Andrew Lewman commited on 2007-12-12 23:51:35
Zeige 1 geänderte Dateien mit 53 Einfügungen und 136 Löschungen.
... | ... |
@@ -1,67 +1,47 @@ |
1 | 1 |
## translation metadata |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
|
4 |
-#include "head.wmi" TITLE="Who uses Tor?" |
|
4 |
+#include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8" |
|
5 | 5 |
|
6 | 6 |
# Note to translators: this file is still under construction, and |
7 | 7 |
# will probably change a whole lot before we link to it. So it's |
8 | 8 |
# probably best to not translate it yet. |
9 | 9 |
|
10 | 10 |
<div class="main-column"> |
11 |
- |
|
12 | 11 |
<h1>Who uses Tor?</h1> |
13 |
- |
|
14 |
-<p> |
|
15 |
-If you have a success story with Tor, especially one we |
|
16 |
-can link to, please <a href="<page contact>">send us</a> a note! |
|
17 |
-</p> |
|
18 |
- |
|
19 |
-<p> |
|
20 |
-Tor provides anonymity: when it succeeds, nobody notices. This is |
|
12 |
+<p>If you have a success story with Tor, especially one we |
|
13 |
+can link to, please <a href="<page contact>">send us</a> a note!</p> |
|
14 |
+<p>Tor provides anonymity: when it succeeds, nobody notices. This is |
|
21 | 15 |
great for users, but not so good for us, since publishing success |
22 | 16 |
stories about how people or organizations are staying anonymous could be |
23 |
-counterproductive. |
|
24 |
-As an example, we talked |
|
25 |
-to an FBI officer who explained that he uses Tor every day for his |
|
26 |
-work — but he quickly followed up |
|
27 |
-with a request not to provide details or mention his name. |
|
28 |
-</p> |
|
29 |
- |
|
30 |
-<p> |
|
31 |
-Like any technology, from pencils to cellphones, anonymity can be used for both good and evil. |
|
32 |
-You have probably seen at least some of the vigorous debate |
|
17 |
+counterproductive. As an example, we talked to an FBI officer who explained that he uses Tor every day for his |
|
18 |
+work — but he quickly followed up with a request not to provide details or mention his name.</p> |
|
19 |
+<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and evil. You have probably seen at least some of the vigorous debate |
|
33 | 20 |
(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
34 | 21 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, |
35 |
-and |
|
36 |
-<a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) |
|
22 |
+and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) |
|
37 | 23 |
over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
38 | 24 |
<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
39 | 25 |
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
40 | 26 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
41 | 27 |
and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support port 25 to prevent anonymous email spamming), or if you're one of the |
42 |
-<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Internet</a>, |
|
43 |
-you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today: |
|
44 |
-</p> |
|
45 |
- |
|
28 |
+<a |
|
29 |
+href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
|
30 |
+you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:</p> |
|
46 | 31 |
|
47 | 32 |
<h2>Everyday, ordinary Internet surfers use Tor</h2> |
48 |
- |
|
49 | 33 |
<ul> |
50 | 34 |
<li> |
51 |
-<strong>They protect their privacy from unscrupulous |
|
52 |
-marketers and identity thieves.</strong> |
|
35 |
+<strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
|
53 | 36 |
Internet Service Providers (ISPs) |
54 | 37 |
<a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month"> |
55 |
-sell your Internet browsing records</a> |
|
56 |
-to marketers or anyone else willing to pay for it. They typically say that |
|
38 |
+sell your Internet browsing records</a> to marketers or anyone else willing to pay for it. They typically say that |
|
57 | 39 |
they anonymize it by not providing your username or personally |
58 | 40 |
identifiable information, but |
59 | 41 |
<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>. |
60 |
-A full record of every |
|
61 |
-site you visit, the text of every search you perform, and potentially |
|
42 |
+A full record of every site you visit, the text of every search you perform, and potentially |
|
62 | 43 |
userid and even password information can still be part of this data. |
63 |
-In addition to your ISP, the websites |
|
64 |
-(<a href="http://www.google.com/privacy_faq.html">and search engines</a>) |
|
44 |
+In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) |
|
65 | 45 |
you visit have their own logs, |
66 | 46 |
containing the same or more information. |
67 | 47 |
</li> |
... | ... |
@@ -70,52 +49,35 @@ containing the same or more information. |
70 | 49 |
<strong> They protect their communications from irresponsible corporations.</strong> |
71 | 50 |
All over the net, Tor is being recommended to people newly concerned |
72 | 51 |
about their privacy in the face of increasing breaches and betrayals of |
73 |
-private data. From |
|
74 |
-<a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to |
|
52 |
+private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to |
|
75 | 53 |
<a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>, |
76 | 54 |
your data is often not well protected by those you are supposed to trust to keep it safe. |
77 | 55 |
</li> |
78 |
- |
|
79 | 56 |
<li> |
80 | 57 |
<strong>They protect their children online.</strong> |
81 |
-You've told your kids they shouldn't share personally identifying |
|
82 |
-information online, but they may be sharing their location simply |
|
83 |
-by not concealing their IP address. Increasingly, IP |
|
84 |
-addresses can be |
|
58 |
+You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply |
|
59 |
+by not concealing their IP address. Increasingly, IP addresses can be |
|
85 | 60 |
<a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, |
86 |
-and can |
|
87 |
-<a href="http://whatsmyip.org/more/">reveal other information</a> |
|
88 |
-about how you are connecting to the Internet. |
|
89 |
-In the United States the |
|
90 |
-government is pushing to make this mapping increasingly precise. |
|
61 |
+and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet. |
|
62 |
+In the United States the government is pushing to make this mapping increasingly precise. |
|
91 | 63 |
</li> |
92 |
- |
|
93 | 64 |
<li> |
94 | 65 |
<strong>They research sensitive topics.</strong> |
95 |
-There's a wealth of information available online. But perhaps in your |
|
96 |
-country, access to information on AIDS, birth control, |
|
66 |
+There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control, |
|
97 | 67 |
<a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>, |
98 |
-or world religions is behind a national firewall. |
|
99 |
-Or perhaps you are worried that if you research a particular set of |
|
100 |
-symptoms, at some later date an insurance company might buy the |
|
101 |
-logs of the websites you visited and establish that |
|
68 |
+or world religions is behind a national firewall. Or perhaps you are worried that if you research a particular set of |
|
69 |
+symptoms, at some later date an insurance company might buy the logs of the websites you visited and establish that |
|
102 | 70 |
you had suspicions of a pre-existing condition. |
103 | 71 |
</li> |
104 | 72 |
</ul> |
105 | 73 |
|
106 |
- |
|
107 |
- |
|
108 |
-<h2>Soldiers in the field use Tor</h2> |
|
74 |
+<h2>Militaries use Tor</h2> |
|
109 | 75 |
<ul> |
110 |
- |
|
111 | 76 |
<li> |
112 |
-<strong>Military field agents:</strong> |
|
113 |
-How much, do you imagine, would the Iraqi insurgency pay to find out |
|
114 |
-the location of every computer in Baghdad that logged into a military |
|
115 |
-server in Maryland to read email? Tor can protect military personnel in |
|
116 |
-the field by hiding their location. |
|
77 |
+<strong>Field agents:</strong> |
|
78 |
+Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research |
|
79 |
+Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications. |
|
117 | 80 |
</li> |
118 |
- |
|
119 | 81 |
<li> |
120 | 82 |
<strong>Hidden services:</strong> |
121 | 83 |
When the Internet was designed by DARPA, its primary purpose was to |
... | ... |
@@ -133,48 +94,31 @@ Military personnel need to use electronic resources run and monitored |
133 | 94 |
by insurgents. Obviously, they do not want the server logs on an insurgent |
134 | 95 |
website to show a military address, revealing their surveillance. |
135 | 96 |
</li> |
136 |
- |
|
137 | 97 |
</ul> |
138 | 98 |
|
139 |
- |
|
140 |
- |
|
141 | 99 |
<h2>Journalists and their audience use Tor</h2> |
142 |
- |
|
143 | 100 |
<ul> |
144 |
-<li><strong> |
|
145 |
-<a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
|
146 |
-tracks internet prisoners of conscience and |
|
147 |
-jailed or harmed journalists all over the world. They advise |
|
148 |
-journalists, sources, bloggers, and dissidents to use Tor to |
|
149 |
-ensure their privacy and safety. |
|
101 |
+<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
|
102 |
+tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise |
|
103 |
+journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety. |
|
150 | 104 |
</li> |
151 |
- |
|
152 | 105 |
<li> |
153 |
-<strong>The US <a href="http://www.ibb.gov/">International Broadcasting |
|
154 |
-Bureau</a></strong> (Voice of America/Radio Free Europe/Radio Free Asia) |
|
155 |
-supports Tor development to help Internet users in countries without |
|
156 |
-safe access to free media. Tor |
|
157 |
-preserves the ability of persons behind national firewalls or under |
|
158 |
-the surveillance of repressive regimes to obtain |
|
159 |
-a global perspective on controversial topics including democracy, |
|
106 |
+<strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> |
|
107 |
+(Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without |
|
108 |
+safe access to free media. Tor preserves the ability of persons behind national firewalls or under |
|
109 |
+the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, |
|
160 | 110 |
economics and religion. |
161 | 111 |
</li> |
162 |
- |
|
163 | 112 |
<li> |
164 | 113 |
Although we often think of foreign journalists working in far off lands, |
165 |
-<strong>citizen journalists in China and other |
|
166 |
-<a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a> |
|
167 |
-use Tor to write about local events</strong> and to encourage social |
|
168 |
-change and political reform, more secure that there will not be a knock |
|
114 |
+<strong>citizen journalists in China and other <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a> |
|
115 |
+use Tor to write about local events</strong> and to encourage social change and political reform, more secure that there will not be a knock |
|
169 | 116 |
on the door at midnight. |
170 | 117 |
</li> |
171 |
- |
|
172 | 118 |
</ul> |
173 | 119 |
|
174 |
- |
|
175 | 120 |
<h2>Law enforcement officers use Tor</h2> |
176 | 121 |
<ul> |
177 |
- |
|
178 | 122 |
<li> |
179 | 123 |
<strong>Online surveillance:</strong> |
180 | 124 |
Tor allows officials to surf questionable web sites and services |
... | ... |
@@ -182,8 +126,7 @@ without leaving tell-tale tracks. If the system administrator of an |
182 | 126 |
illegal gambling site, for example, were to see multiple connections from |
183 | 127 |
governmental or law enforcement computers in usage logs, investigations |
184 | 128 |
would be hampered. |
185 |
-</strong> |
|
186 |
- |
|
129 |
+</li> |
|
187 | 130 |
<li> |
188 | 131 |
<strong>Sting operations:</strong> |
189 | 132 |
Similarly, anonymity allows law officers to engage in online |
... | ... |
@@ -200,14 +142,10 @@ although a name or email address is not attached to information, server |
200 | 142 |
logs can identify them very quickly. As a result, tip line web sites that |
201 | 143 |
do not encourage anonymity are limiting the sources of their tips. |
202 | 144 |
</li> |
203 |
- |
|
204 | 145 |
</ul> |
205 | 146 |
|
206 |
- |
|
207 |
- |
|
208 |
-<h2>Activists & whistleblowers use Tor</h2> |
|
147 |
+<h2>Activists & whistleblowers use Tor</h2> |
|
209 | 148 |
<ul> |
210 |
- |
|
211 | 149 |
<li> |
212 | 150 |
<strong>Human rights activists use Tor to anonymously report abuses from |
213 | 151 |
danger zones.</strong> Internationally, labor rights workers use Tor and other |
... | ... |
@@ -216,72 +154,53 @@ with the Universal Declaration of Human Rights. Even though they are within |
216 | 154 |
the law, it does not mean they are safe. Tor provides the ability to |
217 | 155 |
avoid persecution while still raising a voice. |
218 | 156 |
</li> |
219 |
- |
|
220 | 157 |
<li> |
221 | 158 |
When groups such as the <strong>Friends Service Committee and environmental |
222 |
-groups are increasingly |
|
223 |
-<a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a> |
|
224 |
-in the United States</strong> |
|
225 |
-under laws meant to protect against terrorism, many peaceful agents of |
|
159 |
+groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a> |
|
160 |
+in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of |
|
226 | 161 |
change rely on Tor for basic privacy during legitimate activities. |
227 | 162 |
</li> |
228 |
- |
|
229 | 163 |
<li> |
230 | 164 |
<strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong> |
231 |
-recommends Tor |
|
232 |
-in their report, “ |
|
165 |
+recommends Tor in their report, “ |
|
233 | 166 |
<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate |
234 | 167 |
Complicity in Chinese Internet Censorship</a>.” The study |
235 | 168 |
co-author interviewed Roger Dingledine, Tor project leader, |
236 | 169 |
on Tor use. They cover Tor in the section on how to breach the <a |
237 | 170 |
href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great |
238 |
-Firewall of China,”</a> |
|
239 |
-and recommend that human rights workers throughout |
|
171 |
+Firewall of China,”</a> and recommend that human rights workers throughout |
|
240 | 172 |
the globe use Tor for “secure browsing and communications.” |
241 | 173 |
</li> |
242 |
- |
|
243 | 174 |
<li> |
244 | 175 |
Tor has consulted with and volunteered help to <strong>Amnesty International's |
245 |
-recent |
|
246 |
-<a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>. |
|
247 |
-See also their <a |
|
248 |
-href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full |
|
176 |
+recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>. |
|
177 |
+See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full |
|
249 | 178 |
report</a> on China Internet issues. |
250 | 179 |
</li> |
251 |
- |
|
252 | 180 |
<li> |
253 | 181 |
<a href="http://www.globalvoicesonline.org">Global Voices</a> |
254 | 182 |
can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>, |
255 |
-throughout their <a |
|
256 |
-href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor"> |
|
183 |
+throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor"> |
|
257 | 184 |
web site.</a> |
258 | 185 |
</li> |
259 |
- |
|
260 | 186 |
<li> |
261 | 187 |
In the US, the Supreme Court recently stripped legal protections from |
262 | 188 |
government whistleblowers. But whistleblowers working for governmental |
263 | 189 |
transparency or corporate accountability can use Tor to seek justice |
264 | 190 |
without personal repercussions. |
265 | 191 |
</li> |
266 |
- |
|
267 | 192 |
<li> |
268 | 193 |
A contact of ours who works with a public health nonprofit in |
269 |
-Africa reports that his nonprofit |
|
270 |
-<strong>must budget 10% to cover various sorts of corruption</strong>, |
|
271 |
-mostly bribes and such. When that percentage |
|
272 |
-rises steeply, not only can they not afford the money, but they can |
|
194 |
+Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>, |
|
195 |
+mostly bribes and such. When that percentage rises steeply, not only can they not afford the money, but they can |
|
273 | 196 |
not afford to complain — this is the point at which open objection can |
274 | 197 |
become dangerous. So his nonprofit has been working to |
275 |
-<strong>use Tor to safely whistleblow on governmental corruption</strong> |
|
276 |
-in order to continue their work. |
|
198 |
+<strong>use Tor to safely whistleblow on governmental corruption</strong> in order to continue their work. |
|
277 | 199 |
</li> |
278 |
- |
|
279 | 200 |
<li> |
280 |
-At a recent conference a Tor staffer ran into a woman who came from |
|
281 |
-a “company town” in a mountainous area of the |
|
282 |
-eastern United States. She was attempting to blog anonymously to rally |
|
283 |
-local residents to |
|
284 |
-<strong>urge reform on the company</strong> that dominated the town's |
|
201 |
+At a recent conference, a Tor staffer ran into a woman who came from |
|
202 |
+a “company town” in the eastern United States. She was attempting to blog anonymously to rally |
|
203 |
+local residents to <strong>urge reform on the company</strong> that dominated the town's |
|
285 | 204 |
economic and governmental affairs, fully cognizant that the kind of |
286 | 205 |
organizing she was doing <strong>could lead to harm or “fatal |
287 | 206 |
accidents.”</strong> |
... | ... |
@@ -384,15 +292,10 @@ Every day we hear about bloggers who are |
384 | 292 |
<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or |
385 | 293 |
<a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a> |
386 | 294 |
for saying perfectly legal things online, in their blog. In addition to following |
387 |
-the advice in the |
|
388 |
-<a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a> |
|
389 |
-and Reporters Without Borders' |
|
390 |
-<a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>, |
|
295 |
+the advice in the <a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a> |
|
296 |
+and Reporters Without Borders' <a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>, |
|
391 | 297 |
we recommend using Tor. |
392 | 298 |
</li> |
393 |
- |
|
394 | 299 |
</ul> |
395 |
- |
|
396 | 300 |
</div><!-- #main --> |
397 |
- |
|
398 | 301 |
#include <foot.wmi> |
399 | 302 |