torusers from jeff
Andrew Lewman

Andrew Lewman commited on 2007-12-02 07:39:29
Zeige 1 geänderte Dateien mit 270 Einfügungen und 260 Löschungen.

... ...
@@ -10,11 +10,10 @@
10 10
 <div class="main-column">
11 11
 
12 12
 <h1>Who uses Tor?</h1>
13
-<hr />
14 13
 
15 14
 <p>
16
-We're still writing this page; please <a href="<page
17
-contact>">send us</a> your fixes, comments, and stories!
15
+If you have a success story with Tor, especially one we
16
+can link to, please <a href="<page contact>">send us</a> a note!
18 17
 </p>
19 18
 
20 19
 <p>
... ...
@@ -28,327 +27,317 @@ work &mdash; but he quickly followed up
28 27
 with a request not to provide details or mention his name.
29 28
 </p>
30 29
 
31
-<p>So while each story below represents actual users we've talked to,
32
-we've done our best to anonymize them when appropriate.
30
+<p>
31
+Like any technology, from pencils to cellphones to airplanes, anonymity can be used for both good and evil.
32
+You have probably seen at least some of the vigorous debate
33
+(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
34
+<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
35
+and
36
+<a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
37
+over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
38
+<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
39
+<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
40
+<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
41
+and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support port 25 to prevent anonymous email spamming), or if you're one of the
42
+<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Internet</a>,
43
+you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:
33 44
 </p>
34 45
 
35
-<hr />
36 46
 
37
-<h2>People use Tor every day to...</h2>
47
+<h2>Everyday, ordinary Internet surfers use Tor</h2>
38 48
 
39 49
 <ul>
40
-<li>...protect their privacy from unscrupulous marketers</li>
41
-
42
-<p>Anonymity helps defeat marketing that doesn't have your permissions.
43
-There are all kinds of unscrupulous marketing techniques that track your
44
-activity
45
-to build marketing databases, often selling your private information
46
-without your permission.  Tor, used appropriately,
47
-helps defeat many of these violations
48
-of your privacy.</p>
49
-
50
-<li>...protect their children online</li>
51
-
52
-<p>&ldquo;I'm proud my mom and dad let me stay alone at home now.&rdquo;
50
+<li>
51
+<strong>They protect their privacy from unscrupulous 
52
+marketers and identity thieves.</strong>
53
+Internet Service Providers (ISPs)
54
+<a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
55
+sell your Internet browsing records</a>
56
+to marketers or anyone else willing to pay for it. They typically say that 
57
+they anonymize it by not providing your username or personally 
58
+identifiable information, but
59
+<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.
60
+A full record of every
61
+site you visit, the text of every search you perform, and potentially 
62
+userid and even password information can still be part of this data.
63
+In addition to your ISP, the websites
64
+(<a href="http://www.google.com/privacy_faq.html">and search engines</a>)
65
+you visit have their own logs,
66
+containing the same or more information.
67
+</li>
68
+
69
+<li>
70
+<strong> They protect their communications from irresponsible corporations.</strong>
71
+All over the net, Tor is being recommended to people newly concerned
72
+about their privacy in the face of increasing breaches and betrayals of
73
+private data. From
74
+<a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
75
+<a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
76
+your data is often not well protected by those you are supposed to trust to keep it safe.
77
+</li>
78
+
79
+<li>
80
+<strong>They protect their children online.</strong>
53 81
 You've told your kids they shouldn't share personally identifying
54 82
 information online, but they may be sharing their location simply
55 83
 by not concealing their IP address. Increasingly, IP
56
-addresses can be literally mapped to street locations, and in the US the
57
-government is pushing to get this mapping closer and closer to 
58
-street addresses.
59
-</p>
60
-
61
-<li>...research sensitive topics</li>
62
-
63
-<p>There's a wealth of information available online.   But perhaps in your 
64
-country, access to information on AIDS, birth control, Tibetan culture,
84
+addresses can be
85
+<a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>,
86
+and can
87
+<a href="http://whatsmyip.org/more/">reveal other information</a>
88
+about how you are connecting to the Internet.
89
+In the United States the
90
+government is pushing to make this mapping increasingly precise.
91
+</li>
92
+
93
+<li>
94
+<strong>They research sensitive topics.</strong>
95
+There's a wealth of information available online. But perhaps in your 
96
+country, access to information on AIDS, birth control,
97
+<a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
65 98
 or world religions is behind a national firewall.
66 99
 Or perhaps you are worried that if you research a particular set of
67 100
 symptoms, at some later date an insurance company might buy the 
68 101
 logs of the websites you visited and establish that
69 102
 you had suspicions of a pre-existing condition.
70
-</p>
71
-
72
-<li>...see how the rest of the world lives</li>
73
-
74
-<p>Tor allows you to see the World Wide
75
-Web from a different perspective.  Want to see Google come up in Polish?
76
-If you leave the Tor cloud at a Polish Tor relay, you'll see what
77
-Poland sees online.  Want to check the differential pricing offered by
78
-an online retailer or wholesaler to folks in another country, compared
79
-to the pricing offered to you or your company?  Tor can
80
-provide that window to the world.</p>
103
+</li>
81 104
 
82 105
 </ul>
83 106
 
84
-<h2>Journalists use Tor</h2>
85 107
 
108
+
109
+<h2>Soldiers in the field use Tor</h2>
86 110
 <ul>
87 111
 
88
-<li>Reporters without Borders</li>
112
+<li>
113
+<strong>Military field agents:</strong>
114
+How much, do you imagine, would the Iraqi insurgency pay to find out
115
+the location of every computer in Baghdad that logged into a military
116
+server in Maryland to read email?  Tor can protect military personnel in
117
+the field by hiding their location.
118
+</li>
119
+
120
+<li>
121
+<strong>Hidden services:</strong>
122
+When the Internet was designed by DARPA, its primary purpose was to
123
+be able to facilitate distributed, robust communications in case of
124
+local strikes.  However, some functions must be centralized, such as
125
+command and control sites.  It's the nature of the Internet protocols to
126
+reveal the geographic location of any server that is reachable online.
127
+Tor's hidden services capacity allows military command and
128
+control to be physically secure from discovery and takedown.
129
+</li>
130
+
131
+<li>
132
+<strong>Intelligence gathering:</strong>
133
+Military personnel need to use electronic resources run and monitored
134
+by insurgents. Obviously, they do not want the server logs on an insurgent
135
+website to show a military address, revealing their surveillance.
136
+</li>
89 137
 
90
-<p><a href="http://www.rsf.org/">Reporters without Borders</a> advises
91
-journalists, sources, bloggers, and dissidents online to use Tor to
92
-ensure their privacy.  RSF tracks internet prisoners of conscience and
93
-jailed or harmed journalists all over the world.</p>
138
+</ul>
94 139
 
95
-<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
96 140
 
97
-<p>The US <a href="http://www.ibb.gov/">International Broadcasting
98
-Bureau</a> supports Tor development to help Internet users in countries
99
-where they can't get
100
-safe access to free media.  Tor not only protects freedom of expression,
101
-but preserves the ability of persons behind national firewalls or under
102
-the surveillance of repressive regimes to view information that gives
103
-a global perspective on democracy, economics, religion, and other vital
104
-topics to a full global perspective on culture.</p>
105 141
 
106
-<li>Reporters in sensitive locations</li>
142
+<h2>Journalists and their audience use Tor</h2>
107 143
 
108
-<p>Reporters in sensitive environments can use Tor to be more secure in
109
-filing their stories.</p>
144
+<ul>
145
+<li><strong>
146
+<a href="http://www.rsf.org/">Reporters without Borders</a></strong>
147
+tracks internet prisoners of conscience and
148
+jailed or harmed journalists all over the world. They advise
149
+journalists, sources, bloggers, and dissidents to use Tor to
150
+ensure their privacy and safety.
151
+</li>
152
+
153
+<li>
154
+<strong>The US <a href="http://www.ibb.gov/">International Broadcasting
155
+Bureau</a></strong> (Voice of America/Radio Free Europe/Radio Free Asia)
156
+supports Tor development to help Internet users in countries without
157
+safe access to free media.  Tor
158
+preserves the ability of persons behind national firewalls or under
159
+the surveillance of repressive regimes to obtain
160
+a global perspective on controversial topics including democracy,
161
+economics and religion.
162
+</li>
163
+
164
+<li>
165
+Although we often think of foreign journalists working in far off lands,
166
+<strong>citizen journalists in China and other
167
+<a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
168
+use Tor to write about local events</strong> and to encourage social
169
+change and political reform, more secure that there will not be a knock
170
+on the door at midnight.
171
+</li>
110 172
 
111
-<li>sources</li>
173
+</ul>
112 174
 
113
-<p>Journalists' sources often use Tor to report sensitive information,
114
-or to discuss items with journalists from sensitive locations.</p>
115 175
 
116
-<li>whistleblowers</li>
176
+<h2>Law enforcement officers use Tor</h2>
177
+<ul>
117 178
 
118
-<p>Likewise, whistleblowers use Tor to safely leave tips on governmental
119
-and corporate malfeasance.
179
+<li>
180
+<strong>Online surveillance:</strong>
181
+Tor allows officials to surf questionable web sites and services
182
+without leaving tell-tale tracks.  If the system administrator of an
183
+illegal gambling site, for example, were to see multiple connections from
184
+governmental or law enforcement computers in usage logs, investigations
185
+would be hampered.
186
+</strong>
120 187
 
121
-<li>citizen journalism</li>
188
+<li>
189
+<strong>Sting operations:</strong>
190
+Similarly, anonymity allows law officers to engage in online
191
+&ldquo;undercover &rdquo; operations.  Regardless of how good an
192
+undercover officer's &ldquo;street cred&rdquo; may be, if his or her
193
+email headers include nypd.nyc.ny.state.us, his or her cover is blown.
194
+</li>
122 195
 
123
-<p>Citizen journalists in China and other &ldquo;Internet black
124
-holes&rdquo; use Tor to write about local events and to encourage social
125
-change and political reform, more secure that there will not be a knock
126
-on their door at midnight.</p>
196
+<li>
197
+<strong>Truly anonymous tip lines:</strong>
198
+While online anonymous tip lines are popular, without anonymity
199
+software, they are far less useful.  Sophisticated sources understand that
200
+although a name or email address is not attached to information, server
201
+logs can identify them very quickly.  As a result, tip line web sites that
202
+do not encourage anonymity are limiting the sources of their tips.
203
+</li>
127 204
 
128 205
 </ul>
129 206
 
130
-<h2>Human rights workers use Tor</h2>
131 207
 
132
-<p>Reporting human rights violations from within their country of origin
133
-is a task for peaceful warriors.  It takes courage and a good eye to risk
134
-mitigation.  Human rights activists use Tor to anonymously report from
135
-danger zones.  Internationally, labor rights workers use Tor and other
136
-forms of online and offline anonymity to organize workers in accordance
137
-with the Universal Declaration of Human Rights.  Are they within the law?
138
-But, does that mean they are safe?</p>
139 208
 
209
+<h2>Activists & whistleblowers use Tor</h2>
140 210
 <ul>
141 211
 
142
-<li>Human Rights Watch</li>
143
-
144
-<p>In their report &ldquo;Race to the Bottom: Corporate
145
-Complicity in Chinese Internet Censorship,&rdquo; a study
212
+<li>
213
+<strong>Human rights activists use Tor to anonymously report abuses from
214
+danger zones.</strong>  Internationally, labor rights workers use Tor and other
215
+forms of online and offline anonymity to organize workers in accordance
216
+with the Universal Declaration of Human Rights. Even though they are within
217
+the law, it does not mean they are safe. Tor provides the ability to
218
+avoid persecution while still raising a voice.
219
+</li>
220
+
221
+<li>
222
+When groups such as the <strong>Friends Service Committee and environmental
223
+groups are increasingly
224
+<a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
225
+in the United States</strong>
226
+under laws meant to protect against terrorism, many peaceful agents of
227
+change rely on Tor for basic privacy during legitimate activities.
228
+</li>
229
+
230
+<li>
231
+<strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
232
+recommends Tor
233
+in their report, &ldquo;
234
+<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
235
+Complicity in Chinese Internet Censorship</a>.&rdquo; The study
146 236
 co-author interviewed Roger Dingledine, Tor project leader,
147 237
 on Tor use.  They cover Tor in the section on how to breach the <a
148 238
 href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
149
-Firewall of China &rdquo;</a></p>
150
-
151
-<p><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a>
152
-recommends Tor for human rights workers throughout
153
-the globe for &ldquo;secure browsing and communications.&rdquo;</p>
154
-
155
-<li>Amnesty International</li>
156
-
157
-<p>Tor has consulted and volunteered help to Amnesty International's
158
-recent corporate responsibility campaign at
159
-<a href="http://irrepressible.info/">http://irrepressible.info/</a>.
239
+Firewall of China,&rdquo;</a>
240
+and recommend that human rights workers throughout
241
+the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
242
+</li>
243
+
244
+<li>
245
+Tor has consulted with and volunteered help to <strong>Amnesty International's
246
+recent
247
+<a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
160 248
 See also their <a
161 249
 href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
162
-report</a> on China Internet issues.</p>
250
+report</a> on China Internet issues.
251
+</li>
163 252
 
164
-<li>Global Voices</li>
165
-
166
-<p>Global Voices can't stop recommending Tor throughout their <a
253
+<li>
254
+<a href="http://www.globalvoicesonline.org">Global Voices</a>
255
+can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,
256
+throughout their <a
167 257
 href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
168
-web site.</a></p>
169
-
170
-<li>10% for corruption</li>
258
+web site.</a>
259
+</li>
171 260
 
172
-<p>A contact of ours who works with a public health nonprofit in
173
-Africa reports that his nonprofit must budget 10% to cover various
174
-sorts of corruption, mostly bribes and such.  When that percentage
261
+<li>
262
+In the US, the Supreme Court recently stripped legal protections from
263
+government whistleblowers.  But whistleblowers working for governmental
264
+transparency or corporate accountability can use Tor to seek justice
265
+without personal repercussions.
266
+</li>
267
+
268
+<li>
269
+A contact of ours who works with a public health nonprofit in
270
+Africa reports that his nonprofit
271
+<strong>must budget 10% to cover various sorts of corruption</strong>,
272
+mostly bribes and such.  When that percentage
175 273
 rises steeply, not only can they not afford the money, but they can
176 274
 not afford to complain &mdash; this is the point at which open objection can
177
-become dangerous.  So his nonprofit has been working to use
178
-Tor to safely whistleblow on governmental corruption in order to continue
179
-their work more effectively and safely.</p>
275
+become dangerous.  So his nonprofit has been working to
276
+<strong>use Tor to safely whistleblow on governmental corruption</strong>
277
+in order to continue their work.
278
+</li>
180 279
 
181
-<li>Labor organizers in the US and overseas</li>
182
-
183
-<p>At a recent conference a Tor staffer ran into a woman who came from
280
+<li>
281
+At a recent conference a Tor staffer ran into a woman who came from
184 282
 a &ldquo;company town&rdquo; in a mountainous area of the
185 283
 eastern United States. She was attempting to blog anonymously to rally
186
-local residents to urge reform on the company that dominated the town's
284
+local residents to
285
+<strong>urge reform on the company</strong> that dominated the town's
187 286
 economic and governmental affairs, fully cognizant that the kind of
188
-organizing she was doing could lead to harm or &ldquo;fatal
189
-accidents.&rdquo;</p>
287
+organizing she was doing <strong>could lead to harm or &ldquo;fatal
288
+accidents.&rdquo;</strong>
289
+</li>
190 290
 
191
-<p>In east Asia, some labor organizers use anonymity to reveal information
192
-regarding sweatshops that produce goods for western countries and to
193
-organize local labor.</p>
291
+<li>
292
+In east Asia, some labor organizers use anonymity to <strong>reveal information
293
+regarding sweatshops</strong> that produce goods for western countries and to
294
+organize local labor.
295
+</li>
194 296
 
195 297
 </ul>
196 298
 
197
-<h2>People with high profile community roles use Tor</h2>
198 299
 
199
-<p>Does being in the public spotlight shut you off from having a private
300
+<h2>Both high and low profile people use Tor</h2>
301
+<ul>
302
+
303
+<li>
304
+Does being in the public spotlight shut you off from having a private
200 305
 life, forever, online?  A rural lawyer in a small New England state keeps
201 306
 an anonymous blog because, with the diverse clientele at his prestigious
202
-law firm, his political beliefs are bound to offend someone.  Yet, he
307
+law firm, <strong>his political beliefs are bound to offend someone</strong>.  Yet, he
203 308
 doesn't want to remain silent on issues he cares about.  Tor helps him
204 309
 feel secure that he can express his opinion without consequences to his
205
-public role.</p>
206
-
207
-<h2>Poor people use Tor</h2>
310
+public role.
311
+</li>
208 312
 
209
-<p>People living in poverty often don't participate fully in civil society
313
+<li>People living in poverty often don't participate fully in civil society
210 314
 -- not out of ignorance or apathy, but out of fear.  If something you
211 315
 write were to get back to your boss, would you lose your job?  If your
212 316
 social worker read about your opinion of the system, would she treat
213
-you differently?  Anonymity gives a voice to the voiceless.</p>
214
-
215
-<ul>
216
-
217
-<li>VISTA grant</li>
218
-
219
-<p>Tor has an open Americorps/VISTA position.  This
317
+you differently?  Anonymity gives a voice to the voiceless.
318
+To support this,
319
+<strong>Tor currently has an open Americorps/VISTA position</strong> pending.  This
220 320
 government grant will cover a full time stipend for a volunteer to create
221
-curricula to show low-income populations how to use anonymity online for
222
-safer civic engagement.  Although it's often said that the poor do not use
321
+curricula to <strong>show low-income populations how to use anonymity online for
322
+safer civic engagement</strong>.  Although it's often said that the poor do not use
223 323
 online access for civic engagment, failing to act in their self-interests,
224 324
 it is our hypothesis (based on personal conversations and anecdotal
225 325
 information) that it is precisely the &ldquo;permanent record &rdquo;
226 326
 left online that keeps many of the poor from speaking out on the Internet.
227
-Where speaking out on social programs or job related issues might seem
228
-in their enlightened self interest, they see things closer to home.
229
-The boss or social worker or educational advisor virtually looking over
230
-their shoulder could put a fragile situation into a tailspin.</p>
231
-
232
-<p>We hope to show people how to more safely engage online, and then at
327
+We hope to show people how to engage more safely online, and then at
233 328
 the end of the year, evaluate how online and offline civic engagement has
234
-changed, and how the population sees this continuing in clear channels
235
-and anonymously into the future.</p>
236
-
237
-</ul>
238
-
239
-<h2>People who care about privacy, in general, increasingly use Tor</h2>
240
-
241
-<p>In the section below on recent media mentions of Tor, it becomes
242
-clear that the recent revelation of users' browsing patterns by AOL has
243
-piqued the conscience of the everyday Internet surfer in more privacy.
244
-All over the net, Tor is being recommended to people newly concerned
245
-about their privacy in the face of increasing breaches and betrayals of
246
-private data.</p>
247
-
248
-<h2>Soldiers in the field use Tor</h2>
249
-
250
-<ul>
251
-
252
-<li>Field agents</li>
253
-
254
-<p>How much, do you imagine, would the Iraqi insurgency pay to find out
255
-the location of every computer in Baghdad that logged into a military
256
-server in Maryland to read email?  Tor can protect military personnel in
257
-the field by hiding their location, and even by concealing the location
258
-of Command and Control servers.</p>
259
-
260
-<li>Hidden services</li>
261
-
262
-<p>When the Internet was designed by DARPA, its primary purpose was to
263
-be able to facilitate distributed, robust communications in case of
264
-local strikes.  However, some functions must be centralized, such as
265
-command and control sites.  It's the nature of the Internet protocols to
266
-reveal the geographic location of any server that is reachable online,
267
-however Tor's hidden services capacity allows military command and
268
-control to be physically secure from discovery and takedown.</p>
269
-
270
-</ul>
271
-
272
-<h2>Law enforcement officers use Tor</h2>
273
-
274
-<p>Undercover officers use Tor to conceal their IP address during
275
-sting operations. &ldquo;Anonymous tip lines&rdquo; may still
276
-preserve a log of IP addresses, if the informant isn't using Tor.</p>
277
-
278
-<ul>
279
-
280
-<li>online surveillance</li>
281
-
282
-<p>Tor allows officials to surf questionable web sites and services
283
-without leaving tell-tale tracks.  If the system administrator of an
284
-illegal gambling site, for example, were to see multiple connections from
285
-governmental or law enforcement computers in usage logs, investigations
286
-would be hampered.</p>
287
-
288
-<li>sting operations</li>
289
-
290
-<p>Similarly, anonymity allows law officers to engage in online
291
-&ldquo;undercover &rdquo; operations.  Regardless of how good an
292
-undercover officer's &ldquo;street cred&rdquo; may be, if his or her
293
-email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p>
294
-
295
-<li>truly anonymous tip lines</li>
296
-
297
-<p>While online anonymous tip lines are popular, without anonymity
298
-software, they are far less useful.  Sophisticated sources understand that
299
-although a name or email address is not attached to information, server
300
-logs can identify them very quickly.  As a result, tip line web sites that
301
-do not encourage anonymity are limiting the sources of their tips.</p>
329
+changed, and how the population sees this continuing into the future.
330
+</li>
302 331
 
303 332
 </ul>
304 333
 
305
-<h2>Whistleblowers use Tor</h2>
306
-
307
-<p>In the US, the Supreme Court recently stripped legal protections from
308
-government whistleblowers.  But whistleblowers working for governmental
309
-transparency or corporate accountability can use Tor to seek justice
310
-without personal repercussions.</p>
311
-
312
-<h2>Bloggers use Tor</h2>
313
-
314
-<p>Every day we hear about bloggers who are sued or fired for saying
315
-perfectly legal things online, in their blog.  In addition to following
316
-the guidelines of EFF's Guide and RSF's guide, we recommend using Tor.</p>
317
-
318
-<h2>Citizens of repressive regimes use Tor</h2>
319
-
320
-<p>Whether to read information on censored topics (such as AIDS, Tibet,
321
-or democracy), or to write about controversial topics, people inside
322
-oppressive regimes can risk life and livelihood.  Tor helps cover the
323
-tracks of dissidents, foreign nationals, or even just people who want
324
-free accesss to information most of us take for granted.</p>
325
-
326
-<h2>People organizing for change use Tor</h2>
327
-
328
-<ul>
329
-<li>union organizers/labor activists</li>
330
-
331
-See mentions above
332
-
333
-<li>democracy activists/dissidents</li>
334
-
335
-See mentions above
336
-
337
-<li>peace/green activists</li>
338
-
339
-<p>When groups such as the Friends Service Committee and environmental
340
-groups are increasingly falling under surveillance in the United States
341
-under laws meant to protect against terrorism, many peaceful agents of
342
-change rely on Tor for basic privacy for legitimate activities.</p>
343
-
344
-</ul>
345 334
 
346 335
 <h2>Business executives use Tor</h2>
347 336
 <ul>
348 337
 
349
-<li>security breach information clearinghouses</li>
350
-
351
-<p>Say a financial institution participates in a security clearinghouse
338
+<li>
339
+<strong>Security breach information clearinghouses:</strong>
340
+Say a financial institution participates in a security clearinghouse
352 341
 of information on Internet attacks.  Such a repository requires members
353 342
 to report breaches to a central group, who correlates attacks to detect
354 343
 coordinated patterns and send out alerts.  But if a specific bank in
... ...
@@ -356,31 +345,52 @@ St. Louis is breached, they don't want an attacker watching the incoming
356 345
 traffic to such a repository to be able to track where information is
357 346
 coming from.  Even though every packet were encrypted, the Internet
358 347
 address would betray the location of a compromised system.  Tor allows
359
-such repositories of sensitive information to resist compromises.</p>
360
-
361
-<li>seeing your competition as your market does</li>
348
+such repositories of sensitive information to resist compromises.
349
+</li>
362 350
 
363
-<p>If you try to check out a competitor's pricing, you may find no
351
+<li>
352
+<strong>Seeing your competition as your market does:</strong>
353
+If you try to check out a competitor's pricing, you may find no
364 354
 information or misleading information on their web site.  This is because
365 355
 their web server may be keyed to detect connections from competitors,
366 356
 and block or spread disinformation to your staff.  Tor allows a business
367
-to view their sector as the general public would view it.</p>
357
+to view their sector as the general public would view it.
358
+</li>
368 359
 
369
-<li>keeping strategies confidential</li>
370
-
371
-<p>An investment bank, for example, might not want industry snoopers to be
360
+<li>
361
+<strong>Keeping strategies confidential:</strong>
362
+An investment bank, for example, might not want industry snoopers to be
372 363
 able to track what web sites their analysts are watching.  The strategic
373 364
 importance of traffic patterns, and the vulnerability of the surveillance
374 365
 of such data, is starting to be more widely recognized in several areas
375
-of the business world.</p>
376
-
377
-<li>accountability</li>
366
+of the business world.
367
+</li>
378 368
 
379
-<p>In an age when irresponsible and unreported corporate activity has
369
+<li>
370
+<strong>Accountability:</strong>
371
+In an age when irresponsible and unreported corporate activity has
380 372
 undermined multi-billion dollar businesses, an executive exercising true
381 373
 stewardship wants the whole staff to feel free to disclose internal
382 374
 malfeasance.  Tor facilitates internal accountability before it turns
383
-into whistleblowing.</p>
375
+into whistleblowing.
376
+</li>
377
+
378
+</ul>
379
+
380
+
381
+<h2>Bloggers use Tor</h2>
382
+<ul>
383
+<li>
384
+Every day we hear about bloggers who are
385
+<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
386
+<a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
387
+for saying perfectly legal things online, in their blog.  In addition to following
388
+the advice in the
389
+<a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
390
+and Reporters Without Borders'
391
+<a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
392
+we recommend using Tor.
393
+</li>
384 394
 
385 395
 </ul>
386 396
 
387 397