Sebastian Hahn commited on 2015-03-14 13:38:27
Zeige 1 geänderte Dateien mit 28 Einfügungen und 28 Löschungen.
| ... | ... |
@@ -65,34 +65,6 @@ |
| 65 | 65 |
<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li> |
| 66 | 66 |
</ul> |
| 67 | 67 |
|
| 68 |
- <a name="military"></a> |
|
| 69 |
- <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> |
|
| 70 |
- <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
|
| 71 |
- <hr> |
|
| 72 |
- <ul> |
|
| 73 |
- |
|
| 74 |
- <li> |
|
| 75 |
- <strong>Field agents:</strong> |
|
| 76 |
- It is not difficult for insurgents to monitor Internet traffic and |
|
| 77 |
- discover all the hotels and other locations from which people are |
|
| 78 |
- connecting to known military servers. |
|
| 79 |
- Military field agents deployed away from home use Tor to |
|
| 80 |
- mask the sites they are visiting, protecting military interests and |
|
| 81 |
- operations, as well as protecting themselves from physical harm. |
|
| 82 |
- </li> |
|
| 83 |
- |
|
| 84 |
- <li><strong>Hidden services:</strong> |
|
| 85 |
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
| 86 |
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
| 87 |
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
| 88 |
- control to be physically secure from discovery and takedown. |
|
| 89 |
- </li> |
|
| 90 |
- <li><strong>Intelligence gathering:</strong> |
|
| 91 |
- Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
| 92 |
- to record a military address, thereby revealing the surveillance. |
|
| 93 |
- </li> |
|
| 94 |
- </ul> |
|
| 95 |
- |
|
| 96 | 68 |
<a name="journalist"></a> |
| 97 | 69 |
<img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media"> |
| 98 | 70 |
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> |
| ... | ... |
@@ -292,6 +264,34 @@ |
| 292 | 264 |
<li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li> |
| 293 | 265 |
</ul> |
| 294 | 266 |
|
| 267 |
+ <a name="military"></a> |
|
| 268 |
+ <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> |
|
| 269 |
+ <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
|
| 270 |
+ <hr> |
|
| 271 |
+ <ul> |
|
| 272 |
+ |
|
| 273 |
+ <li> |
|
| 274 |
+ <strong>Field agents:</strong> |
|
| 275 |
+ It is not difficult for insurgents to monitor Internet traffic and |
|
| 276 |
+ discover all the hotels and other locations from which people are |
|
| 277 |
+ connecting to known military servers. |
|
| 278 |
+ Military field agents deployed away from home use Tor to |
|
| 279 |
+ mask the sites they are visiting, protecting military interests and |
|
| 280 |
+ operations, as well as protecting themselves from physical harm. |
|
| 281 |
+ </li> |
|
| 282 |
+ |
|
| 283 |
+ <li><strong>Hidden services:</strong> |
|
| 284 |
+ When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
| 285 |
+ local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
| 286 |
+ reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
| 287 |
+ control to be physically secure from discovery and takedown. |
|
| 288 |
+ </li> |
|
| 289 |
+ <li><strong>Intelligence gathering:</strong> |
|
| 290 |
+ Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
| 291 |
+ to record a military address, thereby revealing the surveillance. |
|
| 292 |
+ </li> |
|
| 293 |
+ </ul> |
|
| 294 |
+ |
|
| 295 | 295 |
<a name="itprofessionals"></a> |
| 296 | 296 |
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2> |
| 297 | 297 |
<hr> |
| 298 | 298 |