Browse code

strip trailing whitespace (no changes)

Roger Dingledine authored on 02/10/2013 19:26:38
Showing 1 changed files
... ...
@@ -24,7 +24,7 @@
24 24
       </ul>
25 25
     </div>
26 26
     <!-- END SIDEBAR -->
27
-    
27
+
28 28
     <hr>
29 29
 
30 30
     <a name="inception"></a>
... ...
@@ -39,7 +39,7 @@
39 39
     for a wide variety of purposes by normal people, the military,
40 40
     journalists, law enforcement officers, activists, and many
41 41
     others. </p>
42
-    
42
+
43 43
     <a name="overview"></a>
44 44
     <h3><a class="anchor" href="#overview">Overview</a></h3>
45 45
 
... ...
@@ -52,7 +52,7 @@
52 52
     to share information over public networks without compromising their
53 53
     privacy.
54 54
     </p>
55
-    
55
+
56 56
     <p>
57 57
     Individuals use Tor to keep websites from tracking them and their family
58 58
     members, or to connect to news sites, instant messaging services, or the
... ...
@@ -63,7 +63,7 @@
63 63
     communication: chat rooms and web forums for rape and abuse survivors,
64 64
     or people with illnesses.
65 65
     </p>
66
-    
66
+
67 67
     <p>
68 68
     Journalists use Tor to communicate more safely with whistleblowers and
69 69
     dissidents. Non-governmental organizations (NGOs) use Tor to allow their
... ...
@@ -71,7 +71,7 @@
71 71
     country, without notifying everybody nearby that they're working with
72 72
     that organization.
73 73
     </p>
74
-    
74
+
75 75
     <p>
76 76
     Groups such as Indymedia recommend Tor for safeguarding their members'
77 77
     online privacy and security. Activist groups like the Electronic Frontier
... ...
@@ -84,7 +84,7 @@
84 84
     consulting job-hunting websites? Which research divisions are communicating
85 85
     with the company's patent lawyers?
86 86
     </p>
87
-    
87
+
88 88
     <p>
89 89
     A branch of the U.S. Navy uses Tor for open source intelligence
90 90
     gathering, and one of its teams used Tor while deployed in the Middle
... ...
@@ -92,7 +92,7 @@
92 92
     web sites without leaving government IP addresses in their web logs,
93 93
     and for security during sting operations.
94 94
     </p>
95
-    
95
+
96 96
     <p>
97 97
     The variety of people who use Tor is actually <a
98 98
     href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
... ...
@@ -101,10 +101,10 @@
101 101
     so the more populous and diverse the user base for Tor is, the more your
102 102
     anonymity will be protected.
103 103
     </p>
104
-    
104
+
105 105
     <a name="whyweneedtor"></a>
106 106
     <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
107
-    
107
+
108 108
     <p>
109 109
     Using Tor protects you against a common form of Internet surveillance
110 110
     known as "traffic analysis."  Traffic analysis can be used to infer
... ...
@@ -119,7 +119,7 @@
119 119
     affiliation to anyone observing the network, even if the connection
120 120
     is encrypted.
121 121
     </p>
122
-    
122
+
123 123
     <p>
124 124
     How does traffic analysis work?  Internet data packets have two parts:
125 125
     a data payload and a header used for routing.  The data payload is
... ...
@@ -129,7 +129,7 @@
129 129
     possibly, what you're saying.  That's because it focuses on the header,
130 130
     which discloses source, destination, size, timing, and so on.
131 131
     </p>
132
-    
132
+
133 133
     <p>
134 134
     A basic problem for the privacy minded is that the recipient of your
135 135
     communications can see that you sent it by looking at headers.  So can
... ...
@@ -138,7 +138,7 @@
138 138
     analysis might involve sitting somewhere between sender and recipient on
139 139
     the network, looking at headers.
140 140
     </p>
141
-    
141
+
142 142
     <p>
143 143
     But there are also more powerful kinds of traffic analysis.  Some
144 144
     attackers spy on multiple parts of the Internet and use sophisticated
... ...
@@ -147,11 +147,11 @@
147 147
     these attackers, since it only hides the content of Internet traffic, not
148 148
     the headers.
149 149
     </p>
150
-    
150
+
151 151
     <a name="thesolution"></a>
152 152
     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
153 153
     <img src="$(IMGROOT)/htw1.png" alt="How Tor works">
154
-    
154
+
155 155
     <p>
156 156
     Tor helps to reduce the risks of both simple and sophisticated traffic
157 157
     analysis by distributing your transactions over several places on the
... ...
@@ -163,7 +163,7 @@
163 163
     through several relays that cover your tracks so no observer at any
164 164
     single point can tell where the data came from or where it's going.
165 165
     </p>
166
-    
166
+
167 167
     <p>
168 168
     To create a private network pathway with Tor, the user's software or
169 169
     client incrementally builds a circuit of encrypted connections through
... ...
@@ -174,9 +174,9 @@
174 174
     separate set of encryption keys for each hop along the circuit to ensure
175 175
     that each hop can't trace these connections as they pass through.
176 176
     </p>
177
-    
177
+
178 178
     <p><img alt="Tor circuit step two"  src="$(IMGROOT)/htw2.png"></p>
179
-    
179
+
180 180
     <p>
181 181
     Once a circuit has been established, many kinds of data can be exchanged
182 182
     and several different sorts of software applications can be deployed
... ...
@@ -186,20 +186,20 @@
186 186
     only works for TCP streams and can be used by any application with SOCKS
187 187
     support.
188 188
     </p>
189
-    
189
+
190 190
     <p>
191 191
     For efficiency, the Tor software uses the same circuit for connections
192 192
     that happen within the same ten minutes or so.  Later requests are given a
193 193
     new circuit, to keep people from linking your earlier actions to the new
194 194
     ones.
195 195
     </p>
196
-    
196
+
197 197
     <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>
198
-    
199
-    
198
+
199
+
200 200
     <a name="hiddenservices"></a>
201 201
     <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
202
-    
202
+
203 203
     <p>
204 204
     Tor also makes it possible for users to hide their locations while
205 205
     offering various kinds of services, such as web publishing or an instant
... ...
@@ -213,10 +213,10 @@
213 213
     hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
214 214
     service protocol</a> works.
215 215
     </p>
216
-    
216
+
217 217
     <a name="stayinganonymous"></a>
218 218
     <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
219
-    
219
+
220 220
     <p>
221 221
     Tor can't solve all anonymity problems.  It focuses only on
222 222
     protecting the transport of data.  You need to use protocol-specific
... ...
@@ -225,7 +225,7 @@
225 225
     while browsing the web to withhold some information about your computer's
226 226
     configuration.
227 227
     </p>
228
-    
228
+
229 229
     <p>
230 230
     Also, to protect your anonymity, be smart.  Don't provide your name
231 231
     or other revealing information in web forms.  Be aware that, like all
... ...
@@ -235,10 +235,10 @@
235 235
     arriving at your chosen destination, he can use statistical analysis to
236 236
     discover that they are part of the same circuit.
237 237
     </p>
238
-    
238
+
239 239
     <a name="thefutureoftor"></a>
240 240
     <h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
241
-    
241
+
242 242
     <p>
243 243
     Providing a usable anonymizing network on the Internet today is an
244 244
     ongoing challenge. We want software that meets users' needs. We also
... ...
@@ -252,7 +252,7 @@
252 252
     or <a href="<page getinvolved/volunteer>">volunteering</a> as a
253 253
     <a href="<page docs/documentation>#Developers">developer</a>.
254 254
     </p>
255
-    
255
+
256 256
     <p>
257 257
     Ongoing trends in law, policy, and technology threaten anonymity as never
258 258
     before, undermining our ability to speak and read freely online. These
... ...
@@ -262,7 +262,7 @@
262 262
     provides additional diversity, enhancing Tor's ability to put control
263 263
     over your security and privacy back into your hands.
264 264
     </p>
265
-    
265
+
266 266
   </div>
267 267
   <!-- END MAINCOL -->
268 268
   <div id = "sidecol">
... ...
@@ -272,4 +272,4 @@
272 272
   <!-- END SIDECOL -->
273 273
 </div>
274 274
 <!-- END CONTENT -->
275
-#include <foot.wmi> 
275
+#include <foot.wmi>