Roger Dingledine commited on 2004-12-15 00:44:42
Zeige 4 geänderte Dateien mit 14 Einfügungen und 10 Löschungen.
... | ... |
@@ -42,9 +42,11 @@ |
42 | 42 |
to Tor-ifying various applications</a> |
43 | 43 |
</p> |
44 | 44 |
|
45 |
+<!-- |
|
45 | 46 |
<p> |
46 | 47 |
<a href="">What are the command-line and torrc config options?</a> |
47 | 48 |
</p> |
49 |
+--> |
|
48 | 50 |
|
49 | 51 |
<p> |
50 | 52 |
<a href="http://wiki.noreply.org/wiki/TheOnionRouter_2fTorInChroot">Running Tor |
... | ... |
@@ -64,8 +64,8 @@ Old releases are <a href="dist/obsolete/">here</a>. |
64 | 64 |
</p> |
65 | 65 |
|
66 | 66 |
<p><b>Red Hat packages</b> are not available yet. We have a <a |
67 |
-href="cvs/tor/tor.spec.in">spec file</a> but we're not sure if it's any |
|
68 |
-good. Please help. |
|
67 |
+href="cvs/tor/tor.spec.in">spec file</a>, and we plan to start making |
|
68 |
+rpms available soon. |
|
69 | 69 |
</p> |
70 | 70 |
|
71 | 71 |
<p><b>Debian packages</b> have been uploaded to unstable, |
... | ... |
@@ -26,7 +26,7 @@ |
26 | 26 |
<h2>Tor: How it works</h2> |
27 | 27 |
|
28 | 28 |
<p> |
29 |
-<a href="overview.html">Basic Tor Overview</a>: what Tor provides, why it |
|
29 |
+<a href="overview.html">Basic Tor overview</a>: what Tor provides, why it |
|
30 | 30 |
matters, how it works. |
31 | 31 |
</p> |
32 | 32 |
|
... | ... |
@@ -35,7 +35,7 @@ matters, how it works. |
35 | 35 |
configuring, and running Tor</a>. |
36 | 36 |
</p> |
37 | 37 |
|
38 |
-<p>The <b>Design Document</b> (published at Usenix |
|
38 |
+<p>The <b>design document</b> (published at Usenix |
|
39 | 39 |
Security 2004) gives our justifications and security analysis for the |
40 | 40 |
Tor design:</p> |
41 | 41 |
<ul> |
... | ... |
@@ -43,7 +43,7 @@ Tor design:</p> |
43 | 43 |
<li><a href="cvs/tor/doc/design-paper/tor-design.html">HTML version</a></li> |
44 | 44 |
</ul> |
45 | 45 |
|
46 |
-<p>The <b>Specification</b> aims to give |
|
46 |
+<p>The <b>specification</b> aims to give |
|
47 | 47 |
developers enough information to build a compatible version of Tor:</p> |
48 | 48 |
<ul> |
49 | 49 |
<li><a href="cvs/tor/doc/tor-spec.txt">Main Tor specification</a></li> |
... | ... |
@@ -60,7 +60,7 @@ so secure. The more populous and diverse the user base for Tor is, |
60 | 60 |
the more your anonymity will be protected. |
61 | 61 |
</p> |
62 | 62 |
|
63 |
-<h3>Why We Need Tor</h3> |
|
63 |
+<h3>Why we need Tor</h3> |
|
64 | 64 |
|
65 | 65 |
<p> |
66 | 66 |
Using Tor protects you against a common form of Internet surveillance |
... | ... |
@@ -103,7 +103,7 @@ statistical techniques to track the communications patterns of many |
103 | 103 |
different organizations and individuals. |
104 | 104 |
</p> |
105 | 105 |
|
106 |
-<h3>The Solution: a Distributed, Anonymous Network</h3> |
|
106 |
+<h3>The solution: a distributed, anonymous network</h3> |
|
107 | 107 |
|
108 | 108 |
<p> |
109 | 109 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
... | ... |
@@ -128,9 +128,11 @@ separate set of encryption keys for each hop along the circuit to ensure |
128 | 128 |
that each hop can't see what these connections are as they pass through. |
129 | 129 |
</p> |
130 | 130 |
|
131 |
+<!-- |
|
131 | 132 |
<p> |
132 | 133 |
[Insert snazzy onion diagram here.] |
133 | 134 |
</p> |
135 |
+--> |
|
134 | 136 |
|
135 | 137 |
<p> |
136 | 138 |
Once a circuit has been established, many kinds of data can be exchanged |
... | ... |
@@ -149,7 +151,7 @@ new circuit, to keep people from linking your earlier actions to the new |
149 | 151 |
ones. |
150 | 152 |
</p> |
151 | 153 |
|
152 |
-<h3>Hidden Services</h3> |
|
154 |
+<h3>Hidden services</h3> |
|
153 | 155 |
|
154 | 156 |
<p> |
155 | 157 |
Tor also makes it possible for users to hide their locations while |
... | ... |
@@ -162,7 +164,7 @@ about censorship. Nobody would be able to determine who was offering |
162 | 164 |
the site, and nobody who offered the site would know who was posting to it. |
163 | 165 |
</p> |
164 | 166 |
|
165 |
-<h3>Staying Anonymous</h3> |
|
167 |
+<h3>Staying anonymous</h3> |
|
166 | 168 |
|
167 | 169 |
<p> |
168 | 170 |
Of course, Tor can't solve all anonymity problems. It focuses only on |
... | ... |
@@ -183,7 +185,7 @@ arriving at your chosen destination, he can use statistical analysis to |
183 | 185 |
discover that they are part of the same circuit. |
184 | 186 |
</p> |
185 | 187 |
|
186 |
-<h3>The Future of Tor</h3> |
|
188 |
+<h3>The future of Tor</h3> |
|
187 | 189 |
|
188 | 190 |
<p> |
189 | 191 |
Providing a usable anonymizing network on the Internet today is an |
190 | 192 |