...
|
...
|
@@ -29,7 +29,7 @@
|
29
|
29
|
href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
|
30
|
30
|
Tor stories</a>! What do you use Tor for? Why do you need it? What
|
31
|
31
|
has Tor done for you? We need your stories.</p>
|
32
|
|
-
|
|
32
|
+
|
33
|
33
|
<a name="normalusers"></a>
|
34
|
34
|
<img src="$(IMGROOT)/family.jpg" alt="Normal People">
|
35
|
35
|
<h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
|
...
|
...
|
@@ -64,35 +64,7 @@
|
64
|
64
|
</li>
|
65
|
65
|
<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
|
66
|
66
|
</ul>
|
67
|
|
-
|
68
|
|
- <a name="military"></a>
|
69
|
|
- <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
|
70
|
|
- <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
|
71
|
|
- <hr>
|
72
|
|
- <ul>
|
73
|
|
-
|
74
|
|
- <li>
|
75
|
|
- <strong>Field agents:</strong>
|
76
|
|
- It is not difficult for insurgents to monitor Internet traffic and
|
77
|
|
- discover all the hotels and other locations from which people are
|
78
|
|
- connecting to known military servers.
|
79
|
|
- Military field agents deployed away from home use Tor to
|
80
|
|
- mask the sites they are visiting, protecting military interests and
|
81
|
|
- operations, as well as protecting themselves from physical harm.
|
82
|
|
- </li>
|
83
|
|
-
|
84
|
|
- <li><strong>Hidden services:</strong>
|
85
|
|
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
|
86
|
|
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to
|
87
|
|
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and
|
88
|
|
- control to be physically secure from discovery and takedown.
|
89
|
|
- </li>
|
90
|
|
- <li><strong>Intelligence gathering:</strong>
|
91
|
|
- Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
|
92
|
|
- to record a military address, thereby revealing the surveillance.
|
93
|
|
- </li>
|
94
|
|
- </ul>
|
95
|
|
-
|
|
67
|
+
|
96
|
68
|
<a name="journalist"></a>
|
97
|
69
|
<img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
|
98
|
70
|
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
|
...
|
...
|
@@ -118,7 +90,7 @@
|
118
|
90
|
avoid risking the personal consequences of intellectual curiosity.
|
119
|
91
|
</li>
|
120
|
92
|
</ul>
|
121
|
|
-
|
|
93
|
+
|
122
|
94
|
<a name="lawenforcement"></a>
|
123
|
95
|
<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
|
124
|
96
|
<hr>
|
...
|
...
|
@@ -144,7 +116,7 @@
|
144
|
116
|
do not encourage anonymity are limiting the sources of their tips.
|
145
|
117
|
</li>
|
146
|
118
|
</ul>
|
147
|
|
-
|
|
119
|
+
|
148
|
120
|
<a name="activists"></a>
|
149
|
121
|
<img src="$(IMGROOT)/activists.jpg" alt="Activists & Whistleblowers">
|
150
|
122
|
<h2><a class="anchor" href="#activists">Activists & Whistleblowers use Tor</a></h2>
|
...
|
...
|
@@ -212,7 +184,7 @@
|
212
|
184
|
to help organize a strike.
|
213
|
185
|
</li>
|
214
|
186
|
</ul>
|
215
|
|
-
|
|
187
|
+
|
216
|
188
|
<a name="spotlight"></a>
|
217
|
189
|
<h2><a class="anchor" href="#spotlight">High & low profile people use Tor</a></h2>
|
218
|
190
|
<hr>
|
...
|
...
|
@@ -241,7 +213,7 @@
|
241
|
213
|
this continuing into the future.
|
242
|
214
|
</li>
|
243
|
215
|
</ul>
|
244
|
|
-
|
|
216
|
+
|
245
|
217
|
<a name="executives"></a>
|
246
|
218
|
<img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
|
247
|
219
|
<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
|
...
|
...
|
@@ -279,7 +251,7 @@
|
279
|
251
|
into whistleblowing.
|
280
|
252
|
</li>
|
281
|
253
|
</ul>
|
282
|
|
-
|
|
254
|
+
|
283
|
255
|
<a name="bloggers"></a>
|
284
|
256
|
<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
|
285
|
257
|
<hr>
|
...
|
...
|
@@ -291,7 +263,35 @@
|
291
|
263
|
<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
|
292
|
264
|
<li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
|
293
|
265
|
</ul>
|
294
|
|
-
|
|
266
|
+
|
|
267
|
+ <a name="military"></a>
|
|
268
|
+ <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
|
|
269
|
+ <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
|
|
270
|
+ <hr>
|
|
271
|
+ <ul>
|
|
272
|
+
|
|
273
|
+ <li>
|
|
274
|
+ <strong>Field agents:</strong>
|
|
275
|
+ It is not difficult for insurgents to monitor Internet traffic and
|
|
276
|
+ discover all the hotels and other locations from which people are
|
|
277
|
+ connecting to known military servers.
|
|
278
|
+ Military field agents deployed away from home use Tor to
|
|
279
|
+ mask the sites they are visiting, protecting military interests and
|
|
280
|
+ operations, as well as protecting themselves from physical harm.
|
|
281
|
+ </li>
|
|
282
|
+
|
|
283
|
+ <li><strong>Hidden services:</strong>
|
|
284
|
+ When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
|
|
285
|
+ local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to
|
|
286
|
+ reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and
|
|
287
|
+ control to be physically secure from discovery and takedown.
|
|
288
|
+ </li>
|
|
289
|
+ <li><strong>Intelligence gathering:</strong>
|
|
290
|
+ Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
|
|
291
|
+ to record a military address, thereby revealing the surveillance.
|
|
292
|
+ </li>
|
|
293
|
+ </ul>
|
|
294
|
+
|
295
|
295
|
<a name="itprofessionals"></a>
|
296
|
296
|
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
|
297
|
297
|
<hr>
|
...
|
...
|
@@ -302,7 +302,7 @@
|
302
|
302
|
<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
|
303
|
303
|
<li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
|
304
|
304
|
</ul>
|
305
|
|
-
|
|
305
|
+
|
306
|
306
|
<p>
|
307
|
307
|
Please do send us your success stories. They are very important because
|
308
|
308
|
Tor provides anonymity. While it is thrilling to speculate about <a
|
...
|
...
|
@@ -312,7 +312,7 @@
|
312
|
312
|
counterproductive. For example, we talked to an FBI officer who
|
313
|
313
|
explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide
|
314
|
314
|
details or mention his name.</p>
|
315
|
|
-
|
|
315
|
+
|
316
|
316
|
<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous
|
317
|
317
|
debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
|
318
|
318
|
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
|