Andrew Lewman commited on 2007-12-13 02:53:45
Zeige 1 geänderte Dateien mit 40 Einfügungen und 30 Löschungen.
... | ... |
@@ -14,13 +14,19 @@ can link to, please <a href="<page contact>">send us</a> a note!</p> |
14 | 14 |
<p>Tor provides anonymity: when it succeeds, nobody notices. This is |
15 | 15 |
great for users, but not so good for us, since publishing success |
16 | 16 |
stories about how people or organizations are staying anonymous could be |
17 |
-counterproductive. As an example, we talked to an FBI officer who explained that he uses Tor every day for his |
|
17 |
+counterproductive. For example, we talked to an FBI officer who explained that he uses Tor every day for his |
|
18 | 18 |
work — but he quickly followed up with a request not to provide details or mention his name.</p> |
19 |
-<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and evil. You have probably seen some of the vigorous debate |
|
19 |
+<p> Like any technology, from pencils to cellphones, anonymity can be |
|
20 |
+used for both good and bad. You have probably seen some of the vigorous debate |
|
20 | 21 |
(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
21 | 22 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, |
22 | 23 |
and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) |
23 |
-over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
24 |
+over anonymity. The Tor project is based on the belief that anonymity is |
|
25 |
+not just a good idea some of the time - it is a requirement for a free |
|
26 |
+and functioning society. The <a |
|
27 |
+href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> |
|
28 |
+of how anonymity was crucial to the founding of the United States. |
|
29 |
+Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
24 | 30 |
<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
25 | 31 |
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
26 | 32 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
... | ... |
@@ -35,9 +41,12 @@ you have better options than Tor. While not dismissing the potential abuses of T |
35 | 41 |
<ul> |
36 | 42 |
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
37 | 43 |
Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month"> |
38 |
-sell your Internet browsing records</a> to marketers or anyone else willing to pay for it. They typically say that |
|
39 |
-they anonymize it by not providing your username or personally identifiable information, but |
|
40 |
-<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>. |
|
44 |
+sell your Internet browsing records</a> to marketers or anyone else |
|
45 |
+willing to pay for it. ISPs typically say that |
|
46 |
+they anonymize the data by not providing personally identifiable information, but |
|
47 |
+<a |
|
48 |
+href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this |
|
49 |
+has proven incorrect</a>. |
|
41 | 50 |
A full record of every site you visit, the text of every search you perform, and potentially |
42 | 51 |
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information. |
43 | 52 |
</li> |
... | ... |
@@ -50,7 +59,7 @@ your data is often not well protected by those you are supposed to trust to keep |
50 | 59 |
<li><strong>They protect their children online.</strong> |
51 | 60 |
You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply |
52 | 61 |
by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet. |
53 |
-In the United States the government is pushing to make this mapping increasingly precise. |
|
62 |
+In the United States, the government is pushing to make this mapping increasingly precise. |
|
54 | 63 |
</li> |
55 | 64 |
<li><strong>They research sensitive topics.</strong> |
56 | 65 |
There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control, |
... | ... |
@@ -68,18 +77,15 @@ Tor was originally designed, implemented, and deployed as a third-generation oni |
68 | 77 |
Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications. |
69 | 78 |
</li> |
70 | 79 |
<li><strong>Hidden services:</strong> |
71 |
-When the Internet was designed by DARPA, its primary purpose was to |
|
72 |
-be able to facilitate distributed, robust communications in case of |
|
73 |
-local strikes. However, some functions must be centralized, such as |
|
74 |
-command and control sites. It's the nature of the Internet protocols to |
|
75 |
-reveal the geographic location of any server that is reachable online. |
|
76 |
-Tor's hidden services capacity allows military command and |
|
80 |
+When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
81 |
+local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
82 |
+reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
77 | 83 |
control to be physically secure from discovery and takedown. |
78 | 84 |
</li> |
79 | 85 |
<li><strong>Intelligence gathering:</strong> |
80 |
-Military personnel need to use electronic resources run and monitored |
|
81 |
-by insurgents. Obviously, they do not want the server logs on an insurgent |
|
82 |
-website to show a military address, revealing their surveillance. |
|
86 |
+Military personnel need to use electronic resources run and monitored by |
|
87 |
+insurgents. They do not want the webserver logs on an insurgent website |
|
88 |
+to record a military address, thereby revealing the surveillance. |
|
83 | 89 |
</li> |
84 | 90 |
</ul> |
85 | 91 |
|
... | ... |
@@ -95,10 +101,14 @@ safe access to free media. Tor preserves the ability of persons behind national |
95 | 101 |
the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, |
96 | 102 |
economics and religion. |
97 | 103 |
</li> |
98 |
-<li>Although we often think of foreign journalists working in far off lands, |
|
99 |
-<strong>citizen journalists in China and other <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a> |
|
100 |
-use Tor to write about local events</strong> and to encourage social change and political reform, more secure that there will not be a knock |
|
101 |
-on the door at midnight. |
|
104 |
+<li><strong>Citizen journalists in China</strong> use Tor to write about |
|
105 |
+local events to encourage social change and political reform. |
|
106 |
+</li> |
|
107 |
+<li><strong>Citizens and journalists in <a |
|
108 |
+href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black |
|
109 |
+holes</a></strong> use Tor to research state propoganda and opposing |
|
110 |
+viewpoints, to file stories with non-State controlled media, and to |
|
111 |
+avoid risking the personal consequences of intellectual curiosity. |
|
102 | 112 |
</li> |
103 | 113 |
</ul> |
104 | 114 |
|
... | ... |
@@ -108,14 +118,14 @@ on the door at midnight. |
108 | 118 |
Tor allows officials to surf questionable web sites and services |
109 | 119 |
without leaving tell-tale tracks. If the system administrator of an |
110 | 120 |
illegal gambling site, for example, were to see multiple connections from |
111 |
-governmental or law enforcement computers in usage logs, investigations |
|
112 |
-would be hampered. |
|
121 |
+government or law enforcement IP addresses in usage logs, investigations |
|
122 |
+may be hampered. |
|
113 | 123 |
</li> |
114 | 124 |
<li><strong>Sting operations:</strong> |
115 | 125 |
Similarly, anonymity allows law officers to engage in online |
116 | 126 |
“undercover ” operations. Regardless of how good an |
117 |
-undercover officer's “street cred” may be, if his or her |
|
118 |
-email headers include nypd.nyc.ny.state.us, his or her cover is blown. |
|
127 |
+undercover officer's “street cred” may be, if the |
|
128 |
+communications include nypd.nyc.ny.state.us, the cover is blown. |
|
119 | 129 |
</li> |
120 | 130 |
<li><strong>Truly anonymous tip lines:</strong> |
121 | 131 |
While online anonymous tip lines are popular, without anonymity |
... | ... |
@@ -156,7 +166,7 @@ See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-l |
156 | 166 |
report</a> on China Internet issues. |
157 | 167 |
</li> |
158 | 168 |
<li><a href="http://www.globalvoicesonline.org">Global Voices</a> |
159 |
-can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>, |
|
169 |
+recommends Tor, especially for <strong>anonynomous blogging</strong>, |
|
160 | 170 |
throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor"> |
161 | 171 |
web site.</a> |
162 | 172 |
</li> |
... | ... |
@@ -170,12 +180,12 @@ Africa reports that his nonprofit <strong>must budget 10% to cover various sorts |
170 | 180 |
mostly bribes and such. When that percentage rises steeply, not only can they not afford the money, but they can |
171 | 181 |
not afford to complain — this is the point at which open objection can |
172 | 182 |
become dangerous. So his nonprofit has been working to |
173 |
-<strong>use Tor to safely whistleblow on governmental corruption</strong> in order to continue their work. |
|
183 |
+<strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work. |
|
174 | 184 |
</li> |
175 | 185 |
<li>At a recent conference, a Tor staffer ran into a woman who came from |
176 | 186 |
a “company town” in the eastern United States. She was attempting to blog anonymously to rally |
177 |
-local residents to <strong>urge reform on the company</strong> that dominated the town's |
|
178 |
-economic and governmental affairs, fully cognizant that the kind of |
|
187 |
+local residents to <strong>urge reform in the company</strong> that dominated the town's |
|
188 |
+economic and government affairs. She is fully cognizant that the kind of |
|
179 | 189 |
organizing she was doing <strong>could lead to harm or “fatal |
180 | 190 |
accidents.”</strong> |
181 | 191 |
</li> |
... | ... |
@@ -189,7 +199,7 @@ organize local labor. |
189 | 199 |
<h2>Both high and low profile people use Tor</h2> |
190 | 200 |
<ul> |
191 | 201 |
<li>Does being in the public spotlight shut you off from having a private |
192 |
-life, forever, online? A rural lawyer in a small New England state keeps |
|
202 |
+life, forever, online? A rural lawyer in a New England state keeps |
|
193 | 203 |
an anonymous blog because, with the diverse clientele at his prestigious |
194 | 204 |
law firm, <strong>his political beliefs are bound to offend someone</strong>. Yet, he |
195 | 205 |
doesn't want to remain silent on issues he cares about. Tor helps him |
... | ... |
@@ -224,7 +234,7 @@ to report breaches to a central group, who correlates attacks to detect |
224 | 234 |
coordinated patterns and send out alerts. But if a specific bank in |
225 | 235 |
St. Louis is breached, they don't want an attacker watching the incoming |
226 | 236 |
traffic to such a repository to be able to track where information is |
227 |
-coming from. Even though every packet were encrypted, the Internet |
|
237 |
+coming from. Even though every packet were encrypted, the IP |
|
228 | 238 |
address would betray the location of a compromised system. Tor allows |
229 | 239 |
such repositories of sensitive information to resist compromises. |
230 | 240 |
</li> |
231 | 241 |