Roger Dingledine commited on 2005-09-12 12:23:46
Zeige 1 geänderte Dateien mit 31 Einfügungen und 18 Löschungen.
... | ... |
@@ -58,30 +58,43 @@ privacy. |
58 | 58 |
</p> |
59 | 59 |
|
60 | 60 |
<p> |
61 |
-Individuals can use Tor to keep remote websites from tracking them and their |
|
62 |
-family members. |
|
63 |
-They can also use it to connect |
|
64 |
-to resources such as news sites or instant messaging services that are |
|
65 |
-blocked by their local Internet service providers (ISPs). |
|
61 |
+Individuals use Tor to keep websites from tracking them and their family |
|
62 |
+members, or to connect to news sites, instant messaging services, or the |
|
63 |
+like when these are blocked by their local Internet providers. Tor's <a |
|
64 |
+href="http://tor.eff.org/doc/tor-hidden-service.html">hidden services</a> |
|
65 |
+let users publish web sites and other services without needing to reveal |
|
66 |
+the location of the site. Individuals also use Tor for socially sensitive |
|
67 |
+communication: chat rooms and web forums for rape and abuse survivors, |
|
68 |
+or people with illnesses. |
|
66 | 69 |
</p> |
67 | 70 |
|
68 | 71 |
<p> |
69 |
-Groups such as Indymedia recommend Tor |
|
70 |
-for safeguarding their members' online privacy and security. Activist |
|
71 |
-groups like the Electronic Frontier Foundation (EFF) are supporting |
|
72 |
-Tor's development as a mechanism for maintaining civil liberties online. |
|
73 |
-Corporations are investigating Tor as a safe way to conduct competitive |
|
74 |
-analysis, and are considering using Tor to test new experimental projects |
|
75 |
-without associating their names with these projects. A branch of the |
|
76 |
-U.S. Navy uses Tor for open source intelligence gathering, and one of its |
|
77 |
-teams used Tor while deployed in the Middle East recently. |
|
72 |
+Journalists use Tor to communicate more safely with whistleblowers and |
|
73 |
+dissidents. Non-governmental organizations (NGOs) use Tor to allow their |
|
74 |
+workers to connect to their home website while they're in a foreign |
|
75 |
+country, without notifying everybody nearby that they're working with |
|
76 |
+that organization. |
|
78 | 77 |
</p> |
79 | 78 |
|
80 | 79 |
<p> |
81 |
-The variety of people who use Tor is actually part of what makes it |
|
82 |
-so secure. Tor hides you among the other users on the network, so the more |
|
83 |
-populous and diverse the user base for Tor is, |
|
84 |
-the more your anonymity will be protected. |
|
80 |
+Groups such as Indymedia recommend Tor for safeguarding their members' |
|
81 |
+online privacy and security. Activist groups like the Electronic Frontier |
|
82 |
+Foundation (EFF) are supporting Tor's development as a mechanism for |
|
83 |
+maintaining civil liberties online. Corporations use Tor as a safe way |
|
84 |
+to conduct competitive analysis, and to protect sensitive procurement |
|
85 |
+patterns from eavesdroppers. A branch of the U.S. Navy uses Tor for |
|
86 |
+open source intelligence gathering, and one of its teams used Tor |
|
87 |
+while deployed in the Middle East recently. Law enforcement uses Tor |
|
88 |
+for visiting or surveilling web sites without leaving government IP |
|
89 |
+addresses in their web logs. |
|
90 |
+</p> |
|
91 |
+ |
|
92 |
+<p> |
|
93 |
+The variety of people who use Tor is actually <a |
|
94 |
+href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes |
|
95 |
+it so secure</a>. Tor hides you among the other users on the network, |
|
96 |
+so the more populous and diverse the user base for Tor is, the more your |
|
97 |
+anonymity will be protected. |
|
85 | 98 |
</p> |
86 | 99 |
|
87 | 100 |
<h3>Why we need Tor</h3> |
88 | 101 |