Andrew Lewman commited on 2013-09-21 15:46:25
Zeige 1 geänderte Dateien mit 2 Einfügungen und 13 Löschungen.
... | ... |
@@ -158,19 +158,8 @@ |
158 | 158 |
<table> |
159 | 159 |
<tr> |
160 | 160 |
<td> |
161 |
- |
|
162 |
- For most uses, Tor provides the best available protection |
|
163 |
- against a well-resourced observer. It's an open question |
|
164 |
- how much protection Tor (or any other existing anonymous |
|
165 |
- communications tool) provides against the NSA's |
|
166 |
- large-scale Internet surveillance. On its own, Tor can't |
|
167 |
- protect against attacks against vulnerabilities on your |
|
168 |
- computer or its software; Tor is not the only tool you |
|
169 |
- need to be secure on the internet. |
|
170 |
- We're working on |
|
171 |
- writing clear explanations for the issues, and the state of |
|
172 |
- the research field as it stands. In the meantime, |
|
173 |
- <a href="https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html">Bruce Schneier's advice</a> may be useful. |
|
161 |
+ <div class="calendar"><span class="month">Sep</span><br><span class="day">21</span></div> |
|
162 |
+ <p>For most uses, Tor provides the best available protection against a well-resourced observer. It's an open question how much protection Tor (or any other existing anonymous communications tool) provides against the NSA's large-scale Internet surveillance. On its own, Tor can't protect against attacks against vulnerabilities on your computer or its software; Tor is not the only tool you need to be secure on the internet. We're working on writing clear explanations for the issues, and the state of the research field as it stands. In the meantime, <a href="https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html">Bruce Schneier's advice</a> may be useful.</p> |
|
174 | 163 |
</td> |
175 | 164 |
</tr> |
176 | 165 |
<tr> |
177 | 166 |