Roger Dingledine commited on 2008-09-13 11:11:07
Zeige 1 geänderte Dateien mit 29 Einfügungen und 6 Löschungen.
| ... | ... |
@@ -27,15 +27,38 @@ |
| 27 | 27 |
|
| 28 | 28 |
<a id="General"></a> |
| 29 | 29 |
|
| 30 |
+<a id="WhatIsTor"></a> |
|
| 31 |
+<h3><a class="anchor" href="#WhatIsTor">What is Tor?</a></h3> |
|
| 32 |
+ |
|
| 33 |
+<p> |
|
| 34 |
+The name "Tor" can refer to several different components. |
|
| 35 |
+</p> |
|
| 36 |
+ |
|
| 37 |
+<p> |
|
| 38 |
+The Tor software is a program you can run on your computer that helps keep |
|
| 39 |
+you safe on the Internet. Tor protects you by bouncing your communications |
|
| 40 |
+around a distributed network of relays run by volunteers all around |
|
| 41 |
+the world: it prevents somebody watching your Internet connection from |
|
| 42 |
+learning what sites you visit, and it prevents the sites you visit |
|
| 43 |
+from learning your physical location. This set of volunteer relays is |
|
| 44 |
+called the Tor network. You can read more about how Tor works on the <a |
|
| 45 |
+href="<page overview>">overview page</a>. |
|
| 46 |
+</p> |
|
| 47 |
+ |
|
| 48 |
+<p> |
|
| 49 |
+The Tor Project is a non-profit (charity) organization that maintains |
|
| 50 |
+and develops the Tor software. The Tor Project is ... |
|
| 51 |
+</p> |
|
| 52 |
+ |
|
| 30 | 53 |
<a id="CompatibleApplications"></a> |
| 31 |
-<h3><a class="anchor" href="#CompatibleApplications">What programs work |
|
| 32 |
-with Tor?</a></h3> |
|
| 54 |
+<h3><a class="anchor" href="#CompatibleApplications">What programs can |
|
| 55 |
+I use with Tor?</a></h3> |
|
| 33 | 56 |
|
| 34 | 57 |
<p> |
| 35 | 58 |
There are two pieces to "Torifying" a program: connection-level anonymity |
| 36 | 59 |
and application-level anonymity. Connection-level anonymity focuses on |
| 37 |
-making sure the application's Internet connections get sent into Tor, |
|
| 38 |
-so they can be anonymized. This step is normally done by configuring |
|
| 60 |
+making sure the application's Internet connections get sent through Tor. |
|
| 61 |
+This step is normally done by configuring |
|
| 39 | 62 |
the program to use your Tor client as a "socks" proxy, but there are |
| 40 | 63 |
other ways to do it too. For application-level anonymity, you need to |
| 41 | 64 |
make sure that the information the application sends out doesn't hurt |
| ... | ... |
@@ -163,7 +186,7 @@ download page</a>. |
| 163 | 186 |
</p> |
| 164 | 187 |
|
| 165 | 188 |
<p> |
| 166 |
-Also, you should make sure not to confuse your users about what Tor is, |
|
| 189 |
+Also, you should make sure not to confuse your readers about what Tor is, |
|
| 167 | 190 |
who makes it, and what properties it provides (and doesn't provide). See |
| 168 | 191 |
our <a href="<page trademark-faq>">trademark FAQ</a> for details. |
| 169 | 192 |
</p> |
| ... | ... |
@@ -183,7 +206,7 @@ Tor support mail?</a></h3> |
| 183 | 206 |
<p> |
| 184 | 207 |
Many people send the Tor developers mail privately, or send mail to |
| 185 | 208 |
our internal aliases like tor-webmaster, with questions about their |
| 186 |
-specific setup -- they can't get their firewall working right, |
|
| 209 |
+specific setup — they can't get their firewall working right, |
|
| 187 | 210 |
they can't configure Privoxy correctly, or so on. Sometimes our |
| 188 | 211 |
volunteers can answer these mails, but typically they need to spend |
| 189 | 212 |
most of their time on development tasks that will benefit more people. |
| 190 | 213 |