cut out much of the front page material. point out that we're unfunded and looking for sponsors.
Roger Dingledine

Roger Dingledine commited on 2005-10-22 00:17:52
Zeige 3 geänderte Dateien mit 54 Einfügungen und 50 Löschungen.

... ...
@@ -10,9 +10,11 @@
10 10
 <br />
11 11
 
12 12
 <a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a>
13
+<!--
13 14
 <div class="donatebutton">
14 15
 <a href="http://secure.eff.org/tor">Support Tor by giving to EFF</a>
15 16
 </div>
17
+-->
16 18
 <div class="donatebutton">
17 19
 <a href="gui/">Want a better Tor GUI?</a>
18 20
 </div>
... ...
@@ -38,65 +40,60 @@ built-in anonymity, safety, and privacy features.
38 40
 <p>
39 41
 Your traffic is safer when you use Tor, because communications
40 42
 are bounced around a distributed network of servers, called
41
-<a href="<page overview>">onion routers</a>.  Instead of taking a direct
42
-route from source to destination, data packets on the Tor network take a
43
-random pathway through several servers that cover your tracks so no observer
44
-at any single point can tell where the data came from or where it's going.
45
-This makes it hard for
46
-recipients, observers, and even the onion routers themselves to figure
47
-out who and where you are. Tor's technology aims to provide Internet
48
-users with protection against "traffic analysis," a form of
49
-network surveillance that threatens personal anonymity and privacy,
50
-confidential business activities and relationships, and state security.
43
+<a href="<page overview>">onion routers</a>.
44
+Tor's technology aims to provide Internet users with protection against
45
+"traffic analysis," a form of network surveillance that threatens personal
46
+anonymity and privacy, confidential business activities and relationships,
47
+and state security.
51 48
 </p>
52 49
 
53 50
 <p>
54
-Traffic analysis is used every day by companies, governments, and
55
-individuals that want to keep track of where people and organizations go
56
-and what they do on the Internet.  Instead of looking at the content of
57
-your communications, traffic analysis tracks where your data goes and
58
-when, as well as how much is sent. For example, online advertising
59
-companies like Fastclick and Doubleclick use traffic analysis to record
60
-what web pages you've visited, and can build a profile of your interests
61
-from that. A pharmaceutical company could use traffic analysis to monitor
62
-when the research wing of a competitor visits its website, and track
63
-what pages or products that interest the competitor. IBM hosts a
64
-searchable patent index, and it could keep a list of every query your
65
-company makes. A stalker could use traffic analysis to learn whether
66
-you're in a certain Internet cafe.
51
+Instead of looking at the content of your communications, traffic analysis
52
+tracks where your data goes and when, as well as how much is sent.
53
+<!--
54
+For example, online advertising companies like Doubleclick use traffic
55
+analysis to record what web pages you've visited, and can build a
56
+profile of your interests from that. A pharmaceutical company could
57
+use traffic analysis to monitor when the research wing of a competitor
58
+visits its website, and track what pages or products that interest the
59
+competitor. IBM hosts a searchable patent index, and it could keep a list
60
+of every query your company makes. A stalker could use traffic analysis
61
+to learn whether you're in a certain Internet cafe.
67 62
 </p>
68 63
 
69 64
 <p>
70
-Tor aims to make traffic analysis more difficult by preventing
71
-eavesdroppers from finding out where your communications are going
72
-online, and by letting you decide whether to identify yourself when
73
-you communicate.
65
+-->
66
+Tor aims to make traffic analysis more difficult by preventing websites,
67
+eavesdroppers, and even the onion routers themselves from tracing your
68
+communications online. This means Tor lets you decide whether to identify
69
+yourself when you communicate.
74 70
 </p>
75 71
 
76 72
 <p>
77 73
 Tor's security is improved as its user base grows and as
78 74
 more people volunteer to run servers.  Please consider
79
-<a href="<page documentation>">installing it</a> and then
80
-<a href="<cvssandbox>tor/doc/tor-doc-server.html">helping out</a>.
81
-</p>
82
-
83
-<p>
84
-Part of the goal of the Tor project is to deploy a public testbed for
85
-experimenting with design trade-offs, to teach us how best to provide
86
-privacy online. We welcome research into the security of Tor and related
87
-anonymity systems, and want to hear about any vulnerabilities you find.
88
-</p>
89
-
90
-<p>
91
-Tor is an important piece of building more safety, privacy, and anonymity
92
-online, but it is not a complete solution.
75
+<a href="<page volunteer>">volunteering your time</a> or
76
+<a href="<cvssandbox>tor/doc/tor-doc-server.html">volunteering your bandwidth</a>.
93 77
 And remember that this is development code&mdash;it's not a good idea to rely
94 78
 on the current Tor network if you really need strong anonymity.
79
+</p>
80
+
81
+<p><b>We are now actively looking for new sponsors and funders.</b>
82
+The Tor project was launched by <a href="http://freehaven.net/">The Free
83
+Haven Project</a> in 2002. In the past, Tor development was funded
84
+by contracts with the <a href="http://www.nrl.navy.mil/">Naval
85
+Research Lab</a> (inventor of onion routing) and the <a
86
+href="http://www.eff.org/">Electronic Frontier Foundation</a> (who still
87
+kindly hosts our website). Sponsors of Tor get personal attention,
88
+better support, publicity (if they want it), and get to influence the
89
+direction of our research and development!
95 90
 </p>
96 91
 
97 92
   </div><!-- #main -->
98 93
 
99
-<a href="http://secure.eff.org/tor"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development is supported by EFF" /></a>
100
-<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development is supported by ONR" /></a>
94
+<!--
95
+<a href="http://www.eff.org/"><img src="$(IMGROOT)/eff_badge.png" alt="Tor development has been supported by EFF" /></a>
96
+<a href="http://www.onion-router.net/"><img src="$(IMGROOT)/onr-logo.jpg" alt="Tor development has been supported by ONR" /></a>
97
+-->
101 98
 
102 99
 #include <foot.wmi>
... ...
@@ -8,8 +8,8 @@
8 8
 <h2>Tor: People</h2>
9 9
 <hr />
10 10
 
11
-<p>Tor is managed by <a href="http://freehaven.net/">The Free
12
-Haven Project</a> as a building block for
11
+<p>The Tor Project is managed by <a href="http://freehaven.net/">The
12
+Free Haven Project</a> as a building block for
13 13
 a robust censorship-resistant data haven. It is developed by <a
14 14
 href="http://freehaven.net/~arma/">Roger Dingledine</a> and <a
15 15
 href="http://www.wangafu.net/~nickm/">Nick Mathewson</a>, with help from
... ...
@@ -24,8 +24,14 @@ href="http://www.syverson.org/">Paul Syverson</a> and based on the
24 24
 original <a href="http://www.onion-router.net/">onion routing</a> idea
25 25
 developed there.</p>
26 26
 
27
-<p>Since November 2004, Tor development has been supported by the <a
28
-href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p>
27
+<p>From late 2004 to late 2005, Tor development was supported by
28
+the <a href="http://www.eff.org/">Electronic Frontier Foundation</a>.</p>
29
+
30
+<p><b>We are now actively looking for new contracts and funders.</b>
31
+Sponsors of Tor get personal attention, better support, publicity
32
+(if they want it), and get to influence the direction of our research
33
+and development!
34
+</p>
29 35
 
30 36
   </div><!-- #main -->
31 37
 
... ...
@@ -21,9 +21,10 @@ come up with ideas or designs to contribute to making Tor's interface
21 21
 and usability better. Free T-shirt for each submission!</li>
22 22
 <li> Tell your friends! Get them to run servers. Get them to run hidden
23 23
 services. Get them to tell their friends.</li>
24
-<li> Consider joining the <a href="http://secure.eff.org/tor">Electronic
25
-Frontier Foundation</a>. More EFF donations means more freedom in the
26
-world, including more Tor development.</li>
24
+<li> We are looking for funders and sponsors. Take a look at the
25
+ <a href="<page people>">people page</a>, and if you know any
26
+  companies, NGOs, or other organizations that want communications
27
+  security, let them know about us.</li>
27 28
 </ol>
28 29
 
29 30
 <h2>Installers</h2>
30 31