Roger Dingledine commited on 2007-10-23 02:58:57
Zeige 1 geänderte Dateien mit 4 Einfügungen und 15 Löschungen.
... | ... |
@@ -25,21 +25,10 @@ |
25 | 25 |
<hr /> |
26 | 26 |
|
27 | 27 |
<p> |
28 |
-Tor covers your tracks on the web. When you connect to the Internet from |
|
29 |
-your computer, you leave a return address that's like a calling card, |
|
30 |
-everywhere you go. Even if you don't log into a site with a username and |
|
31 |
-password, you leave information on what IP address you came from and when. |
|
32 |
-</p> |
|
33 |
- |
|
34 |
-<p> |
|
35 |
-Since this is all the information that is usually needed to find out |
|
36 |
-who was on the other end of the wire, marketers, governments, and other |
|
37 |
-curious parties can trace you by tracing the activity associated with |
|
38 |
-your IP address. |
|
39 |
-</p> |
|
40 |
- |
|
41 |
-<p> |
|
42 |
-Tor hides your IP address. It's like blocking your caller ID. |
|
28 |
+Tor aims to defend against <a href="<page overview>">traffic analysis</a>, |
|
29 |
+a form of network surveillance that threatens personal anonymity and |
|
30 |
+privacy, confidential business activities and relationships, and state |
|
31 |
+security. |
|
43 | 32 |
</p> |
44 | 33 |
|
45 | 34 |
<p> |
46 | 35 |