Roger Dingledine commited on 2005-10-22 00:17:52
Zeige 3 geänderte Dateien mit 54 Einfügungen und 50 Löschungen.
... | ... |
@@ -10,9 +10,11 @@ |
10 | 10 |
<br /> |
11 | 11 |
|
12 | 12 |
<a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a> |
13 |
+<!-- |
|
13 | 14 |
<div class="donatebutton"> |
14 | 15 |
<a href="http://secure.eff.org/tor">Support Tor by giving to EFF</a> |
15 | 16 |
</div> |
17 |
+--> |
|
16 | 18 |
<div class="donatebutton"> |
17 | 19 |
<a href="gui/">Want a better Tor GUI?</a> |
18 | 20 |
</div> |
... | ... |
@@ -38,65 +40,60 @@ built-in anonymity, safety, and privacy features. |
38 | 40 |
<p> |
39 | 41 |
Your traffic is safer when you use Tor, because communications |
40 | 42 |
are bounced around a distributed network of servers, called |
41 |
-<a href="<page overview>">onion routers</a>. Instead of taking a direct |
|
42 |
-route from source to destination, data packets on the Tor network take a |
|
43 |
-random pathway through several servers that cover your tracks so no observer |
|
44 |
-at any single point can tell where the data came from or where it's going. |
|
45 |
-This makes it hard for |
|
46 |
-recipients, observers, and even the onion routers themselves to figure |
|
47 |
-out who and where you are. Tor's technology aims to provide Internet |
|
48 |
-users with protection against "traffic analysis," a form of |
|
49 |
-network surveillance that threatens personal anonymity and privacy, |
|
50 |
-confidential business activities and relationships, and state security. |
|
43 |
+<a href="<page overview>">onion routers</a>. |
|
44 |
+Tor's technology aims to provide Internet users with protection against |
|
45 |
+"traffic analysis," a form of network surveillance that threatens personal |
|
46 |
+anonymity and privacy, confidential business activities and relationships, |
|
47 |
+and state security. |
|
51 | 48 |
</p> |
52 | 49 |
|
53 | 50 |
<p> |
54 |
-Traffic analysis is used every day by companies, governments, and |
|
55 |
-individuals that want to keep track of where people and organizations go |
|
56 |
-and what they do on the Internet. Instead of looking at the content of |
|
57 |
-your communications, traffic analysis tracks where your data goes and |
|
58 |
-when, as well as how much is sent. For example, online advertising |
|
59 |
-companies like Fastclick and Doubleclick use traffic analysis to record |
|
60 |
-what web pages you've visited, and can build a profile of your interests |
|
61 |
-from that. A pharmaceutical company could use traffic analysis to monitor |
|
62 |
-when the research wing of a competitor visits its website, and track |
|
63 |
-what pages or products that interest the competitor. IBM hosts a |
|
64 |
-searchable patent index, and it could keep a list of every query your |
|
65 |
-company makes. A stalker could use traffic analysis to learn whether |
|
66 |
-you're in a certain Internet cafe. |
|
51 |
+Instead of looking at the content of your communications, traffic analysis |
|
52 |
+tracks where your data goes and when, as well as how much is sent. |
|
53 |
+<!-- |
|
54 |
+For example, online advertising companies like Doubleclick use traffic |
|
55 |
+analysis to record what web pages you've visited, and can build a |
|
56 |
+profile of your interests from that. A pharmaceutical company could |
|
57 |
+use traffic analysis to monitor when the research wing of a competitor |
|
58 |
+visits its website, and track what pages or products that interest the |
|
59 |
+competitor. IBM hosts a searchable patent index, and it could keep a list |
|
60 |
+of every query your company makes. A stalker could use traffic analysis |
|
61 |
+to learn whether you're in a certain Internet cafe. |
|
67 | 62 |
</p> |
68 | 63 |
|
69 | 64 |
<p> |
70 |
-Tor aims to make traffic analysis more difficult by preventing |
|
71 |
-eavesdroppers from finding out where your communications are going |
|
72 |
-online, and by letting you decide whether to identify yourself when |
|
73 |
-you communicate. |
|
65 |
+--> |
|
66 |
+Tor aims to make traffic analysis more difficult by preventing websites, |
|
67 |
+eavesdroppers, and even the onion routers themselves from tracing your |
|
68 |
+communications online. This means Tor lets you decide whether to identify |
|
69 |
+yourself when you communicate. |
|
74 | 70 |
</p> |
75 | 71 |
|
76 | 72 |
<p> |
77 | 73 |
Tor's security is improved as its user base grows and as |
78 | 74 |
more people volunteer to run servers. Please consider |
79 |
-<a href="<page documentation>">installing it</a> and then |
|
80 |
-<a href="<cvssandbox>tor/doc/tor-doc-server.html">helping out</a>. |
|
81 |
-</p> |
|
82 |
- |
|
83 |
-<p> |
|
84 |
-Part of the goal of the Tor project is to deploy a public testbed for |
|
85 |
-experimenting with design trade-offs, to teach us how best to provide |
|
86 |
-privacy online. We welcome research into the security of Tor and related |
|
87 |
-anonymity systems, and want to hear about any vulnerabilities you find. |
|
88 |
-</p> |
|
89 |
- |
|
90 |
-<p> |
|
91 |
-Tor is an important piece of building more safety, privacy, and anonymity |
|
92 |
-online, but it is not a complete solution. |
|
75 |
+<a href="<page volunteer>">volunteering your time</a> or |
|
76 |
+<a href="<cvssandbox>tor/doc/tor-doc-server.html">volunteering your bandwidth</a>. |
|
93 | 77 |
And remember that this is development code—it's not a good idea to rely |
94 | 78 |
on the current Tor network if you really need strong anonymity. |
79 |
+</p> |
|
80 |
+ |
|
81 |
+<p><b>We are now actively looking for new sponsors and funders.</b> |
|
82 |
+The Tor project was launched by <a href="http://freehaven.net/">The Free |
|
83 |
+Haven Project</a> in 2002. In the past, Tor development was funded |
|
84 |
+by contracts with the <a href="http://www.nrl.navy.mil/">Naval |
|
85 |
+Research Lab</a> (inventor of onion routing) and the <a |
|
86 |
+href="http://www.eff.org/">Electronic Frontier Foundation</a> (who still |
|
87 |
+kindly hosts our website). Sponsors of Tor get personal attention, |
|
88 |
+better support, publicity (if they want it), and get to influence the |
|
89 |
+direction of our research and development! |
|
95 | 90 |
</p> |
96 | 91 |
|
97 | 92 |
</div><!-- #main --> |
98 | 93 |
|
99 |
-<a href="http://secure.eff.org/tor"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development is supported by EFF" /></a> |
|
100 |
-<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development is supported by ONR" /></a> |
|
94 |
+<!-- |
|
95 |
+<a href="http://www.eff.org/"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development has been supported by EFF" /></a> |
|
96 |
+<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development has been supported by ONR" /></a> |
|
97 |
+--> |
|
101 | 98 |
|
102 | 99 |
#include <foot.wmi> |
... | ... |
@@ -8,8 +8,8 @@ |
8 | 8 |
<h2>Tor: People</h2> |
9 | 9 |
<hr /> |
10 | 10 |
|
11 |
-<p>Tor is managed by <a href="http://freehaven.net/">The Free |
|
12 |
-Haven Project</a> as a building block for |
|
11 |
+<p>The Tor Project is managed by <a href="http://freehaven.net/">The |
|
12 |
+Free Haven Project</a> as a building block for |
|
13 | 13 |
a robust censorship-resistant data haven. It is developed by <a |
14 | 14 |
href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a |
15 | 15 |
href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from |
... | ... |
@@ -24,8 +24,14 @@ href="http://www.syverson.org/">Paul Syverson</a> and based on the |
24 | 24 |
original <a href="http://www.onion-router.net/">onion routing</a> idea |
25 | 25 |
developed there.</p> |
26 | 26 |
|
27 |
-<p>Since November 2004, Tor development has been supported by the <a |
|
28 |
-href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p> |
|
27 |
+<p>From late 2004 to late 2005, Tor development was supported by |
|
28 |
+the <a href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p> |
|
29 |
+ |
|
30 |
+<p><b>We are now actively looking for new contracts and funders.</b> |
|
31 |
+Sponsors of Tor get personal attention, better support, publicity |
|
32 |
+(if they want it), and get to influence the direction of our research |
|
33 |
+and development! |
|
34 |
+</p> |
|
29 | 35 |
|
30 | 36 |
</div><!-- #main --> |
31 | 37 |
|
... | ... |
@@ -21,9 +21,10 @@ come up with ideas or designs to contribute to making Tor's interface |
21 | 21 |
and usability better. Free T-shirt for each submission!</li> |
22 | 22 |
<li> Tell your friends! Get them to run servers. Get them to run hidden |
23 | 23 |
services. Get them to tell their friends.</li> |
24 |
-<li> Consider joining the <a href="http://secure.eff.org/tor">Electronic |
|
25 |
-Frontier Foundation</a>. More EFF donations means more freedom in the |
|
26 |
-world, including more Tor development.</li> |
|
24 |
+<li> We are looking for funders and sponsors. Take a look at the |
|
25 |
+ <a href="<page people>">people page</a>, and if you know any |
|
26 |
+ companies, NGOs, or other organizations that want communications |
|
27 |
+ security, let them know about us.</li> |
|
27 | 28 |
</ol> |
28 | 29 |
|
29 | 30 |
<h2>Installers</h2> |
30 | 31 |