content updates.
Andrew Lewman

Andrew Lewman commited on 2007-12-13 02:53:45
Zeige 1 geänderte Dateien mit 40 Einfügungen und 30 Löschungen.

... ...
@@ -14,13 +14,19 @@ can link to, please <a href="<page contact>">send us</a> a note!</p>
14 14
 <p>Tor provides anonymity: when it succeeds, nobody notices.  This is
15 15
 great for users, but not so good for us, since publishing success
16 16
 stories about how people or organizations are staying anonymous could be
17
-counterproductive.  As an example, we talked to an FBI officer who explained that he uses Tor every day for his
17
+counterproductive.  For example, we talked to an FBI officer who explained that he uses Tor every day for his
18 18
 work &mdash; but he quickly followed up with a request not to provide details or mention his name.</p>
19
-<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and evil.  You have probably seen some of the vigorous debate
19
+<p> Like any technology, from pencils to cellphones, anonymity can be
20
+used for both good and bad.  You have probably seen some of the vigorous debate
20 21
 (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
21 22
 <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
22 23
 and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
23
-over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
24
+over anonymity. The Tor project is based on the belief that anonymity is
25
+not just a good idea some of the time - it is a requirement for a free
26
+and functioning society. The <a
27
+href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a>
28
+of how anonymity was crucial to the founding of the United States.
29
+Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
24 30
 <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
25 31
 <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
26 32
 <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
... ...
@@ -35,9 +41,12 @@ you have better options than Tor. While not dismissing the potential abuses of T
35 41
 <ul>
36 42
 <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
37 43
 Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
38
-sell your Internet browsing records</a> to marketers or anyone else willing to pay for it. They typically say that 
39
-they anonymize it by not providing your username or personally identifiable information, but
40
-<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.
44
+sell your Internet browsing records</a> to marketers or anyone else
45
+willing to pay for it. ISPs typically say that 
46
+they anonymize the data by not providing personally identifiable information, but
47
+<a
48
+href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
49
+has proven incorrect</a>.
41 50
 A full record of every site you visit, the text of every search you perform, and potentially 
42 51
 userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
43 52
 </li>
... ...
@@ -50,7 +59,7 @@ your data is often not well protected by those you are supposed to trust to keep
50 59
 <li><strong>They protect their children online.</strong>
51 60
 You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
52 61
 by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
53
-In the United States the government is pushing to make this mapping increasingly precise.
62
+In the United States, the government is pushing to make this mapping increasingly precise.
54 63
 </li>
55 64
 <li><strong>They research sensitive topics.</strong>
56 65
 There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
... ...
@@ -68,18 +77,15 @@ Tor was originally designed, implemented, and deployed as a third-generation oni
68 77
 Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
69 78
 </li>
70 79
 <li><strong>Hidden services:</strong>
71
-When the Internet was designed by DARPA, its primary purpose was to
72
-be able to facilitate distributed, robust communications in case of
73
-local strikes.  However, some functions must be centralized, such as
74
-command and control sites.  It's the nature of the Internet protocols to
75
-reveal the geographic location of any server that is reachable online.
76
-Tor's hidden services capacity allows military command and
80
+When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
81
+local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
82
+reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
77 83
 control to be physically secure from discovery and takedown.
78 84
 </li>
79 85
 <li><strong>Intelligence gathering:</strong>
80
-Military personnel need to use electronic resources run and monitored
81
-by insurgents. Obviously, they do not want the server logs on an insurgent
82
-website to show a military address, revealing their surveillance.
86
+Military personnel need to use electronic resources run and monitored by
87
+insurgents. They do not want the webserver logs on an insurgent website
88
+to record a military address, thereby revealing the surveillance.
83 89
 </li>
84 90
 </ul>
85 91
 
... ...
@@ -95,10 +101,14 @@ safe access to free media.  Tor preserves the ability of persons behind national
95 101
 the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
96 102
 economics and religion.
97 103
 </li>
98
-<li>Although we often think of foreign journalists working in far off lands,
99
-<strong>citizen journalists in China and other <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
100
-use Tor to write about local events</strong> and to encourage social change and political reform, more secure that there will not be a knock
101
-on the door at midnight.
104
+<li><strong>Citizen journalists in China</strong> use Tor to write about
105
+local events to encourage social change and political reform.
106
+</li>
107
+<li><strong>Citizens and journalists in <a
108
+href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
109
+holes</a></strong> use Tor to research state propoganda and opposing
110
+viewpoints, to file stories with non-State controlled media, and to
111
+avoid risking the personal consequences of intellectual curiosity.
102 112
 </li>
103 113
 </ul>
104 114
 
... ...
@@ -108,14 +118,14 @@ on the door at midnight.
108 118
 Tor allows officials to surf questionable web sites and services
109 119
 without leaving tell-tale tracks.  If the system administrator of an
110 120
 illegal gambling site, for example, were to see multiple connections from
111
-governmental or law enforcement computers in usage logs, investigations
112
-would be hampered.
121
+government or law enforcement IP addresses in usage logs, investigations
122
+may be hampered.
113 123
 </li>
114 124
 <li><strong>Sting operations:</strong>
115 125
 Similarly, anonymity allows law officers to engage in online
116 126
 &ldquo;undercover &rdquo; operations.  Regardless of how good an
117
-undercover officer's &ldquo;street cred&rdquo; may be, if his or her
118
-email headers include nypd.nyc.ny.state.us, his or her cover is blown.
127
+undercover officer's &ldquo;street cred&rdquo; may be, if the 
128
+communications include nypd.nyc.ny.state.us, the cover is blown.
119 129
 </li>
120 130
 <li><strong>Truly anonymous tip lines:</strong>
121 131
 While online anonymous tip lines are popular, without anonymity
... ...
@@ -156,7 +166,7 @@ See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-l
156 166
 report</a> on China Internet issues.
157 167
 </li>
158 168
 <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
159
-can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,
169
+recommends Tor, especially for <strong>anonynomous blogging</strong>,
160 170
 throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
161 171
 web site.</a>
162 172
 </li>
... ...
@@ -170,12 +180,12 @@ Africa reports that his nonprofit <strong>must budget 10% to cover various sorts
170 180
 mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
171 181
 not afford to complain &mdash; this is the point at which open objection can
172 182
 become dangerous.  So his nonprofit has been working to
173
-<strong>use Tor to safely whistleblow on governmental corruption</strong> in order to continue their work.
183
+<strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
174 184
 </li>
175 185
 <li>At a recent conference, a Tor staffer ran into a woman who came from
176 186
 a &ldquo;company town&rdquo; in the eastern United States. She was attempting to blog anonymously to rally
177
-local residents to <strong>urge reform on the company</strong> that dominated the town's
178
-economic and governmental affairs, fully cognizant that the kind of
187
+local residents to <strong>urge reform in the company</strong> that dominated the town's
188
+economic and government affairs. She is fully cognizant that the kind of
179 189
 organizing she was doing <strong>could lead to harm or &ldquo;fatal
180 190
 accidents.&rdquo;</strong>
181 191
 </li>
... ...
@@ -189,7 +199,7 @@ organize local labor.
189 199
 <h2>Both high and low profile people use Tor</h2>
190 200
 <ul>
191 201
 <li>Does being in the public spotlight shut you off from having a private
192
-life, forever, online?  A rural lawyer in a small New England state keeps
202
+life, forever, online?  A rural lawyer in a New England state keeps
193 203
 an anonymous blog because, with the diverse clientele at his prestigious
194 204
 law firm, <strong>his political beliefs are bound to offend someone</strong>.  Yet, he
195 205
 doesn't want to remain silent on issues he cares about.  Tor helps him
... ...
@@ -224,7 +234,7 @@ to report breaches to a central group, who correlates attacks to detect
224 234
 coordinated patterns and send out alerts.  But if a specific bank in
225 235
 St. Louis is breached, they don't want an attacker watching the incoming
226 236
 traffic to such a repository to be able to track where information is
227
-coming from.  Even though every packet were encrypted, the Internet
237
+coming from.  Even though every packet were encrypted, the IP
228 238
 address would betray the location of a compromised system.  Tor allows
229 239
 such repositories of sensitive information to resist compromises.
230 240
 </li>
231 241