Andrew Lewman commited on 2007-12-14 06:50:01
Zeige 1 geänderte Dateien mit 37 Einfügungen und 38 Löschungen.
... | ... |
@@ -9,34 +9,7 @@ |
9 | 9 |
|
10 | 10 |
<div class="main-column"> |
11 | 11 |
<h1>Who uses Tor?</h1> |
12 |
-<p>If you have a success story with Tor, especially one we |
|
13 |
-can link to, please <a href="<page contact>">send us</a> a note!</p> |
|
14 |
-<p>Tor provides anonymity: when it succeeds, nobody notices. This is |
|
15 |
-great for users, but not so good for us, since publishing success |
|
16 |
-stories about how people or organizations are staying anonymous could be |
|
17 |
-counterproductive. For example, we talked to an FBI officer who explained that he uses Tor every day for his |
|
18 |
-work — but he quickly followed up with a request not to provide details or mention his name.</p> |
|
19 |
-<p> Like any technology, from pencils to cellphones, anonymity can be |
|
20 |
-used for both good and bad. You have probably seen some of the vigorous debate |
|
21 |
-(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
|
22 |
-<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, |
|
23 |
-and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) |
|
24 |
-over anonymity. The Tor project is based on the belief that anonymity is |
|
25 |
-not just a good idea some of the time - it is a requirement for a free |
|
26 |
-and functioning society. The <a |
|
27 |
-href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> |
|
28 |
-of how anonymity was crucial to the founding of the United States. |
|
29 |
-Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
30 |
-<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
|
31 |
-<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
|
32 |
-<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
|
33 |
-and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there |
|
34 |
-are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of |
|
35 |
-the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
|
36 |
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the |
|
37 |
-<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
|
38 |
-you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:</p> |
|
39 |
- |
|
12 |
+<a link="normalusers"></a> |
|
40 | 13 |
<h2>Everyday, ordinary Internet surfers use Tor</h2> |
41 | 14 |
<ul> |
42 | 15 |
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
... | ... |
@@ -44,10 +17,8 @@ Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449 |
44 | 17 |
sell your Internet browsing records</a> to marketers or anyone else |
45 | 18 |
willing to pay for it. ISPs typically say that |
46 | 19 |
they anonymize the data by not providing personally identifiable information, but |
47 |
-<a |
|
48 |
-href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this |
|
49 |
-has proven incorrect</a>. |
|
50 |
-A full record of every site you visit, the text of every search you perform, and potentially |
|
20 |
+<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this |
|
21 |
+has proven incorrect</a>. A full record of every site you visit, the text of every search you perform, and potentially |
|
51 | 22 |
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information. |
52 | 23 |
</li> |
53 | 24 |
<li><strong> They protect their communications from irresponsible corporations.</strong> |
... | ... |
@@ -70,10 +41,10 @@ you had suspicions of a pre-existing condition. |
70 | 41 |
</li> |
71 | 42 |
</ul> |
72 | 43 |
|
44 |
+<a link="military"></a> |
|
73 | 45 |
<h2>Militaries use Tor</h2> |
74 | 46 |
<ul> |
75 |
-<li><strong>Field agents:</strong> |
|
76 |
-Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research |
|
47 |
+<li>Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research |
|
77 | 48 |
Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications. |
78 | 49 |
</li> |
79 | 50 |
<li><strong>Hidden services:</strong> |
... | ... |
@@ -83,12 +54,12 @@ reveal the geographic location of any server that is reachable online. Tor's hi |
83 | 54 |
control to be physically secure from discovery and takedown. |
84 | 55 |
</li> |
85 | 56 |
<li><strong>Intelligence gathering:</strong> |
86 |
-Military personnel need to use electronic resources run and monitored by |
|
87 |
-insurgents. They do not want the webserver logs on an insurgent website |
|
57 |
+Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
88 | 58 |
to record a military address, thereby revealing the surveillance. |
89 | 59 |
</li> |
90 | 60 |
</ul> |
91 | 61 |
|
62 |
+<a link="journalist"></a> |
|
92 | 63 |
<h2>Journalists and their audience use Tor</h2> |
93 | 64 |
<ul> |
94 | 65 |
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
... | ... |
@@ -112,6 +83,7 @@ avoid risking the personal consequences of intellectual curiosity. |
112 | 83 |
</li> |
113 | 84 |
</ul> |
114 | 85 |
|
86 |
+<a link="lawenforcement"></a> |
|
115 | 87 |
<h2>Law enforcement officers use Tor</h2> |
116 | 88 |
<ul> |
117 | 89 |
<li><strong>Online surveillance:</strong> |
... | ... |
@@ -136,6 +108,7 @@ do not encourage anonymity are limiting the sources of their tips. |
136 | 108 |
</li> |
137 | 109 |
</ul> |
138 | 110 |
|
111 |
+<a link="activists"></a> |
|
139 | 112 |
<h2>Activists & whistleblowers use Tor</h2> |
140 | 113 |
<ul> |
141 | 114 |
<li><strong>Human rights activists use Tor to anonymously report abuses from |
... | ... |
@@ -195,7 +168,7 @@ organize local labor. |
195 | 168 |
</li> |
196 | 169 |
</ul> |
197 | 170 |
|
198 |
- |
|
171 |
+<a link="spotlight"></a> |
|
199 | 172 |
<h2>Both high and low profile people use Tor</h2> |
200 | 173 |
<ul> |
201 | 174 |
<li>Does being in the public spotlight shut you off from having a private |
... | ... |
@@ -225,6 +198,7 @@ changed, and how the population sees this continuing into the future. |
225 | 198 |
</li> |
226 | 199 |
</ul> |
227 | 200 |
|
201 |
+<a link="executives"></a> |
|
228 | 202 |
<h2>Business executives use Tor</h2> |
229 | 203 |
<ul> |
230 | 204 |
<li><strong>Security breach information clearinghouses:</strong> |
... | ... |
@@ -261,6 +235,7 @@ into whistleblowing. |
261 | 235 |
</li> |
262 | 236 |
</ul> |
263 | 237 |
|
238 |
+<a link="bloggers"></a> |
|
264 | 239 |
<h2>Bloggers use Tor</h2> |
265 | 240 |
<ul> |
266 | 241 |
<li>Every day we hear about bloggers who are |
... | ... |
@@ -272,5 +247,29 @@ and Reporters Without Borders' <a href="http://www.rsf.org/rubrique.php3?id_rubr |
272 | 247 |
we recommend using Tor. |
273 | 248 |
</li> |
274 | 249 |
</ul> |
275 |
-</div><!-- #main --> |
|
250 |
+<p> |
|
251 |
+Please do send us your success stories. They are very important because |
|
252 |
+Tor provides anonymity. While it is thrilling speculate about <a |
|
253 |
+href="<page contact>">undesired effects of Tor</a>, when it succeeds, nobody notices. This is |
|
254 |
+great for users, but not so good for us, since publishing success |
|
255 |
+stories about how people or organizations are staying anonymous could be |
|
256 |
+counterproductive. For example, we talked to an FBI officer who |
|
257 |
+explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide |
|
258 |
+details or mention his name.</p> |
|
259 |
+<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous |
|
260 |
+debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
|
261 |
+<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
|
262 |
+href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not |
|
263 |
+just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
264 |
+<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
|
265 |
+<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
|
266 |
+<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
|
267 |
+and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there |
|
268 |
+are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of |
|
269 |
+the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
|
270 |
+purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the |
|
271 |
+<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
|
272 |
+you have better options than Tor. While not dismissing the potential abuses of Tor, |
|
273 |
+this page shows a few of the many important ways anonymity is used today.</p> |
|
274 |
+</div> |
|
276 | 275 |
#include <foot.wmi> |
277 | 276 |