Roger Dingledine commited on 2004-12-15 00:44:42
Zeige 4 geänderte Dateien mit 14 Einfügungen und 10 Löschungen.
| ... | ... |
@@ -42,9 +42,11 @@ |
| 42 | 42 |
to Tor-ifying various applications</a> |
| 43 | 43 |
</p> |
| 44 | 44 |
|
| 45 |
+<!-- |
|
| 45 | 46 |
<p> |
| 46 | 47 |
<a href="">What are the command-line and torrc config options?</a> |
| 47 | 48 |
</p> |
| 49 |
+--> |
|
| 48 | 50 |
|
| 49 | 51 |
<p> |
| 50 | 52 |
<a href="http://wiki.noreply.org/wiki/TheOnionRouter_2fTorInChroot">Running Tor |
| ... | ... |
@@ -64,8 +64,8 @@ Old releases are <a href="dist/obsolete/">here</a>. |
| 64 | 64 |
</p> |
| 65 | 65 |
|
| 66 | 66 |
<p><b>Red Hat packages</b> are not available yet. We have a <a |
| 67 |
-href="cvs/tor/tor.spec.in">spec file</a> but we're not sure if it's any |
|
| 68 |
-good. Please help. |
|
| 67 |
+href="cvs/tor/tor.spec.in">spec file</a>, and we plan to start making |
|
| 68 |
+rpms available soon. |
|
| 69 | 69 |
</p> |
| 70 | 70 |
|
| 71 | 71 |
<p><b>Debian packages</b> have been uploaded to unstable, |
| ... | ... |
@@ -26,7 +26,7 @@ |
| 26 | 26 |
<h2>Tor: How it works</h2> |
| 27 | 27 |
|
| 28 | 28 |
<p> |
| 29 |
-<a href="overview.html">Basic Tor Overview</a>: what Tor provides, why it |
|
| 29 |
+<a href="overview.html">Basic Tor overview</a>: what Tor provides, why it |
|
| 30 | 30 |
matters, how it works. |
| 31 | 31 |
</p> |
| 32 | 32 |
|
| ... | ... |
@@ -35,7 +35,7 @@ matters, how it works. |
| 35 | 35 |
configuring, and running Tor</a>. |
| 36 | 36 |
</p> |
| 37 | 37 |
|
| 38 |
-<p>The <b>Design Document</b> (published at Usenix |
|
| 38 |
+<p>The <b>design document</b> (published at Usenix |
|
| 39 | 39 |
Security 2004) gives our justifications and security analysis for the |
| 40 | 40 |
Tor design:</p> |
| 41 | 41 |
<ul> |
| ... | ... |
@@ -43,7 +43,7 @@ Tor design:</p> |
| 43 | 43 |
<li><a href="cvs/tor/doc/design-paper/tor-design.html">HTML version</a></li> |
| 44 | 44 |
</ul> |
| 45 | 45 |
|
| 46 |
-<p>The <b>Specification</b> aims to give |
|
| 46 |
+<p>The <b>specification</b> aims to give |
|
| 47 | 47 |
developers enough information to build a compatible version of Tor:</p> |
| 48 | 48 |
<ul> |
| 49 | 49 |
<li><a href="cvs/tor/doc/tor-spec.txt">Main Tor specification</a></li> |
| ... | ... |
@@ -60,7 +60,7 @@ so secure. The more populous and diverse the user base for Tor is, |
| 60 | 60 |
the more your anonymity will be protected. |
| 61 | 61 |
</p> |
| 62 | 62 |
|
| 63 |
-<h3>Why We Need Tor</h3> |
|
| 63 |
+<h3>Why we need Tor</h3> |
|
| 64 | 64 |
|
| 65 | 65 |
<p> |
| 66 | 66 |
Using Tor protects you against a common form of Internet surveillance |
| ... | ... |
@@ -103,7 +103,7 @@ statistical techniques to track the communications patterns of many |
| 103 | 103 |
different organizations and individuals. |
| 104 | 104 |
</p> |
| 105 | 105 |
|
| 106 |
-<h3>The Solution: a Distributed, Anonymous Network</h3> |
|
| 106 |
+<h3>The solution: a distributed, anonymous network</h3> |
|
| 107 | 107 |
|
| 108 | 108 |
<p> |
| 109 | 109 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
| ... | ... |
@@ -128,9 +128,11 @@ separate set of encryption keys for each hop along the circuit to ensure |
| 128 | 128 |
that each hop can't see what these connections are as they pass through. |
| 129 | 129 |
</p> |
| 130 | 130 |
|
| 131 |
+<!-- |
|
| 131 | 132 |
<p> |
| 132 | 133 |
[Insert snazzy onion diagram here.] |
| 133 | 134 |
</p> |
| 135 |
+--> |
|
| 134 | 136 |
|
| 135 | 137 |
<p> |
| 136 | 138 |
Once a circuit has been established, many kinds of data can be exchanged |
| ... | ... |
@@ -149,7 +151,7 @@ new circuit, to keep people from linking your earlier actions to the new |
| 149 | 151 |
ones. |
| 150 | 152 |
</p> |
| 151 | 153 |
|
| 152 |
-<h3>Hidden Services</h3> |
|
| 154 |
+<h3>Hidden services</h3> |
|
| 153 | 155 |
|
| 154 | 156 |
<p> |
| 155 | 157 |
Tor also makes it possible for users to hide their locations while |
| ... | ... |
@@ -162,7 +164,7 @@ about censorship. Nobody would be able to determine who was offering |
| 162 | 164 |
the site, and nobody who offered the site would know who was posting to it. |
| 163 | 165 |
</p> |
| 164 | 166 |
|
| 165 |
-<h3>Staying Anonymous</h3> |
|
| 167 |
+<h3>Staying anonymous</h3> |
|
| 166 | 168 |
|
| 167 | 169 |
<p> |
| 168 | 170 |
Of course, Tor can't solve all anonymity problems. It focuses only on |
| ... | ... |
@@ -183,7 +185,7 @@ arriving at your chosen destination, he can use statistical analysis to |
| 183 | 185 |
discover that they are part of the same circuit. |
| 184 | 186 |
</p> |
| 185 | 187 |
|
| 186 |
-<h3>The Future of Tor</h3> |
|
| 188 |
+<h3>The future of Tor</h3> |
|
| 187 | 189 |
|
| 188 | 190 |
<p> |
| 189 | 191 |
Providing a usable anonymizing network on the Internet today is an |
| 190 | 192 |