...
|
...
|
@@ -65,7 +65,7 @@ or world religions is behind a national firewall.
|
65
|
65
|
|
66
|
66
|
<li>
|
67
|
67
|
<strong>Field Agents:</strong>
|
68
|
|
-It is not difficult for insurgents to monitor internet traffic and
|
|
68
|
+It is not difficult for insurgents to monitor Internet traffic and
|
69
|
69
|
discover all the hotels and other locations from which people are
|
70
|
70
|
connecting to known military servers.
|
71
|
71
|
Military field agents deployed away from home use Tor to
|
...
|
...
|
@@ -89,7 +89,7 @@ to record a military address, thereby revealing the surveillance.
|
89
|
89
|
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
|
90
|
90
|
<ul>
|
91
|
91
|
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
|
92
|
|
-tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
|
|
92
|
+tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
|
93
|
93
|
journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
|
94
|
94
|
</li>
|
95
|
95
|
<li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
|
...
|
...
|
@@ -103,7 +103,7 @@ local events to encourage social change and political reform.
|
103
|
103
|
</li>
|
104
|
104
|
<li><strong>Citizens and journalists in <a
|
105
|
105
|
href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
|
106
|
|
-holes</a></strong> use Tor to research state propoganda and opposing
|
|
106
|
+holes</a></strong> use Tor to research state propaganda and opposing
|
107
|
107
|
viewpoints, to file stories with non-State controlled media, and to
|
108
|
108
|
avoid risking the personal consequences of intellectual curiosity.
|
109
|
109
|
</li>
|
...
|
...
|
@@ -165,7 +165,7 @@ See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-l
|
165
|
165
|
report</a> on China Internet issues.
|
166
|
166
|
</li>
|
167
|
167
|
<li><a href="http://www.globalvoicesonline.org">Global Voices</a>
|
168
|
|
-recommends Tor, especially for <strong>anonynomous blogging</strong>,
|
|
168
|
+recommends Tor, especially for <strong>anonymous blogging</strong>,
|
169
|
169
|
throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
|
170
|
170
|
web site.</a>
|
171
|
171
|
</li>
|
...
|
...
|
@@ -220,7 +220,7 @@ To support this, <strong>Tor currently has an open Americorps/VISTA position</st
|
220
|
220
|
government grant will cover a full time stipend for a volunteer to create
|
221
|
221
|
curricula to <strong>show low-income populations how to use anonymity online for
|
222
|
222
|
safer civic engagement</strong>. Although it's often said that the poor do not use
|
223
|
|
-online access for civic engagment, failing to act in their self-interests,
|
|
223
|
+online access for civic engagement, failing to act in their self-interests,
|
224
|
224
|
it is our hypothesis (based on personal conversations and anecdotal
|
225
|
225
|
information) that it is precisely the “permanent record ”
|
226
|
226
|
left online that keeps many of the poor from speaking out on the Internet.
|
...
|
...
|
@@ -299,7 +299,7 @@ just a good idea some of the time - it is a requirement for a free and functioni
|
299
|
299
|
and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
|
300
|
300
|
are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
|
301
|
301
|
the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
|
302
|
|
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
|
|
302
|
+purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
|
303
|
303
|
<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
|
304
|
304
|
you have better options than Tor. While not dismissing the potential abuses of Tor,
|
305
|
305
|
this page shows a few of the many important ways anonymity is used online today.</p>
|
306
|
306
|
|