Roger Dingledine commited on 2005-10-22 00:17:52
Zeige 3 geänderte Dateien mit 54 Einfügungen und 50 Löschungen.
| ... | ... |
@@ -10,9 +10,11 @@ |
| 10 | 10 |
<br /> |
| 11 | 11 |
|
| 12 | 12 |
<a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a> |
| 13 |
+<!-- |
|
| 13 | 14 |
<div class="donatebutton"> |
| 14 | 15 |
<a href="http://secure.eff.org/tor">Support Tor by giving to EFF</a> |
| 15 | 16 |
</div> |
| 17 |
+--> |
|
| 16 | 18 |
<div class="donatebutton"> |
| 17 | 19 |
<a href="gui/">Want a better Tor GUI?</a> |
| 18 | 20 |
</div> |
| ... | ... |
@@ -38,65 +40,60 @@ built-in anonymity, safety, and privacy features. |
| 38 | 40 |
<p> |
| 39 | 41 |
Your traffic is safer when you use Tor, because communications |
| 40 | 42 |
are bounced around a distributed network of servers, called |
| 41 |
-<a href="<page overview>">onion routers</a>. Instead of taking a direct |
|
| 42 |
-route from source to destination, data packets on the Tor network take a |
|
| 43 |
-random pathway through several servers that cover your tracks so no observer |
|
| 44 |
-at any single point can tell where the data came from or where it's going. |
|
| 45 |
-This makes it hard for |
|
| 46 |
-recipients, observers, and even the onion routers themselves to figure |
|
| 47 |
-out who and where you are. Tor's technology aims to provide Internet |
|
| 48 |
-users with protection against "traffic analysis," a form of |
|
| 49 |
-network surveillance that threatens personal anonymity and privacy, |
|
| 50 |
-confidential business activities and relationships, and state security. |
|
| 43 |
+<a href="<page overview>">onion routers</a>. |
|
| 44 |
+Tor's technology aims to provide Internet users with protection against |
|
| 45 |
+"traffic analysis," a form of network surveillance that threatens personal |
|
| 46 |
+anonymity and privacy, confidential business activities and relationships, |
|
| 47 |
+and state security. |
|
| 51 | 48 |
</p> |
| 52 | 49 |
|
| 53 | 50 |
<p> |
| 54 |
-Traffic analysis is used every day by companies, governments, and |
|
| 55 |
-individuals that want to keep track of where people and organizations go |
|
| 56 |
-and what they do on the Internet. Instead of looking at the content of |
|
| 57 |
-your communications, traffic analysis tracks where your data goes and |
|
| 58 |
-when, as well as how much is sent. For example, online advertising |
|
| 59 |
-companies like Fastclick and Doubleclick use traffic analysis to record |
|
| 60 |
-what web pages you've visited, and can build a profile of your interests |
|
| 61 |
-from that. A pharmaceutical company could use traffic analysis to monitor |
|
| 62 |
-when the research wing of a competitor visits its website, and track |
|
| 63 |
-what pages or products that interest the competitor. IBM hosts a |
|
| 64 |
-searchable patent index, and it could keep a list of every query your |
|
| 65 |
-company makes. A stalker could use traffic analysis to learn whether |
|
| 66 |
-you're in a certain Internet cafe. |
|
| 51 |
+Instead of looking at the content of your communications, traffic analysis |
|
| 52 |
+tracks where your data goes and when, as well as how much is sent. |
|
| 53 |
+<!-- |
|
| 54 |
+For example, online advertising companies like Doubleclick use traffic |
|
| 55 |
+analysis to record what web pages you've visited, and can build a |
|
| 56 |
+profile of your interests from that. A pharmaceutical company could |
|
| 57 |
+use traffic analysis to monitor when the research wing of a competitor |
|
| 58 |
+visits its website, and track what pages or products that interest the |
|
| 59 |
+competitor. IBM hosts a searchable patent index, and it could keep a list |
|
| 60 |
+of every query your company makes. A stalker could use traffic analysis |
|
| 61 |
+to learn whether you're in a certain Internet cafe. |
|
| 67 | 62 |
</p> |
| 68 | 63 |
|
| 69 | 64 |
<p> |
| 70 |
-Tor aims to make traffic analysis more difficult by preventing |
|
| 71 |
-eavesdroppers from finding out where your communications are going |
|
| 72 |
-online, and by letting you decide whether to identify yourself when |
|
| 73 |
-you communicate. |
|
| 65 |
+--> |
|
| 66 |
+Tor aims to make traffic analysis more difficult by preventing websites, |
|
| 67 |
+eavesdroppers, and even the onion routers themselves from tracing your |
|
| 68 |
+communications online. This means Tor lets you decide whether to identify |
|
| 69 |
+yourself when you communicate. |
|
| 74 | 70 |
</p> |
| 75 | 71 |
|
| 76 | 72 |
<p> |
| 77 | 73 |
Tor's security is improved as its user base grows and as |
| 78 | 74 |
more people volunteer to run servers. Please consider |
| 79 |
-<a href="<page documentation>">installing it</a> and then |
|
| 80 |
-<a href="<cvssandbox>tor/doc/tor-doc-server.html">helping out</a>. |
|
| 81 |
-</p> |
|
| 82 |
- |
|
| 83 |
-<p> |
|
| 84 |
-Part of the goal of the Tor project is to deploy a public testbed for |
|
| 85 |
-experimenting with design trade-offs, to teach us how best to provide |
|
| 86 |
-privacy online. We welcome research into the security of Tor and related |
|
| 87 |
-anonymity systems, and want to hear about any vulnerabilities you find. |
|
| 88 |
-</p> |
|
| 89 |
- |
|
| 90 |
-<p> |
|
| 91 |
-Tor is an important piece of building more safety, privacy, and anonymity |
|
| 92 |
-online, but it is not a complete solution. |
|
| 75 |
+<a href="<page volunteer>">volunteering your time</a> or |
|
| 76 |
+<a href="<cvssandbox>tor/doc/tor-doc-server.html">volunteering your bandwidth</a>. |
|
| 93 | 77 |
And remember that this is development code—it's not a good idea to rely |
| 94 | 78 |
on the current Tor network if you really need strong anonymity. |
| 79 |
+</p> |
|
| 80 |
+ |
|
| 81 |
+<p><b>We are now actively looking for new sponsors and funders.</b> |
|
| 82 |
+The Tor project was launched by <a href="http://freehaven.net/">The Free |
|
| 83 |
+Haven Project</a> in 2002. In the past, Tor development was funded |
|
| 84 |
+by contracts with the <a href="http://www.nrl.navy.mil/">Naval |
|
| 85 |
+Research Lab</a> (inventor of onion routing) and the <a |
|
| 86 |
+href="http://www.eff.org/">Electronic Frontier Foundation</a> (who still |
|
| 87 |
+kindly hosts our website). Sponsors of Tor get personal attention, |
|
| 88 |
+better support, publicity (if they want it), and get to influence the |
|
| 89 |
+direction of our research and development! |
|
| 95 | 90 |
</p> |
| 96 | 91 |
|
| 97 | 92 |
</div><!-- #main --> |
| 98 | 93 |
|
| 99 |
-<a href="http://secure.eff.org/tor"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development is supported by EFF" /></a> |
|
| 100 |
-<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development is supported by ONR" /></a> |
|
| 94 |
+<!-- |
|
| 95 |
+<a href="http://www.eff.org/"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development has been supported by EFF" /></a> |
|
| 96 |
+<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development has been supported by ONR" /></a> |
|
| 97 |
+--> |
|
| 101 | 98 |
|
| 102 | 99 |
#include <foot.wmi> |
| ... | ... |
@@ -8,8 +8,8 @@ |
| 8 | 8 |
<h2>Tor: People</h2> |
| 9 | 9 |
<hr /> |
| 10 | 10 |
|
| 11 |
-<p>Tor is managed by <a href="http://freehaven.net/">The Free |
|
| 12 |
-Haven Project</a> as a building block for |
|
| 11 |
+<p>The Tor Project is managed by <a href="http://freehaven.net/">The |
|
| 12 |
+Free Haven Project</a> as a building block for |
|
| 13 | 13 |
a robust censorship-resistant data haven. It is developed by <a |
| 14 | 14 |
href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a |
| 15 | 15 |
href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from |
| ... | ... |
@@ -24,8 +24,14 @@ href="http://www.syverson.org/">Paul Syverson</a> and based on the |
| 24 | 24 |
original <a href="http://www.onion-router.net/">onion routing</a> idea |
| 25 | 25 |
developed there.</p> |
| 26 | 26 |
|
| 27 |
-<p>Since November 2004, Tor development has been supported by the <a |
|
| 28 |
-href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p> |
|
| 27 |
+<p>From late 2004 to late 2005, Tor development was supported by |
|
| 28 |
+the <a href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p> |
|
| 29 |
+ |
|
| 30 |
+<p><b>We are now actively looking for new contracts and funders.</b> |
|
| 31 |
+Sponsors of Tor get personal attention, better support, publicity |
|
| 32 |
+(if they want it), and get to influence the direction of our research |
|
| 33 |
+and development! |
|
| 34 |
+</p> |
|
| 29 | 35 |
|
| 30 | 36 |
</div><!-- #main --> |
| 31 | 37 |
|
| ... | ... |
@@ -21,9 +21,10 @@ come up with ideas or designs to contribute to making Tor's interface |
| 21 | 21 |
and usability better. Free T-shirt for each submission!</li> |
| 22 | 22 |
<li> Tell your friends! Get them to run servers. Get them to run hidden |
| 23 | 23 |
services. Get them to tell their friends.</li> |
| 24 |
-<li> Consider joining the <a href="http://secure.eff.org/tor">Electronic |
|
| 25 |
-Frontier Foundation</a>. More EFF donations means more freedom in the |
|
| 26 |
-world, including more Tor development.</li> |
|
| 24 |
+<li> We are looking for funders and sponsors. Take a look at the |
|
| 25 |
+ <a href="<page people>">people page</a>, and if you know any |
|
| 26 |
+ companies, NGOs, or other organizations that want communications |
|
| 27 |
+ security, let them know about us.</li> |
|
| 27 | 28 |
</ol> |
| 28 | 29 |
|
| 29 | 30 |
<h2>Installers</h2> |
| 30 | 31 |