Andrew Lewman commited on 2010-09-21 16:22:09
Zeige 1 geänderte Dateien mit 18 Einfügungen und 11 Löschungen.
... | ... |
@@ -66,7 +66,7 @@ you have a bug, especially a crash bug, read <a |
66 | 66 |
href="<wiki>TorFAQ#MyTorkeepscrashing.">how |
67 | 67 |
to report a Tor bug</a> first and then tell us as much information |
68 | 68 |
about it as you can in |
69 |
-<a href="https://bugs.torproject.org/tor">our bugtracker</a>. |
|
69 |
+<a href="<wiki>">our bugtracker</a>. |
|
70 | 70 |
(If your bug is |
71 | 71 |
with Polipo, your browser, or some other application, please don't put |
72 | 72 |
it in our bugtracker.) The |
... | ... |
@@ -80,7 +80,7 @@ We try to keep it updated every week or two with the latest news. |
80 | 80 |
|
81 | 81 |
<li> |
82 | 82 |
Download and watch Roger's overview talk from What The Hack (<a |
83 |
-href="http://freehaven.net/~arma/wth-anonymous-communication-58.mp4">video</a>, |
|
83 |
+href="http://media.torproject.org/video/wth-anonymous-communication-58.mp4">video</a>, |
|
84 | 84 |
<a href="http://freehaven.net/~arma/wth1.pdf">slides</a>, <a |
85 | 85 |
href="http://wiki.whatthehack.org/index.php/Anonymous_communication_for_the_United_States_Department_of_Defense...and_you">abstract</a>). |
86 | 86 |
This talk was given in July 2005, back when we were funded by EFF and back |
... | ... |
@@ -96,7 +96,7 @@ how Tor is built. |
96 | 96 |
|
97 | 97 |
<li> |
98 | 98 |
There's a skeletal <a |
99 |
-href="https://svn.torproject.org/svn/projects/roadmaps/2008-12-19-roadmap-full.pdf">list |
|
99 |
+href="<page press/presskit/2008-12-19-roadmap-full.pdf>">list |
|
100 | 100 |
of items we'd like to tackle in the future</a>. Alas, many of those |
101 | 101 |
items need to be fleshed out more before they'll make sense to people |
102 | 102 |
who aren't Tor developers, but you can still get a general sense of |
... | ... |
@@ -110,27 +110,27 @@ href="http://freehaven.net/~arma/Defcon15-Mathewson-Technical_Changes_since_you_ |
110 | 110 |
href="http://freehaven.net/~nickm/slides/Defcon07/TorChanges.pdf">slides</a>), |
111 | 111 |
Roger's "blocking-resistance |
112 | 112 |
and circumvention" talk from 23C3 in December 2006 (<a |
113 |
-href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>, |
|
113 |
+href="http://media.torproject.org/video/23C3-1444-en-tor_and_china.m4v">video</a>, |
|
114 | 114 |
<a href="http://freehaven.net/~arma/slides-23c3.pdf">slides</a>, |
115 | 115 |
<a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>, |
116 | 116 |
<a href="https://svn.torproject.org/svn/projects/design-paper/blocking.html">design paper</a>), |
117 | 117 |
and Roger's "Current events in 2007" talk from 24C3 in December |
118 |
-2007 (<a |
|
119 |
-href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">video</a>, |
|
120 |
-<a href="http://freehaven.net/~arma/slides-24c3.pdf">slides</a>, |
|
118 |
+2007 (<a href="http://media.torproject.org/video/24c3-2325-en-current_events_in_tor_development.mp4">video</a>, |
|
119 |
+<a href="https://svn.torproject.org/svn/projects/presentations/slides-24c3.pdf">slides</a>, |
|
121 | 120 |
<a href="http://events.ccc.de/congress/2007/Fahrplan/events/2325.en.html">abstract</a>). |
122 | 121 |
We also have the What The Hack tutorial on hidden services (<a |
123 |
-href="http://freehaven.net/~arma/wth_tor_hidden_services.mp4">video</a>, |
|
122 |
+href="http://media.torproject.org/video/wth_tor_hidden_services.mp4">video</a>, |
|
124 | 123 |
<a href="http://freehaven.net/~arma/wth3.pdf">slides</a>). |
125 | 124 |
</li> |
126 | 125 |
|
127 | 126 |
<li> |
128 | 127 |
See Mike's "Securing the Tor network" talk from Defcon in July 2007 |
129 |
-(<a href="http://freehaven.net/~arma/Defcon15-Mike_Perry-Securing_the_Tor_Network.mp4">video</a>, |
|
128 |
+(<a |
|
129 |
+href="http://media.torproject.org/video/Defcon15-Mike_Perry-Securing_the_Tor_Network.mp4">video</a>, |
|
130 | 130 |
<a href="http://freehaven.net/~arma/SecuringTheTorNetwork.pdf">slides</a>). |
131 | 131 |
It describes common ways to attack networks like Tor and how we try |
132 | 132 |
to defend against them, and it introduces the <a |
133 |
-href="https://svn.torproject.org/svn/torflow/trunk/README">Torflow</a> |
|
133 |
+href="<gitblob>torflow.git/blob_plain/HEAD:/README">Torflow</a> |
|
134 | 134 |
script collection. |
135 | 135 |
</li> |
136 | 136 |
|
... | ... |
@@ -142,12 +142,19 @@ href="<gittree>doc/spec/proposals">existing proposals</a>. |
142 | 142 |
</li> |
143 | 143 |
|
144 | 144 |
<li> |
145 |
-Our <a href="<gitblob>doc/TODO">developer TODO file</a> starts with a |
|
145 |
+Our <a href="<wiki>wiki/projects">project list</a> starts with a |
|
146 | 146 |
timeline for external promises — things <a href="<page sponsors>">our |
147 | 147 |
sponsors</a> have paid to see done. It also lists many other tasks |
148 | 148 |
and topics we'd like to tackle next. |
149 | 149 |
</li> |
150 | 150 |
|
151 |
+<li> |
|
152 |
+Through funding from the National Science Foundation, we maintain |
|
153 |
+analysis, statistics, and provide the raw data of the Tor network from |
|
154 |
+2004 to today at <a href="https://metrics.torproject.org/">The Tor Metrics</a> |
|
155 |
+site. |
|
156 |
+</li> |
|
157 |
+ |
|
151 | 158 |
<li> |
152 | 159 |
Once you're up to speed, things will continue to change surprisingly fast. |
153 | 160 |
The <a href="#MailingLists">or-dev mailing list</a> is where the complex |
154 | 161 |