Andrew Lewman commited on 2007-12-17 06:11:02
Zeige 1 geänderte Dateien mit 24 Einfügungen und 2 Löschungen.
... | ... |
@@ -9,6 +9,14 @@ |
9 | 9 |
|
10 | 10 |
<div class="main-column"> |
11 | 11 |
<h1>Who uses Tor?</h1> |
12 |
+ |
|
13 |
+<p> |
|
14 |
+Tor was originally designed, implemented, and deployed as a third-generation |
|
15 |
+<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>, |
|
16 |
+and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications. |
|
17 |
+Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend. |
|
18 |
+</p> |
|
19 |
+ |
|
12 | 20 |
<a link="normalusers"></a> |
13 | 21 |
<h2>Everyday, ordinary Internet surfers use Tor</h2> |
14 | 22 |
<ul> |
... | ... |
@@ -44,9 +52,17 @@ you had suspicions of a pre-existing condition. |
44 | 52 |
<a link="military"></a> |
45 | 53 |
<h2>Militaries use Tor</h2> |
46 | 54 |
<ul> |
47 |
-<li>Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research |
|
48 |
-Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications. |
|
55 |
+ |
|
56 |
+<li> |
|
57 |
+<strong>Field Agents:</strong> |
|
58 |
+It is not difficult for insurgents to monitor internet traffic and |
|
59 |
+discover all the hotels and other locations from which people are |
|
60 |
+connecting to known military servers. |
|
61 |
+Military field agents deployed away from home have used Tor to |
|
62 |
+mask the sites they are visiting, protecting military interests and |
|
63 |
+operations, as well as protecting themselves from physical harm. |
|
49 | 64 |
</li> |
65 |
+ |
|
50 | 66 |
<li><strong>Hidden services:</strong> |
51 | 67 |
When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
52 | 68 |
local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
... | ... |
@@ -166,6 +182,12 @@ accidents.”</strong> |
166 | 182 |
regarding sweatshops</strong> that produce goods for western countries and to |
167 | 183 |
organize local labor. |
168 | 184 |
</li> |
185 |
+<li> |
|
186 |
+Tor can help activists avoid government or corporate censorship that hinders organization. |
|
187 |
+In one such case, a |
|
188 |
+<a href="http://www.cbc.ca/story/canada/national/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a> |
|
189 |
+to help organize a strike. |
|
190 |
+</li> |
|
169 | 191 |
</ul> |
170 | 192 |
|
171 | 193 |
<a link="spotlight"></a> |
172 | 194 |