Andrew Lewman commited on 2007-12-13 02:53:45
              Zeige 1 geänderte Dateien mit 40 Einfügungen und 30 Löschungen.
            
| ... | ... | 
                      @@ -14,13 +14,19 @@ can link to, please <a href="<page contact>">send us</a> a note!</p>  | 
                  
| 14 | 14 | 
                        <p>Tor provides anonymity: when it succeeds, nobody notices. This is  | 
                    
| 15 | 15 | 
                        great for users, but not so good for us, since publishing success  | 
                    
| 16 | 16 | 
                        stories about how people or organizations are staying anonymous could be  | 
                    
| 17 | 
                        -counterproductive. As an example, we talked to an FBI officer who explained that he uses Tor every day for his  | 
                    |
| 17 | 
                        +counterproductive. For example, we talked to an FBI officer who explained that he uses Tor every day for his  | 
                    |
| 18 | 18 | 
                        work — but he quickly followed up with a request not to provide details or mention his name.</p>  | 
                    
| 19 | 
                        -<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and evil. You have probably seen some of the vigorous debate  | 
                    |
| 19 | 
                        +<p> Like any technology, from pencils to cellphones, anonymity can be  | 
                    |
| 20 | 
                        +used for both good and bad. You have probably seen some of the vigorous debate  | 
                    |
| 20 | 21 | 
                        (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,  | 
                    
| 21 | 22 | 
                        <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,  | 
                    
| 22 | 23 | 
                        and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)  | 
                    
| 23 | 
                        -over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:  | 
                    |
| 24 | 
                        +over anonymity. The Tor project is based on the belief that anonymity is  | 
                    |
| 25 | 
                        +not just a good idea some of the time - it is a requirement for a free  | 
                    |
| 26 | 
                        +and functioning society. The <a  | 
                    |
| 27 | 
                        +href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a>  | 
                    |
| 28 | 
                        +of how anonymity was crucial to the founding of the United States.  | 
                    |
| 29 | 
                        +Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:  | 
                    |
| 24 | 30 | 
                        <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,  | 
                    
| 25 | 31 | 
                        <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,  | 
                    
| 26 | 32 | 
                        <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,  | 
                    
| ... | ... | 
                      @@ -35,9 +41,12 @@ you have better options than Tor. While not dismissing the potential abuses of T  | 
                  
| 35 | 41 | 
                        <ul>  | 
                    
| 36 | 42 | 
                        <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>  | 
                    
| 37 | 43 | 
                        Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">  | 
                    
| 38 | 
                        -sell your Internet browsing records</a> to marketers or anyone else willing to pay for it. They typically say that  | 
                    |
| 39 | 
                        -they anonymize it by not providing your username or personally identifiable information, but  | 
                    |
| 40 | 
                        -<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.  | 
                    |
| 44 | 
                        +sell your Internet browsing records</a> to marketers or anyone else  | 
                    |
| 45 | 
                        +willing to pay for it. ISPs typically say that  | 
                    |
| 46 | 
                        +they anonymize the data by not providing personally identifiable information, but  | 
                    |
| 47 | 
                        +<a  | 
                    |
| 48 | 
                        +href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this  | 
                    |
| 49 | 
                        +has proven incorrect</a>.  | 
                    |
| 41 | 50 | 
                        A full record of every site you visit, the text of every search you perform, and potentially  | 
                    
| 42 | 51 | 
                        userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.  | 
                    
| 43 | 52 | 
                        </li>  | 
                    
| ... | ... | 
                      @@ -50,7 +59,7 @@ your data is often not well protected by those you are supposed to trust to keep  | 
                  
| 50 | 59 | 
                        <li><strong>They protect their children online.</strong>  | 
                    
| 51 | 60 | 
                        You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply  | 
                    
| 52 | 61 | 
                        by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.  | 
                    
| 53 | 
                        -In the United States the government is pushing to make this mapping increasingly precise.  | 
                    |
| 62 | 
                        +In the United States, the government is pushing to make this mapping increasingly precise.  | 
                    |
| 54 | 63 | 
                        </li>  | 
                    
| 55 | 64 | 
                        <li><strong>They research sensitive topics.</strong>  | 
                    
| 56 | 65 | 
                        There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,  | 
                    
| ... | ... | 
                      @@ -68,18 +77,15 @@ Tor was originally designed, implemented, and deployed as a third-generation oni  | 
                  
| 68 | 77 | 
                        Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.  | 
                    
| 69 | 78 | 
                        </li>  | 
                    
| 70 | 79 | 
                        <li><strong>Hidden services:</strong>  | 
                    
| 71 | 
                        -When the Internet was designed by DARPA, its primary purpose was to  | 
                    |
| 72 | 
                        -be able to facilitate distributed, robust communications in case of  | 
                    |
| 73 | 
                        -local strikes. However, some functions must be centralized, such as  | 
                    |
| 74 | 
                        -command and control sites. It's the nature of the Internet protocols to  | 
                    |
| 75 | 
                        -reveal the geographic location of any server that is reachable online.  | 
                    |
| 76 | 
                        -Tor's hidden services capacity allows military command and  | 
                    |
| 80 | 
                        +When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of  | 
                    |
| 81 | 
                        +local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to  | 
                    |
| 82 | 
                        +reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and  | 
                    |
| 77 | 83 | 
                        control to be physically secure from discovery and takedown.  | 
                    
| 78 | 84 | 
                        </li>  | 
                    
| 79 | 85 | 
                        <li><strong>Intelligence gathering:</strong>  | 
                    
| 80 | 
                        -Military personnel need to use electronic resources run and monitored  | 
                    |
| 81 | 
                        -by insurgents. Obviously, they do not want the server logs on an insurgent  | 
                    |
| 82 | 
                        -website to show a military address, revealing their surveillance.  | 
                    |
| 86 | 
                        +Military personnel need to use electronic resources run and monitored by  | 
                    |
| 87 | 
                        +insurgents. They do not want the webserver logs on an insurgent website  | 
                    |
| 88 | 
                        +to record a military address, thereby revealing the surveillance.  | 
                    |
| 83 | 89 | 
                        </li>  | 
                    
| 84 | 90 | 
                        </ul>  | 
                    
| 85 | 91 | 
                         | 
                    
| ... | ... | 
                      @@ -95,10 +101,14 @@ safe access to free media. Tor preserves the ability of persons behind national  | 
                  
| 95 | 101 | 
                        the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,  | 
                    
| 96 | 102 | 
                        economics and religion.  | 
                    
| 97 | 103 | 
                        </li>  | 
                    
| 98 | 
                        -<li>Although we often think of foreign journalists working in far off lands,  | 
                    |
| 99 | 
                        -<strong>citizen journalists in China and other <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>  | 
                    |
| 100 | 
                        -use Tor to write about local events</strong> and to encourage social change and political reform, more secure that there will not be a knock  | 
                    |
| 101 | 
                        -on the door at midnight.  | 
                    |
| 104 | 
                        +<li><strong>Citizen journalists in China</strong> use Tor to write about  | 
                    |
| 105 | 
                        +local events to encourage social change and political reform.  | 
                    |
| 106 | 
                        +</li>  | 
                    |
| 107 | 
                        +<li><strong>Citizens and journalists in <a  | 
                    |
| 108 | 
                        +href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black  | 
                    |
| 109 | 
                        +holes</a></strong> use Tor to research state propoganda and opposing  | 
                    |
| 110 | 
                        +viewpoints, to file stories with non-State controlled media, and to  | 
                    |
| 111 | 
                        +avoid risking the personal consequences of intellectual curiosity.  | 
                    |
| 102 | 112 | 
                        </li>  | 
                    
| 103 | 113 | 
                        </ul>  | 
                    
| 104 | 114 | 
                         | 
                    
| ... | ... | 
                      @@ -108,14 +118,14 @@ on the door at midnight.  | 
                  
| 108 | 118 | 
                        Tor allows officials to surf questionable web sites and services  | 
                    
| 109 | 119 | 
                        without leaving tell-tale tracks. If the system administrator of an  | 
                    
| 110 | 120 | 
                        illegal gambling site, for example, were to see multiple connections from  | 
                    
| 111 | 
                        -governmental or law enforcement computers in usage logs, investigations  | 
                    |
| 112 | 
                        -would be hampered.  | 
                    |
| 121 | 
                        +government or law enforcement IP addresses in usage logs, investigations  | 
                    |
| 122 | 
                        +may be hampered.  | 
                    |
| 113 | 123 | 
                        </li>  | 
                    
| 114 | 124 | 
                        <li><strong>Sting operations:</strong>  | 
                    
| 115 | 125 | 
                        Similarly, anonymity allows law officers to engage in online  | 
                    
| 116 | 126 | 
                        “undercover ” operations. Regardless of how good an  | 
                    
| 117 | 
                        -undercover officer's “street cred” may be, if his or her  | 
                    |
| 118 | 
                        -email headers include nypd.nyc.ny.state.us, his or her cover is blown.  | 
                    |
| 127 | 
                        +undercover officer's “street cred” may be, if the  | 
                    |
| 128 | 
                        +communications include nypd.nyc.ny.state.us, the cover is blown.  | 
                    |
| 119 | 129 | 
                        </li>  | 
                    
| 120 | 130 | 
                        <li><strong>Truly anonymous tip lines:</strong>  | 
                    
| 121 | 131 | 
                        While online anonymous tip lines are popular, without anonymity  | 
                    
| ... | ... | 
                      @@ -156,7 +166,7 @@ See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-l  | 
                  
| 156 | 166 | 
                        report</a> on China Internet issues.  | 
                    
| 157 | 167 | 
                        </li>  | 
                    
| 158 | 168 | 
                        <li><a href="http://www.globalvoicesonline.org">Global Voices</a>  | 
                    
| 159 | 
                        -can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,  | 
                    |
| 169 | 
                        +recommends Tor, especially for <strong>anonynomous blogging</strong>,  | 
                    |
| 160 | 170 | 
                        throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">  | 
                    
| 161 | 171 | 
                        web site.</a>  | 
                    
| 162 | 172 | 
                        </li>  | 
                    
| ... | ... | 
                      @@ -170,12 +180,12 @@ Africa reports that his nonprofit <strong>must budget 10% to cover various sorts  | 
                  
| 170 | 180 | 
                        mostly bribes and such. When that percentage rises steeply, not only can they not afford the money, but they can  | 
                    
| 171 | 181 | 
                        not afford to complain — this is the point at which open objection can  | 
                    
| 172 | 182 | 
                        become dangerous. So his nonprofit has been working to  | 
                    
| 173 | 
                        -<strong>use Tor to safely whistleblow on governmental corruption</strong> in order to continue their work.  | 
                    |
| 183 | 
                        +<strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.  | 
                    |
| 174 | 184 | 
                        </li>  | 
                    
| 175 | 185 | 
                        <li>At a recent conference, a Tor staffer ran into a woman who came from  | 
                    
| 176 | 186 | 
                        a “company town” in the eastern United States. She was attempting to blog anonymously to rally  | 
                    
| 177 | 
                        -local residents to <strong>urge reform on the company</strong> that dominated the town's  | 
                    |
| 178 | 
                        -economic and governmental affairs, fully cognizant that the kind of  | 
                    |
| 187 | 
                        +local residents to <strong>urge reform in the company</strong> that dominated the town's  | 
                    |
| 188 | 
                        +economic and government affairs. She is fully cognizant that the kind of  | 
                    |
| 179 | 189 | 
                        organizing she was doing <strong>could lead to harm or “fatal  | 
                    
| 180 | 190 | 
                        accidents.”</strong>  | 
                    
| 181 | 191 | 
                        </li>  | 
                    
| ... | ... | 
                      @@ -189,7 +199,7 @@ organize local labor.  | 
                  
| 189 | 199 | 
                        <h2>Both high and low profile people use Tor</h2>  | 
                    
| 190 | 200 | 
                        <ul>  | 
                    
| 191 | 201 | 
                        <li>Does being in the public spotlight shut you off from having a private  | 
                    
| 192 | 
                        -life, forever, online? A rural lawyer in a small New England state keeps  | 
                    |
| 202 | 
                        +life, forever, online? A rural lawyer in a New England state keeps  | 
                    |
| 193 | 203 | 
                        an anonymous blog because, with the diverse clientele at his prestigious  | 
                    
| 194 | 204 | 
                        law firm, <strong>his political beliefs are bound to offend someone</strong>. Yet, he  | 
                    
| 195 | 205 | 
                        doesn't want to remain silent on issues he cares about. Tor helps him  | 
                    
| ... | ... | 
                      @@ -224,7 +234,7 @@ to report breaches to a central group, who correlates attacks to detect  | 
                  
| 224 | 234 | 
                        coordinated patterns and send out alerts. But if a specific bank in  | 
                    
| 225 | 235 | 
                        St. Louis is breached, they don't want an attacker watching the incoming  | 
                    
| 226 | 236 | 
                        traffic to such a repository to be able to track where information is  | 
                    
| 227 | 
                        -coming from. Even though every packet were encrypted, the Internet  | 
                    |
| 237 | 
                        +coming from. Even though every packet were encrypted, the IP  | 
                    |
| 228 | 238 | 
                        address would betray the location of a compromised system. Tor allows  | 
                    
| 229 | 239 | 
                        such repositories of sensitive information to resist compromises.  | 
                    
| 230 | 240 | 
                        </li>  | 
                    
| 231 | 241 |