Andrew Lewman commited on 2007-12-14 06:50:01
Zeige 1 geänderte Dateien mit 37 Einfügungen und 38 Löschungen.
| ... | ... |
@@ -9,34 +9,7 @@ |
| 9 | 9 |
|
| 10 | 10 |
<div class="main-column"> |
| 11 | 11 |
<h1>Who uses Tor?</h1> |
| 12 |
-<p>If you have a success story with Tor, especially one we |
|
| 13 |
-can link to, please <a href="<page contact>">send us</a> a note!</p> |
|
| 14 |
-<p>Tor provides anonymity: when it succeeds, nobody notices. This is |
|
| 15 |
-great for users, but not so good for us, since publishing success |
|
| 16 |
-stories about how people or organizations are staying anonymous could be |
|
| 17 |
-counterproductive. For example, we talked to an FBI officer who explained that he uses Tor every day for his |
|
| 18 |
-work — but he quickly followed up with a request not to provide details or mention his name.</p> |
|
| 19 |
-<p> Like any technology, from pencils to cellphones, anonymity can be |
|
| 20 |
-used for both good and bad. You have probably seen some of the vigorous debate |
|
| 21 |
-(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
|
| 22 |
-<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, |
|
| 23 |
-and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) |
|
| 24 |
-over anonymity. The Tor project is based on the belief that anonymity is |
|
| 25 |
-not just a good idea some of the time - it is a requirement for a free |
|
| 26 |
-and functioning society. The <a |
|
| 27 |
-href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> |
|
| 28 |
-of how anonymity was crucial to the founding of the United States. |
|
| 29 |
-Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
| 30 |
-<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
|
| 31 |
-<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
|
| 32 |
-<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
|
| 33 |
-and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there |
|
| 34 |
-are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of |
|
| 35 |
-the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
|
| 36 |
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the |
|
| 37 |
-<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
|
| 38 |
-you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:</p> |
|
| 39 |
- |
|
| 12 |
+<a link="normalusers"></a> |
|
| 40 | 13 |
<h2>Everyday, ordinary Internet surfers use Tor</h2> |
| 41 | 14 |
<ul> |
| 42 | 15 |
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
| ... | ... |
@@ -44,10 +17,8 @@ Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449 |
| 44 | 17 |
sell your Internet browsing records</a> to marketers or anyone else |
| 45 | 18 |
willing to pay for it. ISPs typically say that |
| 46 | 19 |
they anonymize the data by not providing personally identifiable information, but |
| 47 |
-<a |
|
| 48 |
-href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this |
|
| 49 |
-has proven incorrect</a>. |
|
| 50 |
-A full record of every site you visit, the text of every search you perform, and potentially |
|
| 20 |
+<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this |
|
| 21 |
+has proven incorrect</a>. A full record of every site you visit, the text of every search you perform, and potentially |
|
| 51 | 22 |
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information. |
| 52 | 23 |
</li> |
| 53 | 24 |
<li><strong> They protect their communications from irresponsible corporations.</strong> |
| ... | ... |
@@ -70,10 +41,10 @@ you had suspicions of a pre-existing condition. |
| 70 | 41 |
</li> |
| 71 | 42 |
</ul> |
| 72 | 43 |
|
| 44 |
+<a link="military"></a> |
|
| 73 | 45 |
<h2>Militaries use Tor</h2> |
| 74 | 46 |
<ul> |
| 75 |
-<li><strong>Field agents:</strong> |
|
| 76 |
-Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research |
|
| 47 |
+<li>Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research |
|
| 77 | 48 |
Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications. |
| 78 | 49 |
</li> |
| 79 | 50 |
<li><strong>Hidden services:</strong> |
| ... | ... |
@@ -83,12 +54,12 @@ reveal the geographic location of any server that is reachable online. Tor's hi |
| 83 | 54 |
control to be physically secure from discovery and takedown. |
| 84 | 55 |
</li> |
| 85 | 56 |
<li><strong>Intelligence gathering:</strong> |
| 86 |
-Military personnel need to use electronic resources run and monitored by |
|
| 87 |
-insurgents. They do not want the webserver logs on an insurgent website |
|
| 57 |
+Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
| 88 | 58 |
to record a military address, thereby revealing the surveillance. |
| 89 | 59 |
</li> |
| 90 | 60 |
</ul> |
| 91 | 61 |
|
| 62 |
+<a link="journalist"></a> |
|
| 92 | 63 |
<h2>Journalists and their audience use Tor</h2> |
| 93 | 64 |
<ul> |
| 94 | 65 |
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
| ... | ... |
@@ -112,6 +83,7 @@ avoid risking the personal consequences of intellectual curiosity. |
| 112 | 83 |
</li> |
| 113 | 84 |
</ul> |
| 114 | 85 |
|
| 86 |
+<a link="lawenforcement"></a> |
|
| 115 | 87 |
<h2>Law enforcement officers use Tor</h2> |
| 116 | 88 |
<ul> |
| 117 | 89 |
<li><strong>Online surveillance:</strong> |
| ... | ... |
@@ -136,6 +108,7 @@ do not encourage anonymity are limiting the sources of their tips. |
| 136 | 108 |
</li> |
| 137 | 109 |
</ul> |
| 138 | 110 |
|
| 111 |
+<a link="activists"></a> |
|
| 139 | 112 |
<h2>Activists & whistleblowers use Tor</h2> |
| 140 | 113 |
<ul> |
| 141 | 114 |
<li><strong>Human rights activists use Tor to anonymously report abuses from |
| ... | ... |
@@ -195,7 +168,7 @@ organize local labor. |
| 195 | 168 |
</li> |
| 196 | 169 |
</ul> |
| 197 | 170 |
|
| 198 |
- |
|
| 171 |
+<a link="spotlight"></a> |
|
| 199 | 172 |
<h2>Both high and low profile people use Tor</h2> |
| 200 | 173 |
<ul> |
| 201 | 174 |
<li>Does being in the public spotlight shut you off from having a private |
| ... | ... |
@@ -225,6 +198,7 @@ changed, and how the population sees this continuing into the future. |
| 225 | 198 |
</li> |
| 226 | 199 |
</ul> |
| 227 | 200 |
|
| 201 |
+<a link="executives"></a> |
|
| 228 | 202 |
<h2>Business executives use Tor</h2> |
| 229 | 203 |
<ul> |
| 230 | 204 |
<li><strong>Security breach information clearinghouses:</strong> |
| ... | ... |
@@ -261,6 +235,7 @@ into whistleblowing. |
| 261 | 235 |
</li> |
| 262 | 236 |
</ul> |
| 263 | 237 |
|
| 238 |
+<a link="bloggers"></a> |
|
| 264 | 239 |
<h2>Bloggers use Tor</h2> |
| 265 | 240 |
<ul> |
| 266 | 241 |
<li>Every day we hear about bloggers who are |
| ... | ... |
@@ -272,5 +247,29 @@ and Reporters Without Borders' <a href="http://www.rsf.org/rubrique.php3?id_rubr |
| 272 | 247 |
we recommend using Tor. |
| 273 | 248 |
</li> |
| 274 | 249 |
</ul> |
| 275 |
-</div><!-- #main --> |
|
| 250 |
+<p> |
|
| 251 |
+Please do send us your success stories. They are very important because |
|
| 252 |
+Tor provides anonymity. While it is thrilling speculate about <a |
|
| 253 |
+href="<page contact>">undesired effects of Tor</a>, when it succeeds, nobody notices. This is |
|
| 254 |
+great for users, but not so good for us, since publishing success |
|
| 255 |
+stories about how people or organizations are staying anonymous could be |
|
| 256 |
+counterproductive. For example, we talked to an FBI officer who |
|
| 257 |
+explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide |
|
| 258 |
+details or mention his name.</p> |
|
| 259 |
+<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous |
|
| 260 |
+debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
|
| 261 |
+<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
|
| 262 |
+href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not |
|
| 263 |
+just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
| 264 |
+<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
|
| 265 |
+<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
|
| 266 |
+<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
|
| 267 |
+and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there |
|
| 268 |
+are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of |
|
| 269 |
+the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
|
| 270 |
+purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the |
|
| 271 |
+<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
|
| 272 |
+you have better options than Tor. While not dismissing the potential abuses of Tor, |
|
| 273 |
+this page shows a few of the many important ways anonymity is used today.</p> |
|
| 274 |
+</div> |
|
| 276 | 275 |
#include <foot.wmi> |
| 277 | 276 |