Andrew Lewman commited on 2009-07-28 03:05:38
Zeige 1 geänderte Dateien mit 0 Einfügungen und 105 Löschungen.
... | ... |
@@ -1,105 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
-# Translation-Priority: 1-high |
|
4 |
- |
|
5 |
-#include "head.wmi" TITLE="Tor Summary" CHARSET="UTF-8" |
|
6 |
- |
|
7 |
-<div class="main-column"> |
|
8 |
- |
|
9 |
-<h2>Why You Need Tor</h2> |
|
10 |
-<hr /> |
|
11 |
- |
|
12 |
-<p>The vast majority of Internet traffic passes along public routes, making it |
|
13 |
-relatively easy for prying eyes to view your comings and goings -- and even |
|
14 |
-link some important financial or personal information to you!</p> |
|
15 |
- |
|
16 |
-<p>Snoopers can get your information almost anywhere:</p> |
|
17 |
-<ul> |
|
18 |
-<li>Your Internet service provider</li> |
|
19 |
-<li>Your favorite website or online store</li> |
|
20 |
-<li>Your favorite coffee shop or cafe with free wifi</li> |
|
21 |
-</ul> |
|
22 |
- |
|
23 |
-<p>These snooping activities are commonly called traffic analysis. Corporations, |
|
24 |
-marketing organizations, governments, and other parties are becoming |
|
25 |
-increasingly sophisticated at it.</p> |
|
26 |
- |
|
27 |
-<p>Traffic Analysis enables: </p> |
|
28 |
-<ul> |
|
29 |
-<li>Politically rigid governments to compile lists of citizens reading outlawed |
|
30 |
-journals</li> |
|
31 |
-<li>Thieves, spammers, and phishers to launch progressively sophisticated and |
|
32 |
-personalized attacks</li> |
|
33 |
-<li>Corporations can collect and aggregate online browsing and chatting behavior for better ad-targeting and profiling.</li> |
|
34 |
-</ul> |
|
35 |
- |
|
36 |
-<p>For some people, this electronic spying is a nuisance that can affect their |
|
37 |
-pocketbook; for others, it jeopardizes their personal security.</p> |
|
38 |
- |
|
39 |
-<p>Since 2001, the Tor Project has been developing free and |
|
40 |
- open-source software that helps provide anonymity for Internet users. It works |
|
41 |
-by allowing users |
|
42 |
-to travel the web on a circuitous route over more than 1000 servers positioned |
|
43 |
-around the world. When you use Tor, your route on the Internet is indirect, |
|
44 |
-so snoops have a difficult time following your path and seizing vital |
|
45 |
-information. Tor also has special functionality, called hidden services, |
|
46 |
-that allows you to run websites without revealing their location.</p> |
|
47 |
- |
|
48 |
-<p>Tor is compatible with different operating systems, such as Microsoft |
|
49 |
-Windows, Apple Mac, and various versions of Linux. Tor works with most |
|
50 |
-programs that connect your computer to the Internet.</p> |
|
51 |
- |
|
52 |
-<p>Tor is used by hundreds of thousands of people to protect their activities |
|
53 |
-online:</p> |
|
54 |
-<ul> |
|
55 |
-<li>Journalists who need to protect their sources</li> |
|
56 |
-<li>Human rights workers</li> |
|
57 |
-<li>Dissidents in politically rigid countries</li> |
|
58 |
-<li>Corporations who wish to protect their employees' web traffic</li> |
|
59 |
- |
|
60 |
-<li>Whistle blowers who fear retribution</li> |
|
61 |
-<li>Governments wishing to protect their agents' and employees' traffic</li> |
|
62 |
-<li>Law enforcement officers on Internet sting operations</li> |
|
63 |
-<li>People wanting to post socially sensitive information in chat |
|
64 |
-rooms, like rape or abuse survivors and those with stigmatized illnesses.</li> |
|
65 |
-</ul> |
|
66 |
- |
|
67 |
-<p>The Tor Network also provides protection for people looking for another |
|
68 |
-layer of privacy from the millions of websites bent on collecting private |
|
69 |
-information and tracking their moves online.</p> |
|
70 |
- |
|
71 |
-<h2>Why Tor Needs You</h2> |
|
72 |
-<hr /> |
|
73 |
-<p>Other than a few developers, the Tor Project is largely run by volunteers. |
|
74 |
-To help keep Tor's worldwide server network running and its open source |
|
75 |
-software up-to-date, the Tor project is looking for new sponsors and |
|
76 |
-funding.</p> |
|
77 |
- |
|
78 |
-<p>We guarantee your money will be put to good use. For every dollar donated |
|
79 |
-to the Tor Project, 85 cents goes directly into development.</p> |
|
80 |
- |
|
81 |
-<p>Sponsors receive personal attention, better |
|
82 |
-support, and the chance to help us choose which of our priorities we |
|
83 |
-should focus on next.</p> |
|
84 |
- |
|
85 |
-<p>Your contribution is tax deductible! The Tor Project is a registered |
|
86 |
-501(c)(3) non-profit, making donations tax deductible for those living in |
|
87 |
-the United States or those paying taxes with charitable donation reciprocity |
|
88 |
-with the U.S.</p> |
|
89 |
- |
|
90 |
-<p>You'll be in good company! Our sponsors include Google, Bell Security |
|
91 |
-Solutions, SRI International, The National Science Foundation, The |
|
92 |
-Netherlands' NLnet Foundation, Human Rights Watch and more than 500 |
|
93 |
-individuals who have donated funds to the Tor Project.</p> |
|
94 |
- |
|
95 |
-<p>You'll feel good because you're protecting your information and your |
|
96 |
-rights. In this day and age, Tor provides a vital layer of protection for |
|
97 |
-you and your data.</p> |
|
98 |
- |
|
99 |
-<p>Please join us! Your donations will help keep this important project on the |
|
100 |
-cutting edge. If you have any questions about funding the Tor Project, please |
|
101 |
-contact: |
|
102 |
-donations@torproject.org</p> |
|
103 |
-</div><!-- #main --> |
|
104 |
- |
|
105 |
-#include <foot.wmi> |
|
106 | 0 |