content updates and restructuring per paul's suggestion.
Andrew Lewman

Andrew Lewman commited on 2007-12-14 06:50:01
Zeige 1 geänderte Dateien mit 37 Einfügungen und 38 Löschungen.

... ...
@@ -9,34 +9,7 @@
9 9
 
10 10
 <div class="main-column">
11 11
 <h1>Who uses Tor?</h1>
12
-<p>If you have a success story with Tor, especially one we
13
-can link to, please <a href="<page contact>">send us</a> a note!</p>
14
-<p>Tor provides anonymity: when it succeeds, nobody notices.  This is
15
-great for users, but not so good for us, since publishing success
16
-stories about how people or organizations are staying anonymous could be
17
-counterproductive.  For example, we talked to an FBI officer who explained that he uses Tor every day for his
18
-work &mdash; but he quickly followed up with a request not to provide details or mention his name.</p>
19
-<p> Like any technology, from pencils to cellphones, anonymity can be
20
-used for both good and bad.  You have probably seen some of the vigorous debate
21
-(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
22
-<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
23
-and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
24
-over anonymity. The Tor project is based on the belief that anonymity is
25
-not just a good idea some of the time - it is a requirement for a free
26
-and functioning society. The <a
27
-href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a>
28
-of how anonymity was crucial to the founding of the United States.
29
-Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
30
-<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
31
-<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
32
-<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
33
-and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
34
-are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
35
-the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
36
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
37
-<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
38
-you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:</p>
39
-
12
+<a link="normalusers"></a>
40 13
 <h2>Everyday, ordinary Internet surfers use Tor</h2>
41 14
 <ul>
42 15
 <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
... ...
@@ -44,10 +17,8 @@ Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449
44 17
 sell your Internet browsing records</a> to marketers or anyone else
45 18
 willing to pay for it. ISPs typically say that 
46 19
 they anonymize the data by not providing personally identifiable information, but
47
-<a
48
-href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
49
-has proven incorrect</a>.
50
-A full record of every site you visit, the text of every search you perform, and potentially 
20
+<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
21
+has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially 
51 22
 userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
52 23
 </li>
53 24
 <li><strong> They protect their communications from irresponsible corporations.</strong>
... ...
@@ -70,10 +41,10 @@ you had suspicions of a pre-existing condition.
70 41
 </li>
71 42
 </ul>
72 43
 
44
+<a link="military"></a>
73 45
 <h2>Militaries use Tor</h2>
74 46
 <ul>
75
-<li><strong>Field agents:</strong>
76
-Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research
47
+<li>Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research
77 48
 Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
78 49
 </li>
79 50
 <li><strong>Hidden services:</strong>
... ...
@@ -83,12 +54,12 @@ reveal the geographic location of any server that is reachable online.  Tor's hi
83 54
 control to be physically secure from discovery and takedown.
84 55
 </li>
85 56
 <li><strong>Intelligence gathering:</strong>
86
-Military personnel need to use electronic resources run and monitored by
87
-insurgents. They do not want the webserver logs on an insurgent website
57
+Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
88 58
 to record a military address, thereby revealing the surveillance.
89 59
 </li>
90 60
 </ul>
91 61
 
62
+<a link="journalist"></a>
92 63
 <h2>Journalists and their audience use Tor</h2>
93 64
 <ul>
94 65
 <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
... ...
@@ -112,6 +83,7 @@ avoid risking the personal consequences of intellectual curiosity.
112 83
 </li>
113 84
 </ul>
114 85
 
86
+<a link="lawenforcement"></a>
115 87
 <h2>Law enforcement officers use Tor</h2>
116 88
 <ul>
117 89
 <li><strong>Online surveillance:</strong>
... ...
@@ -136,6 +108,7 @@ do not encourage anonymity are limiting the sources of their tips.
136 108
 </li>
137 109
 </ul>
138 110
 
111
+<a link="activists"></a>
139 112
 <h2>Activists &amp; whistleblowers use Tor</h2>
140 113
 <ul>
141 114
 <li><strong>Human rights activists use Tor to anonymously report abuses from
... ...
@@ -195,7 +168,7 @@ organize local labor.
195 168
 </li>
196 169
 </ul>
197 170
 
198
-
171
+<a link="spotlight"></a>
199 172
 <h2>Both high and low profile people use Tor</h2>
200 173
 <ul>
201 174
 <li>Does being in the public spotlight shut you off from having a private
... ...
@@ -225,6 +198,7 @@ changed, and how the population sees this continuing into the future.
225 198
 </li>
226 199
 </ul>
227 200
 
201
+<a link="executives"></a>
228 202
 <h2>Business executives use Tor</h2>
229 203
 <ul>
230 204
 <li><strong>Security breach information clearinghouses:</strong>
... ...
@@ -261,6 +235,7 @@ into whistleblowing.
261 235
 </li>
262 236
 </ul>
263 237
 
238
+<a link="bloggers"></a>
264 239
 <h2>Bloggers use Tor</h2>
265 240
 <ul>
266 241
 <li>Every day we hear about bloggers who are
... ...
@@ -272,5 +247,29 @@ and Reporters Without Borders' <a href="http://www.rsf.org/rubrique.php3?id_rubr
272 247
 we recommend using Tor.
273 248
 </li>
274 249
 </ul>
275
-</div><!-- #main -->
250
+<p>                                                                                                                                                      
251
+Please do send us your success stories. They are very important because                                                                                  
252
+Tor provides anonymity. While it is thrilling speculate about <a
253
+href="<page contact>">undesired effects of Tor</a>, when it succeeds, nobody notices.  This is 
254
+great for users, but not so good for us, since publishing success                                                                                        
255
+stories about how people or organizations are staying anonymous could be                                                                                 
256
+counterproductive.  For example, we talked to an FBI officer who
257
+explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
258
+details or mention his name.</p>
259
+<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
260
+debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
261
+<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
262
+href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
263
+just a good idea some of the time - it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
264
+<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
265
+<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
266
+<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
267
+and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
268
+are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
269
+the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
270
+purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
271
+<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
272
+you have better options than Tor. While not dismissing the potential abuses of Tor,
273
+this page shows a few of the many important ways anonymity is used today.</p>
274
+</div>
276 275
 #include <foot.wmi>
277 276