Roger Dingledine commited on 2007-10-23 02:58:57
              Zeige 1 geänderte Dateien mit 4 Einfügungen und 15 Löschungen.
            
| ... | ... | 
                      @@ -25,21 +25,10 @@  | 
                  
| 25 | 25 | 
                        <hr />  | 
                    
| 26 | 26 | 
                         | 
                    
| 27 | 27 | 
                        <p>  | 
                    
| 28 | 
                        -Tor covers your tracks on the web. When you connect to the Internet from  | 
                    |
| 29 | 
                        -your computer, you leave a return address that's like a calling card,  | 
                    |
| 30 | 
                        -everywhere you go. Even if you don't log into a site with a username and  | 
                    |
| 31 | 
                        -password, you leave information on what IP address you came from and when.  | 
                    |
| 32 | 
                        -</p>  | 
                    |
| 33 | 
                        -  | 
                    |
| 34 | 
                        -<p>  | 
                    |
| 35 | 
                        -Since this is all the information that is usually needed to find out  | 
                    |
| 36 | 
                        -who was on the other end of the wire, marketers, governments, and other  | 
                    |
| 37 | 
                        -curious parties can trace you by tracing the activity associated with  | 
                    |
| 38 | 
                        -your IP address.  | 
                    |
| 39 | 
                        -</p>  | 
                    |
| 40 | 
                        -  | 
                    |
| 41 | 
                        -<p>  | 
                    |
| 42 | 
                        -Tor hides your IP address. It's like blocking your caller ID.  | 
                    |
| 28 | 
                        +Tor aims to defend against <a href="<page overview>">traffic analysis</a>,  | 
                    |
| 29 | 
                        +a form of network surveillance that threatens personal anonymity and  | 
                    |
| 30 | 
                        +privacy, confidential business activities and relationships, and state  | 
                    |
| 31 | 
                        +security.  | 
                    |
| 43 | 32 | 
                        </p>  | 
                    
| 44 | 33 | 
                         | 
                    
| 45 | 34 | 
                        <p>  | 
                    
| 46 | 35 |