Roger Dingledine commited on 2008-09-13 11:11:07
Zeige 1 geänderte Dateien mit 29 Einfügungen und 6 Löschungen.
... | ... |
@@ -27,15 +27,38 @@ |
27 | 27 |
|
28 | 28 |
<a id="General"></a> |
29 | 29 |
|
30 |
+<a id="WhatIsTor"></a> |
|
31 |
+<h3><a class="anchor" href="#WhatIsTor">What is Tor?</a></h3> |
|
32 |
+ |
|
33 |
+<p> |
|
34 |
+The name "Tor" can refer to several different components. |
|
35 |
+</p> |
|
36 |
+ |
|
37 |
+<p> |
|
38 |
+The Tor software is a program you can run on your computer that helps keep |
|
39 |
+you safe on the Internet. Tor protects you by bouncing your communications |
|
40 |
+around a distributed network of relays run by volunteers all around |
|
41 |
+the world: it prevents somebody watching your Internet connection from |
|
42 |
+learning what sites you visit, and it prevents the sites you visit |
|
43 |
+from learning your physical location. This set of volunteer relays is |
|
44 |
+called the Tor network. You can read more about how Tor works on the <a |
|
45 |
+href="<page overview>">overview page</a>. |
|
46 |
+</p> |
|
47 |
+ |
|
48 |
+<p> |
|
49 |
+The Tor Project is a non-profit (charity) organization that maintains |
|
50 |
+and develops the Tor software. The Tor Project is ... |
|
51 |
+</p> |
|
52 |
+ |
|
30 | 53 |
<a id="CompatibleApplications"></a> |
31 |
-<h3><a class="anchor" href="#CompatibleApplications">What programs work |
|
32 |
-with Tor?</a></h3> |
|
54 |
+<h3><a class="anchor" href="#CompatibleApplications">What programs can |
|
55 |
+I use with Tor?</a></h3> |
|
33 | 56 |
|
34 | 57 |
<p> |
35 | 58 |
There are two pieces to "Torifying" a program: connection-level anonymity |
36 | 59 |
and application-level anonymity. Connection-level anonymity focuses on |
37 |
-making sure the application's Internet connections get sent into Tor, |
|
38 |
-so they can be anonymized. This step is normally done by configuring |
|
60 |
+making sure the application's Internet connections get sent through Tor. |
|
61 |
+This step is normally done by configuring |
|
39 | 62 |
the program to use your Tor client as a "socks" proxy, but there are |
40 | 63 |
other ways to do it too. For application-level anonymity, you need to |
41 | 64 |
make sure that the information the application sends out doesn't hurt |
... | ... |
@@ -163,7 +186,7 @@ download page</a>. |
163 | 186 |
</p> |
164 | 187 |
|
165 | 188 |
<p> |
166 |
-Also, you should make sure not to confuse your users about what Tor is, |
|
189 |
+Also, you should make sure not to confuse your readers about what Tor is, |
|
167 | 190 |
who makes it, and what properties it provides (and doesn't provide). See |
168 | 191 |
our <a href="<page trademark-faq>">trademark FAQ</a> for details. |
169 | 192 |
</p> |
... | ... |
@@ -183,7 +206,7 @@ Tor support mail?</a></h3> |
183 | 206 |
<p> |
184 | 207 |
Many people send the Tor developers mail privately, or send mail to |
185 | 208 |
our internal aliases like tor-webmaster, with questions about their |
186 |
-specific setup -- they can't get their firewall working right, |
|
209 |
+specific setup — they can't get their firewall working right, |
|
187 | 210 |
they can't configure Privoxy correctly, or so on. Sometimes our |
188 | 211 |
volunteers can answer these mails, but typically they need to spend |
189 | 212 |
most of their time on development tasks that will benefit more people. |
190 | 213 |