finally wrap the rest of tor-doc into the overview
Roger Dingledine

Roger Dingledine commited on 2005-09-12 12:23:46
Zeige 1 geänderte Dateien mit 31 Einfügungen und 18 Löschungen.

... ...
@@ -58,30 +58,43 @@ privacy.
58 58
 </p>
59 59
 
60 60
 <p>
61
-Individuals can use Tor to keep remote websites from tracking them and their
62
-family members.
63
-They can also use it to connect
64
-to resources such as news sites or instant messaging services that are
65
-blocked by their local Internet service providers (ISPs).
61
+Individuals use Tor to keep websites from tracking them and their family
62
+members, or to connect to news sites, instant messaging services, or the
63
+like when these are blocked by their local Internet providers.  Tor's <a
64
+href="http://tor.eff.org/doc/tor-hidden-service.html">hidden services</a>
65
+let users publish web sites and other services without needing to reveal
66
+the location of the site. Individuals also use Tor for socially sensitive
67
+communication: chat rooms and web forums for rape and abuse survivors,
68
+or people with illnesses.
66 69
 </p>
67 70
 
68 71
 <p>
69
-Groups such as Indymedia recommend Tor
70
-for safeguarding their members' online privacy and security.  Activist
71
-groups like the Electronic Frontier Foundation (EFF) are supporting
72
-Tor's development as a mechanism for maintaining civil liberties online.
73
-Corporations are investigating Tor as a safe way to conduct competitive
74
-analysis, and are considering using Tor to test new experimental projects
75
-without associating their names with these projects. A branch of the
76
-U.S. Navy uses Tor for open source intelligence gathering, and one of its
77
-teams used Tor while deployed in the Middle East recently.
72
+Journalists use Tor to communicate more safely with whistleblowers and
73
+dissidents. Non-governmental organizations (NGOs) use Tor to allow their
74
+workers to connect to their home website while they're in a foreign
75
+country, without notifying everybody nearby that they're working with
76
+that organization.
78 77
 </p>
79 78
 
80 79
 <p>
81
-The variety of people who use Tor is actually part of what makes it
82
-so secure.  Tor hides you among the other users on the network, so the more
83
-populous and diverse the user base for Tor is,
84
-the more your anonymity will be protected.
80
+Groups such as Indymedia recommend Tor for safeguarding their members'
81
+online privacy and security. Activist groups like the Electronic Frontier
82
+Foundation (EFF) are supporting Tor's development as a mechanism for
83
+maintaining civil liberties online. Corporations use Tor as a safe way
84
+to conduct competitive analysis, and to protect sensitive procurement
85
+patterns from eavesdroppers.  A branch of the U.S. Navy uses Tor for
86
+open source intelligence gathering, and one of its teams used Tor
87
+while deployed in the Middle East recently. Law enforcement uses Tor
88
+for visiting or surveilling web sites without leaving government IP
89
+addresses in their web logs.
90
+</p>
91
+
92
+<p>
93
+The variety of people who use Tor is actually <a
94
+href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
95
+it so secure</a>.  Tor hides you among the other users on the network,
96
+so the more populous and diverse the user base for Tor is, the more your
97
+anonymity will be protected.
85 98
 </p>
86 99
 
87 100
 <h3>Why we need Tor</h3>
88 101