Andrew Lewman commited on 2010-09-16 18:20:47
              Zeige 3 geänderte Dateien mit 71 Einfügungen und 0 Löschungen.
            
| ... | ... | 
                      @@ -0,0 +1,70 @@  | 
                  
| 1 | 
                        +## translation metadata  | 
                    |
| 2 | 
                        +# Revision: $Revision: 22100 $  | 
                    |
| 3 | 
                        +# Translation-Priority: 4-optional  | 
                    |
| 4 | 
                        +  | 
                    |
| 5 | 
                        +#include "head.wmi" TITLE="Ten Things to Look for in a Circumvention Tool" CHARSET="UTF-8"  | 
                    |
| 6 | 
                        +  | 
                    |
| 7 | 
                        +<div class="main-column">  | 
                    |
| 8 | 
                        +  | 
                    |
| 9 | 
                        +<!-- PUT CONTENT AFTER THIS TAG -->  | 
                    |
| 10 | 
                        +  | 
                    |
| 11 | 
                        +<h2>FOR IMMEDIATE RELEASE</h2>  | 
                    |
| 12 | 
                        +  | 
                    |
| 13 | 
                        +<h2><strong>TOR PROJECT RELEASES CIRCUMVENTION TOOL ARTICLE</strong></h2>  | 
                    |
| 14 | 
                        +  | 
                    |
| 15 | 
                        +<p><strong>WALPOLE, MA</strong> The Tor Project releases an article about  | 
                    |
| 16 | 
                        +the <a href="/press/presskit/2010-09-16-circumvention-features.pdf">"Ten  | 
                    |
| 17 | 
                        +Things to Look for in a Circumvention Tool"</a>. As more countries  | 
                    |
| 18 | 
                        +crack down on Internet use, people around the world are turning to  | 
                    |
| 19 | 
                        +anti-censorship software that lets them reach blocked websites. Many  | 
                    |
| 20 | 
                        +types of software, also known as circumvention tools, have been created  | 
                    |
| 21 | 
                        +to answer the threat to freedom online. These tools provide different  | 
                    |
| 22 | 
                        +features and levels of security, and it's important for users to  | 
                    |
| 23 | 
                        +understand the tradeoffs.</p>  | 
                    |
| 24 | 
                        +  | 
                    |
| 25 | 
                        +<p>This article lays out ten features you should consider when evaluating  | 
                    |
| 26 | 
                        +a circumvention tool. The goal isn't to advocate for any specific  | 
                    |
| 27 | 
                        +tool, but to point out what kind of tools are useful for different  | 
                    |
| 28 | 
                        +situations.</p>  | 
                    |
| 29 | 
                        +  | 
                    |
| 30 | 
                        +<p>Tor's tools and technologies are already used by millions of people  | 
                    |
| 31 | 
                        +to protect their activities online. These users include journalists and  | 
                    |
| 32 | 
                        +human rights workers in politically rigid countries communicating with  | 
                    |
| 33 | 
                        +whistleblowers and dissidents. Law enforcement officers on Internet  | 
                    |
| 34 | 
                        +sting operations stay anonymous with Tor, as do people wanting to post  | 
                    |
| 35 | 
                        +socially sensitive information in chat rooms, like rape or abuse survivors  | 
                    |
| 36 | 
                        +and those with illnesses. The Tor network also provides protection  | 
                    |
| 37 | 
                        +for people looking for another layer of privacy from the millions of  | 
                    |
| 38 | 
                        +websites and ISPs bent on collecting private information and tracking  | 
                    |
| 39 | 
                        +their moves online.</p>  | 
                    |
| 40 | 
                        +  | 
                    |
| 41 | 
                        +<h2>ABOUT THE TOR PROJECT</h2>  | 
                    |
| 42 | 
                        +  | 
                    |
| 43 | 
                        +<p>Based in Walpole, MA, The Tor Project develops free and open-source  | 
                    |
| 44 | 
                        +software that provides online anonymity to the everyday Internet  | 
                    |
| 45 | 
                        +user. Tor was born out of a collaboration with the U.S. Naval Research  | 
                    |
| 46 | 
                        +Lab starting in 2001, and it became an official U.S. 501(c)(3) non-profit  | 
                    |
| 47 | 
                        +in 2006. The Tor Project now works with many individuals, NGOs, law  | 
                    |
| 48 | 
                        +enforcement agencies, and businesses globally to help them protect their  | 
                    |
| 49 | 
                        +anonymity online.</p>  | 
                    |
| 50 | 
                        +  | 
                    |
| 51 | 
                        +<p>In addition to its efforts developing and maintaining the Tor anonymity  | 
                    |
| 52 | 
                        +software and the Tor network, The Tor Project also helps to lead the  | 
                    |
| 53 | 
                        +research community in understanding how to build and measure scalable and  | 
                    |
| 54 | 
                        +secure anonymity networks. The Tor developers publish several new research  | 
                    |
| 55 | 
                        +papers each year in major academic security conferences, and just about  | 
                    |
| 56 | 
                        +every major security conference these days includes a Tor-related paper.  | 
                    |
| 57 | 
                        +Tor is a project-funded organization with a staff of 15.</p>  | 
                    |
| 58 | 
                        +  | 
                    |
| 59 | 
                        +<p>The "Onion Logo" and "Tor" wordmark are registered trademarks  | 
                    |
| 60 | 
                        +of The Tor Project, Inc.</p>  | 
                    |
| 61 | 
                        +  | 
                    |
| 62 | 
                        +<p>Contact: Andrew Lewman</p>  | 
                    |
| 63 | 
                        +<p>Tel: +1-781-424-9877</p>  | 
                    |
| 64 | 
                        +<p>Email: execdir@torproject.org</p>  | 
                    |
| 65 | 
                        +<p><a href="https://www.torproject.org/">Website: Tor Project</a></p>  | 
                    |
| 66 | 
                        +<div align=center>###</div>  | 
                    |
| 67 | 
                        +  | 
                    |
| 68 | 
                        +</div><!-- #main -->  | 
                    |
| 69 | 
                        +  | 
                    |
| 70 | 
                        +#include <foot.wmi>  | 
                    
| ... | ... | 
                      @@ -24,6 +24,7 @@ execdir@torproject.org  | 
                  
| 24 | 24 | 
                         | 
                    
| 25 | 25 | 
                        <h3>Press Releases</h3>  | 
                    
| 26 | 26 | 
                        <ul>  | 
                    
| 27 | 
                        +<li>16 September 1010. Tor announces an article discussing <a href="<page press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look for in a Circumvention Tool</a>.</li>  | 
                    |
| 27 | 28 | 
                        <li>25 March 2010. Tor and Printfection launch <a href="<page press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</li>  | 
                    
| 28 | 29 | 
                        <li>12 March 2009. Tor launches a <a href="<page press/2009-03-12-performance-roadmap-press-release>">performance roadmap</a> and campaign.</li>  | 
                    
| 29 | 30 | 
                        <li>19 December 2008. Tor announces 3-year <a href="<page  |