Roger Dingledine commited on 2005-09-12 12:23:46
Zeige 1 geänderte Dateien mit 31 Einfügungen und 18 Löschungen.
| ... | ... |
@@ -58,30 +58,43 @@ privacy. |
| 58 | 58 |
</p> |
| 59 | 59 |
|
| 60 | 60 |
<p> |
| 61 |
-Individuals can use Tor to keep remote websites from tracking them and their |
|
| 62 |
-family members. |
|
| 63 |
-They can also use it to connect |
|
| 64 |
-to resources such as news sites or instant messaging services that are |
|
| 65 |
-blocked by their local Internet service providers (ISPs). |
|
| 61 |
+Individuals use Tor to keep websites from tracking them and their family |
|
| 62 |
+members, or to connect to news sites, instant messaging services, or the |
|
| 63 |
+like when these are blocked by their local Internet providers. Tor's <a |
|
| 64 |
+href="http://tor.eff.org/doc/tor-hidden-service.html">hidden services</a> |
|
| 65 |
+let users publish web sites and other services without needing to reveal |
|
| 66 |
+the location of the site. Individuals also use Tor for socially sensitive |
|
| 67 |
+communication: chat rooms and web forums for rape and abuse survivors, |
|
| 68 |
+or people with illnesses. |
|
| 66 | 69 |
</p> |
| 67 | 70 |
|
| 68 | 71 |
<p> |
| 69 |
-Groups such as Indymedia recommend Tor |
|
| 70 |
-for safeguarding their members' online privacy and security. Activist |
|
| 71 |
-groups like the Electronic Frontier Foundation (EFF) are supporting |
|
| 72 |
-Tor's development as a mechanism for maintaining civil liberties online. |
|
| 73 |
-Corporations are investigating Tor as a safe way to conduct competitive |
|
| 74 |
-analysis, and are considering using Tor to test new experimental projects |
|
| 75 |
-without associating their names with these projects. A branch of the |
|
| 76 |
-U.S. Navy uses Tor for open source intelligence gathering, and one of its |
|
| 77 |
-teams used Tor while deployed in the Middle East recently. |
|
| 72 |
+Journalists use Tor to communicate more safely with whistleblowers and |
|
| 73 |
+dissidents. Non-governmental organizations (NGOs) use Tor to allow their |
|
| 74 |
+workers to connect to their home website while they're in a foreign |
|
| 75 |
+country, without notifying everybody nearby that they're working with |
|
| 76 |
+that organization. |
|
| 78 | 77 |
</p> |
| 79 | 78 |
|
| 80 | 79 |
<p> |
| 81 |
-The variety of people who use Tor is actually part of what makes it |
|
| 82 |
-so secure. Tor hides you among the other users on the network, so the more |
|
| 83 |
-populous and diverse the user base for Tor is, |
|
| 84 |
-the more your anonymity will be protected. |
|
| 80 |
+Groups such as Indymedia recommend Tor for safeguarding their members' |
|
| 81 |
+online privacy and security. Activist groups like the Electronic Frontier |
|
| 82 |
+Foundation (EFF) are supporting Tor's development as a mechanism for |
|
| 83 |
+maintaining civil liberties online. Corporations use Tor as a safe way |
|
| 84 |
+to conduct competitive analysis, and to protect sensitive procurement |
|
| 85 |
+patterns from eavesdroppers. A branch of the U.S. Navy uses Tor for |
|
| 86 |
+open source intelligence gathering, and one of its teams used Tor |
|
| 87 |
+while deployed in the Middle East recently. Law enforcement uses Tor |
|
| 88 |
+for visiting or surveilling web sites without leaving government IP |
|
| 89 |
+addresses in their web logs. |
|
| 90 |
+</p> |
|
| 91 |
+ |
|
| 92 |
+<p> |
|
| 93 |
+The variety of people who use Tor is actually <a |
|
| 94 |
+href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes |
|
| 95 |
+it so secure</a>. Tor hides you among the other users on the network, |
|
| 96 |
+so the more populous and diverse the user base for Tor is, the more your |
|
| 97 |
+anonymity will be protected. |
|
| 85 | 98 |
</p> |
| 86 | 99 |
|
| 87 | 100 |
<h3>Why we need Tor</h3> |
| 88 | 101 |