Sebastian Hahn commited on 2015-03-14 13:38:27
Zeige 1 geänderte Dateien mit 28 Einfügungen und 28 Löschungen.
... | ... |
@@ -65,34 +65,6 @@ |
65 | 65 |
<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li> |
66 | 66 |
</ul> |
67 | 67 |
|
68 |
- <a name="military"></a> |
|
69 |
- <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> |
|
70 |
- <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
|
71 |
- <hr> |
|
72 |
- <ul> |
|
73 |
- |
|
74 |
- <li> |
|
75 |
- <strong>Field agents:</strong> |
|
76 |
- It is not difficult for insurgents to monitor Internet traffic and |
|
77 |
- discover all the hotels and other locations from which people are |
|
78 |
- connecting to known military servers. |
|
79 |
- Military field agents deployed away from home use Tor to |
|
80 |
- mask the sites they are visiting, protecting military interests and |
|
81 |
- operations, as well as protecting themselves from physical harm. |
|
82 |
- </li> |
|
83 |
- |
|
84 |
- <li><strong>Hidden services:</strong> |
|
85 |
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
86 |
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
87 |
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
88 |
- control to be physically secure from discovery and takedown. |
|
89 |
- </li> |
|
90 |
- <li><strong>Intelligence gathering:</strong> |
|
91 |
- Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
92 |
- to record a military address, thereby revealing the surveillance. |
|
93 |
- </li> |
|
94 |
- </ul> |
|
95 |
- |
|
96 | 68 |
<a name="journalist"></a> |
97 | 69 |
<img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media"> |
98 | 70 |
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> |
... | ... |
@@ -292,6 +264,34 @@ |
292 | 264 |
<li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li> |
293 | 265 |
</ul> |
294 | 266 |
|
267 |
+ <a name="military"></a> |
|
268 |
+ <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> |
|
269 |
+ <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
|
270 |
+ <hr> |
|
271 |
+ <ul> |
|
272 |
+ |
|
273 |
+ <li> |
|
274 |
+ <strong>Field agents:</strong> |
|
275 |
+ It is not difficult for insurgents to monitor Internet traffic and |
|
276 |
+ discover all the hotels and other locations from which people are |
|
277 |
+ connecting to known military servers. |
|
278 |
+ Military field agents deployed away from home use Tor to |
|
279 |
+ mask the sites they are visiting, protecting military interests and |
|
280 |
+ operations, as well as protecting themselves from physical harm. |
|
281 |
+ </li> |
|
282 |
+ |
|
283 |
+ <li><strong>Hidden services:</strong> |
|
284 |
+ When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
285 |
+ local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
286 |
+ reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
287 |
+ control to be physically secure from discovery and takedown. |
|
288 |
+ </li> |
|
289 |
+ <li><strong>Intelligence gathering:</strong> |
|
290 |
+ Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
291 |
+ to record a military address, thereby revealing the surveillance. |
|
292 |
+ </li> |
|
293 |
+ </ul> |
|
294 |
+ |
|
295 | 295 |
<a name="itprofessionals"></a> |
296 | 296 |
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2> |
297 | 297 |
<hr> |
298 | 298 |