incoroprate cleanups and feedback from paul and ian.
Andrew Lewman

Andrew Lewman commited on 2007-12-12 23:51:35
Zeige 1 geänderte Dateien mit 53 Einfügungen und 136 Löschungen.

... ...
@@ -1,67 +1,47 @@
1 1
 ## translation metadata
2 2
 # Revision: $Revision$
3 3
 
4
-#include "head.wmi" TITLE="Who uses Tor?"
4
+#include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8"
5 5
 
6 6
 # Note to translators: this file is still under construction, and
7 7
 # will probably change a whole lot before we link to it. So it's
8 8
 # probably best to not translate it yet.
9 9
 
10 10
 <div class="main-column">
11
-
12 11
 <h1>Who uses Tor?</h1>
13
-
14
-<p>
15
-If you have a success story with Tor, especially one we
16
-can link to, please <a href="<page contact>">send us</a> a note!
17
-</p>
18
-
19
-<p>
20
-Tor provides anonymity: when it succeeds, nobody notices.  This is
12
+<p>If you have a success story with Tor, especially one we
13
+can link to, please <a href="<page contact>">send us</a> a note!</p>
14
+<p>Tor provides anonymity: when it succeeds, nobody notices.  This is
21 15
 great for users, but not so good for us, since publishing success
22 16
 stories about how people or organizations are staying anonymous could be
23
-counterproductive.
24
-As an example, we talked
25
-to an FBI officer who explained that he uses Tor every day for his
26
-work &mdash; but he quickly followed up
27
-with a request not to provide details or mention his name.
28
-</p>
29
-
30
-<p>
31
-Like any technology, from pencils to cellphones, anonymity can be used for both good and evil.
32
-You have probably seen at least some of the vigorous debate
17
+counterproductive.  As an example, we talked to an FBI officer who explained that he uses Tor every day for his
18
+work &mdash; but he quickly followed up with a request not to provide details or mention his name.</p>
19
+<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and evil.  You have probably seen at least some of the vigorous debate
33 20
 (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
34 21
 <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
35
-and
36
-<a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
22
+and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
37 23
 over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
38 24
 <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
39 25
 <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
40 26
 <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
41 27
 and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support port 25 to prevent anonymous email spamming), or if you're one of the
42
-<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Internet</a>,
43
-you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:
44
-</p>
45
-
28
+<a
29
+href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
30
+you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:</p>
46 31
 
47 32
 <h2>Everyday, ordinary Internet surfers use Tor</h2>
48
-
49 33
 <ul>
50 34
 <li>
51
-<strong>They protect their privacy from unscrupulous 
52
-marketers and identity thieves.</strong>
35
+<strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
53 36
 Internet Service Providers (ISPs)
54 37
 <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
55
-sell your Internet browsing records</a>
56
-to marketers or anyone else willing to pay for it. They typically say that 
38
+sell your Internet browsing records</a> to marketers or anyone else willing to pay for it. They typically say that 
57 39
 they anonymize it by not providing your username or personally 
58 40
 identifiable information, but
59 41
 <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.
60
-A full record of every
61
-site you visit, the text of every search you perform, and potentially 
42
+A full record of every site you visit, the text of every search you perform, and potentially 
62 43
 userid and even password information can still be part of this data.
63
-In addition to your ISP, the websites
64
-(<a href="http://www.google.com/privacy_faq.html">and search engines</a>)
44
+In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>)
65 45
 you visit have their own logs,
66 46
 containing the same or more information.
67 47
 </li>
... ...
@@ -70,52 +49,35 @@ containing the same or more information.
70 49
 <strong> They protect their communications from irresponsible corporations.</strong>
71 50
 All over the net, Tor is being recommended to people newly concerned
72 51
 about their privacy in the face of increasing breaches and betrayals of
73
-private data. From
74
-<a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
52
+private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
75 53
 <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
76 54
 your data is often not well protected by those you are supposed to trust to keep it safe.
77 55
 </li>
78
-
79 56
 <li>
80 57
 <strong>They protect their children online.</strong>
81
-You've told your kids they shouldn't share personally identifying
82
-information online, but they may be sharing their location simply
83
-by not concealing their IP address. Increasingly, IP
84
-addresses can be
58
+You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
59
+by not concealing their IP address. Increasingly, IP addresses can be
85 60
 <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>,
86
-and can
87
-<a href="http://whatsmyip.org/more/">reveal other information</a>
88
-about how you are connecting to the Internet.
89
-In the United States the
90
-government is pushing to make this mapping increasingly precise.
61
+and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
62
+In the United States the government is pushing to make this mapping increasingly precise.
91 63
 </li>
92
-
93 64
 <li>
94 65
 <strong>They research sensitive topics.</strong>
95
-There's a wealth of information available online. But perhaps in your 
96
-country, access to information on AIDS, birth control,
66
+There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
97 67
 <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
98
-or world religions is behind a national firewall.
99
-Or perhaps you are worried that if you research a particular set of
100
-symptoms, at some later date an insurance company might buy the 
101
-logs of the websites you visited and establish that
68
+or world religions is behind a national firewall.  Or perhaps you are worried that if you research a particular set of
69
+symptoms, at some later date an insurance company might buy the logs of the websites you visited and establish that
102 70
 you had suspicions of a pre-existing condition.
103 71
 </li>
104 72
 </ul>
105 73
 
106
-
107
-
108
-<h2>Soldiers in the field use Tor</h2>
74
+<h2>Militaries use Tor</h2>
109 75
 <ul>
110
-
111 76
 <li>
112
-<strong>Military field agents:</strong>
113
-How much, do you imagine, would the Iraqi insurgency pay to find out
114
-the location of every computer in Baghdad that logged into a military
115
-server in Maryland to read email?  Tor can protect military personnel in
116
-the field by hiding their location.
77
+<strong>Field agents:</strong>
78
+Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research
79
+Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
117 80
 </li>
118
-
119 81
 <li>
120 82
 <strong>Hidden services:</strong>
121 83
 When the Internet was designed by DARPA, its primary purpose was to
... ...
@@ -133,48 +94,31 @@ Military personnel need to use electronic resources run and monitored
133 94
 by insurgents. Obviously, they do not want the server logs on an insurgent
134 95
 website to show a military address, revealing their surveillance.
135 96
 </li>
136
-
137 97
 </ul>
138 98
 
139
-
140
-
141 99
 <h2>Journalists and their audience use Tor</h2>
142
-
143 100
 <ul>
144
-<li><strong>
145
-<a href="http://www.rsf.org/">Reporters without Borders</a></strong>
146
-tracks internet prisoners of conscience and
147
-jailed or harmed journalists all over the world. They advise
148
-journalists, sources, bloggers, and dissidents to use Tor to
149
-ensure their privacy and safety.
101
+<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
102
+tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
103
+journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
150 104
 </li>
151
-
152 105
 <li>
153
-<strong>The US <a href="http://www.ibb.gov/">International Broadcasting
154
-Bureau</a></strong> (Voice of America/Radio Free Europe/Radio Free Asia)
155
-supports Tor development to help Internet users in countries without
156
-safe access to free media.  Tor
157
-preserves the ability of persons behind national firewalls or under
158
-the surveillance of repressive regimes to obtain
159
-a global perspective on controversial topics including democracy,
106
+<strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> 
107
+(Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
108
+safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
109
+the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
160 110
 economics and religion.
161 111
 </li>
162
-
163 112
 <li>
164 113
 Although we often think of foreign journalists working in far off lands,
165
-<strong>citizen journalists in China and other
166
-<a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
167
-use Tor to write about local events</strong> and to encourage social
168
-change and political reform, more secure that there will not be a knock
114
+<strong>citizen journalists in China and other <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
115
+use Tor to write about local events</strong> and to encourage social change and political reform, more secure that there will not be a knock
169 116
 on the door at midnight.
170 117
 </li>
171
-
172 118
 </ul>
173 119
 
174
-
175 120
 <h2>Law enforcement officers use Tor</h2>
176 121
 <ul>
177
-
178 122
 <li>
179 123
 <strong>Online surveillance:</strong>
180 124
 Tor allows officials to surf questionable web sites and services
... ...
@@ -182,8 +126,7 @@ without leaving tell-tale tracks.  If the system administrator of an
182 126
 illegal gambling site, for example, were to see multiple connections from
183 127
 governmental or law enforcement computers in usage logs, investigations
184 128
 would be hampered.
185
-</strong>
186
-
129
+</li>
187 130
 <li>
188 131
 <strong>Sting operations:</strong>
189 132
 Similarly, anonymity allows law officers to engage in online
... ...
@@ -200,14 +142,10 @@ although a name or email address is not attached to information, server
200 142
 logs can identify them very quickly.  As a result, tip line web sites that
201 143
 do not encourage anonymity are limiting the sources of their tips.
202 144
 </li>
203
-
204 145
 </ul>
205 146
 
206
-
207
-
208
-<h2>Activists & whistleblowers use Tor</h2>
147
+<h2>Activists &amp; whistleblowers use Tor</h2>
209 148
 <ul>
210
-
211 149
 <li>
212 150
 <strong>Human rights activists use Tor to anonymously report abuses from
213 151
 danger zones.</strong>  Internationally, labor rights workers use Tor and other
... ...
@@ -216,72 +154,53 @@ with the Universal Declaration of Human Rights. Even though they are within
216 154
 the law, it does not mean they are safe. Tor provides the ability to
217 155
 avoid persecution while still raising a voice.
218 156
 </li>
219
-
220 157
 <li>
221 158
 When groups such as the <strong>Friends Service Committee and environmental
222
-groups are increasingly
223
-<a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
224
-in the United States</strong>
225
-under laws meant to protect against terrorism, many peaceful agents of
159
+groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
160
+in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of
226 161
 change rely on Tor for basic privacy during legitimate activities.
227 162
 </li>
228
-
229 163
 <li>
230 164
 <strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
231
-recommends Tor
232
-in their report, &ldquo;
165
+recommends Tor in their report, &ldquo;
233 166
 <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
234 167
 Complicity in Chinese Internet Censorship</a>.&rdquo; The study
235 168
 co-author interviewed Roger Dingledine, Tor project leader,
236 169
 on Tor use.  They cover Tor in the section on how to breach the <a
237 170
 href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
238
-Firewall of China,&rdquo;</a>
239
-and recommend that human rights workers throughout
171
+Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
240 172
 the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
241 173
 </li>
242
-
243 174
 <li>
244 175
 Tor has consulted with and volunteered help to <strong>Amnesty International's
245
-recent
246
-<a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
247
-See also their <a
248
-href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
176
+recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
177
+See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
249 178
 report</a> on China Internet issues.
250 179
 </li>
251
-
252 180
 <li>
253 181
 <a href="http://www.globalvoicesonline.org">Global Voices</a>
254 182
 can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,
255
-throughout their <a
256
-href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
183
+throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
257 184
 web site.</a>
258 185
 </li>
259
-
260 186
 <li>
261 187
 In the US, the Supreme Court recently stripped legal protections from
262 188
 government whistleblowers.  But whistleblowers working for governmental
263 189
 transparency or corporate accountability can use Tor to seek justice
264 190
 without personal repercussions.
265 191
 </li>
266
-
267 192
 <li>
268 193
 A contact of ours who works with a public health nonprofit in
269
-Africa reports that his nonprofit
270
-<strong>must budget 10% to cover various sorts of corruption</strong>,
271
-mostly bribes and such.  When that percentage
272
-rises steeply, not only can they not afford the money, but they can
194
+Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
195
+mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
273 196
 not afford to complain &mdash; this is the point at which open objection can
274 197
 become dangerous.  So his nonprofit has been working to
275
-<strong>use Tor to safely whistleblow on governmental corruption</strong>
276
-in order to continue their work.
198
+<strong>use Tor to safely whistleblow on governmental corruption</strong> in order to continue their work.
277 199
 </li>
278
-
279 200
 <li>
280
-At a recent conference a Tor staffer ran into a woman who came from
281
-a &ldquo;company town&rdquo; in a mountainous area of the
282
-eastern United States. She was attempting to blog anonymously to rally
283
-local residents to
284
-<strong>urge reform on the company</strong> that dominated the town's
201
+At a recent conference, a Tor staffer ran into a woman who came from
202
+a &ldquo;company town&rdquo; in the eastern United States. She was attempting to blog anonymously to rally
203
+local residents to <strong>urge reform on the company</strong> that dominated the town's
285 204
 economic and governmental affairs, fully cognizant that the kind of
286 205
 organizing she was doing <strong>could lead to harm or &ldquo;fatal
287 206
 accidents.&rdquo;</strong>
... ...
@@ -384,15 +292,10 @@ Every day we hear about bloggers who are
384 292
 <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
385 293
 <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
386 294
 for saying perfectly legal things online, in their blog.  In addition to following
387
-the advice in the
388
-<a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
389
-and Reporters Without Borders'
390
-<a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
295
+the advice in the <a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
296
+and Reporters Without Borders' <a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
391 297
 we recommend using Tor.
392 298
 </li>
393
-
394 299
 </ul>
395
-
396 300
 </div><!-- #main -->
397
-
398 301
 #include <foot.wmi>
399 302