Nick Mathewson commited on 2004-12-21 20:37:10
Zeige 3 geänderte Dateien mit 18 Einfügungen und 12 Löschungen.
| ... | ... |
@@ -45,11 +45,12 @@ width="110" height="79"></a> |
| 45 | 45 |
|
| 46 | 46 |
<p>Users: |
| 47 | 47 |
<ul> |
| 48 |
-<li>Try Tor out, and let us know about bugs you find or features you |
|
| 48 |
+<li>Try Tor out, and let the Tor developers know about bugs you find or |
|
| 49 |
+features you |
|
| 49 | 50 |
don't find.</li> |
| 50 | 51 |
<li>Please consider <a |
| 51 | 52 |
href="cvs/tor/doc/tor-doc.html#server">running a |
| 52 |
-server</a> to help us with development and scalability.</li> |
|
| 53 |
+server</a> to help with development and scalability.</li> |
|
| 53 | 54 |
<li>Does somebody want to help maintain this website, or help with |
| 54 | 55 |
documentation, or help with managing our TODO and handling bug reports?</li> |
| 55 | 56 |
<li>Please fix up <a |
| ... | ... |
@@ -102,8 +103,8 @@ Frontier Foundation</a>. More EFF donations means more Tor development.</li> |
| 102 | 103 |
</ul> |
| 103 | 104 |
</p> |
| 104 | 105 |
|
| 105 |
-<a href="mailto:tor-volunteer@freehaven.net">Let us know</a> if you want |
|
| 106 |
-to help out! |
|
| 106 |
+<a href="mailto:tor-volunteer@freehaven.net">Email |
|
| 107 |
+tor-volunteer@freehaven.net</a> if you want to help out! |
|
| 107 | 108 |
|
| 108 | 109 |
</div><!-- #main --> |
| 109 | 110 |
</div> |
| ... | ... |
@@ -100,7 +100,8 @@ href="mailto:weasel@debian.org">demand</a>. |
| 100 | 100 |
</p> |
| 101 | 101 |
|
| 102 | 102 |
<p><b>Other packages</b> are available for Gentoo Linux, NetBSD, |
| 103 |
-and OpenBSD. If somebody sends me details for these I'll put them here. |
|
| 103 |
+and OpenBSD. If somebody sends details for these to the Tor developers, we'll |
|
| 104 |
+put them here. |
|
| 104 | 105 |
</p> |
| 105 | 106 |
|
| 106 | 107 |
<!-- |
| ... | ... |
@@ -123,7 +124,7 @@ href="http://archives.seul.org/or/announce/Dec-2004/msg00000.html">a |
| 123 | 124 |
win32 installer, better |
| 124 | 125 |
circuit building algorithms, bandwidth accounting and hibernation, |
| 125 | 126 |
more efficient directory fetching, and support for a separate Tor GUI |
| 126 |
-controller program (once somebody writes one for us)</a>. |
|
| 127 |
+controller program (once somebody writes one)</a>. |
|
| 127 | 128 |
</p> |
| 128 | 129 |
|
| 129 | 130 |
<p class="date">2004-10-14</p> |
| ... | ... |
@@ -56,7 +56,7 @@ alt="How Tor Works"></a> |
| 56 | 56 |
<h2>Tor: An anonymous Internet communication system</h2> |
| 57 | 57 |
|
| 58 | 58 |
<p> |
| 59 |
-Tor is a toolset for a wide range of organizations and people who want |
|
| 59 |
+Tor is a toolset for a wide range of organizations and people that want |
|
| 60 | 60 |
to improve their safety and security on the Internet. Using Tor can help |
| 61 | 61 |
you anonymize web browsing and publishing, instant messaging, IRC, SSH, |
| 62 | 62 |
and more. Tor also provides a platform on which software developers can |
| ... | ... |
@@ -65,9 +65,13 @@ features. |
| 65 | 65 |
</p> |
| 66 | 66 |
|
| 67 | 67 |
<p> |
| 68 |
-Your traffic is safer when you use Tor because communications |
|
| 69 |
-are bounced around a distributed network of servers called <a |
|
| 70 |
-href="howitworks.html">onion routers</a>—this makes it hard for |
|
| 68 |
+Your traffic is safer when you use Tor, because communications |
|
| 69 |
+are bounced around a distributed network of servers, called <a |
|
| 70 |
+href="overview.html">onion routers</a>. Instead of taking a direct |
|
| 71 |
+route from source to destination, data packets on the Tor network take a |
|
| 72 |
+random pathway through several servers that cover your tracks so no observer |
|
| 73 |
+at any single point can tell where the data came from or where it's going. |
|
| 74 |
+This makes it hard for |
|
| 71 | 75 |
recipients, observers, and even the onion routers themselves to figure |
| 72 | 76 |
out who and where you are. Tor's technology aims to provide Internet |
| 73 | 77 |
users with protection against "traffic analysis," a form of |
| ... | ... |
@@ -77,7 +81,7 @@ confidential business activities and relationships, and state security. |
| 77 | 81 |
|
| 78 | 82 |
<p> |
| 79 | 83 |
Traffic analysis is used every day by companies, governments, and |
| 80 |
-individuals who want to keep track of where people and organizations go |
|
| 84 |
+individuals that want to keep track of where people and organizations go |
|
| 81 | 85 |
and what they do on the Internet. Instead of looking at the content of |
| 82 | 86 |
your communications, traffic analysis tracks where your data goes and |
| 83 | 87 |
when, as well as how big it is. For example, |
| ... | ... |
@@ -85,7 +89,7 @@ online advertising company Doubleclick uses traffic analysis to record |
| 85 | 89 |
what web pages you've visited, and can build a profile of your interests |
| 86 | 90 |
from that. A pharmaceutical company could use traffic analysis to monitor |
| 87 | 91 |
when the research wing of a competitor visits its website, and track |
| 88 |
-what pages or products the competitor is interested in. IBM hosts a |
|
| 92 |
+what pages or products that interest the competitor. IBM hosts a |
|
| 89 | 93 |
searchable patent index, and it could keep a list of every query your |
| 90 | 94 |
company makes. A stalker could use traffic analysis to learn whether |
| 91 | 95 |
you're in a certain Internet cafe. |
| 92 | 96 |