faq-abuse edits from donna
Roger Dingledine

Roger Dingledine commited on 2005-07-13 00:09:41
Zeige 1 geänderte Dateien mit 11 Einfügungen und 11 Löschungen.

... ...
@@ -76,12 +76,12 @@ crimes like stalking, and so on. </p>
76 76
 <a id="DDoS"></a>
77 77
 <h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3>
78 78
 
79
-<p>Distributed denial of service attacks typically rely on having a group
79
+<p>Distributed denial of service (DDoS) attacks typically rely on having a group
80 80
 of thousands of computers all sending floods of traffic to a victim. Since
81 81
 the goal is to overpower the bandwidth of the victim, they typically send
82 82
 UDP packets since those don't require handshakes or coordination. </p>
83 83
 
84
-<p>But because Tor only transports correctly-formed TCP streams, not
84
+<p>But because Tor only transports correctly formed TCP streams, not
85 85
 all IP packets, you cannot send UDP packets over Tor. (You can't do
86 86
 specialized forms of this attack like SYN flooding either.) So ordinary
87 87
 DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth
... ...
@@ -134,7 +134,7 @@ since October 2003, and it's only generated a handful of complaints. Of
134 134
 course, like all privacy-oriented networks on the net, we attract our
135 135
 share of jerks. Tor's exit policies help separate the role of "willing
136 136
 to donate resources to the network" from the role of "willing to deal
137
-with exit abuse complaints", so we hope our network is more sustainable
137
+with exit abuse complaints," so we hope our network is more sustainable
138 138
 than past attempts at anonymity networks. </p>
139 139
 
140 140
 <p>Since Tor has <a
... ...
@@ -150,20 +150,20 @@ default exit policy), it's probably safe to say that you will eventually
150 150
 hear from somebody. Abuse
151 151
 complaints may come in a variety of forms. For example: </p>
152 152
 <ul>
153
-<li>Somebody connects to hotmail, and sends a ransom note to a
153
+<li>Somebody connects to Hotmail, and sends a ransom note to a
154 154
 company. The
155 155
 FBI sends you a polite email, you explain that you run a Tor server,
156
-and they say 'oh well' and leave you alone. [Port 80]</li>
157
-<li>Somebody tries to get you shut down by using Tor to connect to google
158
-groups and post spam to usenet, and then sending an angry mail to
156
+and they say "oh well" and leave you alone. [Port 80]</li>
157
+<li>Somebody tries to get you shut down by using Tor to connect to Google
158
+groups and post spam to Usenet, and then sends an angry mail to
159 159
 your ISP about how you're destroying the world. [Port 80]</li>
160
-<li>Somebody connects to an irc network and makes a nuisance of
160
+<li>Somebody connects to an IRC network and makes a nuisance of
161 161
 himself. Your ISP gets polite mail about how your computer has been
162
-compromised; and/or your computer gets ddosed. [Port 6667]</li>
162
+compromised; and/or your computer gets DDoSed. [Port 6667]</li>
163 163
 <li>Somebody uses Tor to download a Vin Diesel movie, and
164 164
 your ISP gets a DMCA takedown notice. See EFF's <a
165 165
 href="http://tor.eff.org/eff/tor-dmca-response.html">Tor DMCA Response
166
-Template</a>, which explains to your ISP why they can probably ignore
166
+Template</a>, which explains to your ISP why it can probably ignore
167 167
 the notice without any liability. [Arbitrary ports]</li>
168 168
 </ul>
169 169
 
... ...
@@ -250,7 +250,7 @@ to unblock exit nodes that have been blocked inadvertently. </p>
250 250
 <p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for
251 251
 spamming</a>, some over-zealous blacklisters seem to think that all
252 252
 open networks like Tor are evil --- they attempt to strong-arm network
253
-administrators on policy, service and routing issues, and then extract
253
+administrators on policy, service, and routing issues, and then extract
254 254
 ransoms from victims. </p>
255 255
 
256 256
 <p>If your server administrators decide to make use of these
257 257