add the tracing-users question
Roger Dingledine

Roger Dingledine commited on 2005-07-17 23:29:20
Zeige 1 geänderte Dateien mit 29 Einfügungen und 0 Löschungen.

... ...
@@ -291,6 +291,35 @@ the overall list of nodes in the network). </p>
291 291
 python script to parse the Tor directory <a
292 292
 href="/cvs/tor/contrib/exitlist">here</a>. </p>
293 293
 
294
+<a id="TracingUsers"></a>
295
+<h3><a class="anchor" href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></h3>
296
+
297
+<p>
298
+There is nothing the Tor developers can do to trace Tor users. The same
299
+protections that keep bad people from breaking Tor's anonymity also
300
+prevent us from figuring out what's going on.
301
+</p>
302
+
303
+<p>
304
+Some fans have suggested that we redesign Tor to include a <a
305
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Backdoor">backdoor</a>.
306
+There are two problems with this idea. First, it technically weakens the
307
+system too far. Having a central way to link users to their activities
308
+is a gaping hole for all sorts of attackers; and the policy mechanisms
309
+needed to ensure correct handling of this responsibility are enormous
310
+and unsolved. Second, the bad people <a href="#WhatAboutCriminals">aren't
311
+going to get caught by this anyway</a>, since they will use other means
312
+to ensure their anonymity (identity theft, compromising computers and
313
+using them as bounce points, etc).
314
+</p>
315
+
316
+<p>
317
+But remember that this doesn't mean that Tor is invulnerable. Traditional
318
+police techniques can still be very effective against Tor, such as
319
+interviewing suspects, surveillance and keyboard taps, writing style
320
+analysis, sting operations, and other physical investigations.
321
+</p>
322
+
294 323
 <a id="LegalQuestions"></a>
295 324
 <h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
296 325
 
297 326