tor/doc/tor-doc.html#own-network">Setting up your own Tor network</a></li> |
|
| 68 | 67 |
</ul> |
| 69 | 68 |
|
| 70 | 69 |
<a id="DesignDoc"></a> |
| ... | ... |
@@ -144,7 +144,7 @@ with exit abuse complaints," so we hope our network is more sustainable |
| 144 | 144 |
than past attempts at anonymity networks. </p> |
| 145 | 145 |
|
| 146 | 146 |
<p>Since Tor has <a |
| 147 |
-href="/cvs/tor/doc/tor-doc.html">many good uses as |
|
| 147 |
+href="/overview.html">many good uses as |
|
| 148 | 148 |
well</a>, we feel that we're doing pretty well at striking a balance |
| 149 | 149 |
currently. </p> |
| 150 | 150 |
|
| ... | ... |
@@ -82,11 +82,19 @@ online privacy and security. Activist groups like the Electronic Frontier |
| 82 | 82 |
Foundation (EFF) are supporting Tor's development as a mechanism for |
| 83 | 83 |
maintaining civil liberties online. Corporations use Tor as a safe way |
| 84 | 84 |
to conduct competitive analysis, and to protect sensitive procurement |
| 85 |
-patterns from eavesdroppers. A branch of the U.S. Navy uses Tor for |
|
| 86 |
-open source intelligence gathering, and one of its teams used Tor |
|
| 87 |
-while deployed in the Middle East recently. Law enforcement uses Tor |
|
| 88 |
-for visiting or surveilling web sites without leaving government IP |
|
| 89 |
-addresses in their web logs. |
|
| 85 |
+patterns from eavesdroppers. They also use it to replace traditional |
|
| 86 |
+VPNs, which reveal the exact amount and timing of communication. Which |
|
| 87 |
+locations have employees working late? Which locations have employees |
|
| 88 |
+consulting job-hunting websites? Which research divisions are communicating |
|
| 89 |
+with the company's patent lawyers? |
|
| 90 |
+</p> |
|
| 91 |
+ |
|
| 92 |
+<p> |
|
| 93 |
+A branch of the U.S. Navy uses Tor for open source intelligence |
|
| 94 |
+gathering, and one of its teams used Tor while deployed in the Middle |
|
| 95 |
+East recently. Law enforcement uses Tor for visiting or surveilling |
|
| 96 |
+web sites without leaving government IP addresses in their web logs, |
|
| 97 |
+and for security during sting operations. |
|
| 90 | 98 |
</p> |
| 91 | 99 |
|
| 92 | 100 |
<p> |
| 93 | 101 |