Roger Dingledine commited on 2016-03-11 22:05:54
Zeige 1 geänderte Dateien mit 29 Einfügungen und 43 Löschungen.
| ... | ... |
@@ -301,25 +301,22 @@ things?</a></li> |
| 301 | 301 |
</p> |
| 302 | 302 |
|
| 303 | 303 |
<p> |
| 304 |
- The Tor software is a program you can run on your computer that |
|
| 305 |
-helps keep |
|
| 306 |
- you safe on the Internet. Tor protects you by bouncing your |
|
| 307 |
-communications |
|
| 304 |
+ Tor is a program you can run on your computer that helps keep |
|
| 305 |
+ you safe on the Internet. It protects you by bouncing your communications |
|
| 308 | 306 |
around a distributed network of relays run by volunteers all around |
| 309 |
- the world: it prevents somebody watching your Internet connection |
|
| 310 |
-from |
|
| 307 |
+ the world: it prevents somebody watching your Internet connection from |
|
| 311 | 308 |
learning what sites you visit, and it prevents the sites you visit |
| 312 |
- from learning your physical location. This set of volunteer relays |
|
| 313 |
-is |
|
| 314 |
- called the Tor network. You can read more about how Tor works on the |
|
| 315 |
-<a |
|
| 316 |
- href="<page about/overview>">overview page</a>. |
|
| 309 |
+ from learning your physical location. |
|
| 310 |
+ This set of volunteer relays is called the <b>Tor network</b>. |
|
| 311 |
+ The way most people use Tor is with <b>Tor Browser</b>, |
|
| 312 |
+ which is a version of Firefox that fixes many privacy issues. |
|
| 313 |
+ You can read more about how Tor works on the <a href="<page |
|
| 314 |
+ about/overview>">overview page</a>. |
|
| 317 | 315 |
</p> |
| 318 | 316 |
|
| 319 | 317 |
<p> |
| 320 |
- The Tor Project is a non-profit (charity) organization that |
|
| 321 |
-maintains |
|
| 322 |
- and develops the Tor software. |
|
| 318 |
+ The <b>Tor Project</b> is a non-profit (charity) organization that |
|
| 319 |
+ maintains and develops the Tor software. |
|
| 323 | 320 |
</p> |
| 324 | 321 |
|
| 325 | 322 |
<hr> |
| ... | ... |
@@ -342,47 +339,38 @@ install anything. You just have to point your browser at their proxy |
| 342 | 339 |
server. |
| 343 | 340 |
Simple proxy providers are fine solutions if you do not want protections |
| 344 | 341 |
for |
| 345 |
-your privacy and anonymity online and you trust the provider from doing |
|
| 342 |
+your privacy and anonymity online and you trust the provider to not do |
|
| 346 | 343 |
bad |
| 347 | 344 |
things. Some simple proxy providers use SSL to secure your connection |
| 348 |
-to them. |
|
| 349 |
-This may protect you against local eavesdroppers, such as those at a |
|
| 350 |
-cafe with |
|
| 351 |
-free wifi Internet. |
|
| 345 |
+to them, which protects you against local eavesdroppers, such as those at a |
|
| 346 |
+cafe with free wifi Internet. |
|
| 352 | 347 |
</p> |
| 353 | 348 |
<p> |
| 354 | 349 |
Simple proxy providers also create a single point of failure. The |
| 355 | 350 |
provider |
| 356 |
-knows who you are and where you browse on the Internet. They can see |
|
| 351 |
+knows both who you are and what you browse on the Internet. They can see |
|
| 357 | 352 |
your |
| 358 | 353 |
traffic as it passes through their server. In some cases, they can even |
| 359 | 354 |
see |
| 360 | 355 |
inside your |
| 361 | 356 |
encrypted traffic as they relay it to your banking site or to ecommerce |
| 362 | 357 |
stores. |
| 363 |
-You have to trust the provider isn't doing any number of things, such as |
|
| 358 |
+You have to trust the provider isn't |
|
| 364 | 359 |
watching your traffic, injecting their own advertisements into your |
| 365 | 360 |
traffic |
| 366 |
-stream, and recording your personal details. |
|
| 361 |
+stream, or recording your personal details. |
|
| 367 | 362 |
</p> |
| 368 | 363 |
<p> |
| 369 | 364 |
Tor passes your traffic through at least 3 different servers before |
| 370 | 365 |
sending |
| 371 | 366 |
it on to the destination. Because there's a separate layer of encryption |
| 372 | 367 |
for |
| 373 |
-each of the three relays, Tor does not modify, or even know, what you |
|
| 374 |
-are |
|
| 375 |
-sending into it. It merely relays your traffic, completely encrypted |
|
| 376 |
-through |
|
| 377 |
-the Tor network and has it pop out somewhere else in the world, |
|
| 378 |
-completely |
|
| 379 |
-intact. The Tor client is required because we assume you trust your |
|
| 380 |
-local |
|
| 381 |
-computer. The Tor client manages the encryption and the path chosen |
|
| 382 |
-through |
|
| 383 |
-the network. The relays located all over the world merely pass |
|
| 384 |
-encrypted |
|
| 385 |
-packets between themselves.</p> |
|
| 368 |
+each of the three relays, somebody watching your Internet connection |
|
| 369 |
+can't modify, or read, what you are |
|
| 370 |
+sending into the Tor network. Your traffic is encrypted between the Tor |
|
| 371 |
+client (on your computer) and where it pops out somewhere else in the |
|
| 372 |
+world. |
|
| 373 |
+</p> |
|
| 386 | 374 |
<p> |
| 387 | 375 |
<dl> |
| 388 | 376 |
<dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad |
| ... | ... |
@@ -395,18 +383,16 @@ merely sees |
| 395 | 383 |
world, so |
| 396 | 384 |
using Tor by itself is fine. You are still protected from this node |
| 397 | 385 |
figuring |
| 398 |
-out who you are and where you are going on the Internet.</dd> |
|
| 386 |
+out both who you are and where you are going on the Internet.</dd> |
|
| 399 | 387 |
<dt>Can't the third server see my traffic?</dt><dd>Possibly. A bad |
| 400 | 388 |
third |
| 401 | 389 |
of three servers can see the traffic you sent into Tor. It won't know |
| 402 | 390 |
who sent |
| 403 |
-this traffic. If you're using encryption, such as visiting a bank or |
|
| 404 |
-e-commerce website, or encrypted mail connections, etc, it will only |
|
| 405 |
-know the |
|
| 406 |
-destination. It won't be able to see the data inside the traffic |
|
| 407 |
-stream. You |
|
| 408 |
-are still protected from this node figuring out who you are and if using |
|
| 409 |
-encryption, what data you're sending to the destination.</dd> |
|
| 391 |
+this traffic. If you're using encryption (like |
|
| 392 |
+HTTPS), it will only know the destination. See <a |
|
| 393 |
+href="https://www.eff.org/pages/tor-and-https">this visualization of |
|
| 394 |
+Tor and HTTPS</a> to understand how Tor and HTTPS interact. |
|
| 395 |
+</dd> |
|
| 410 | 396 |
</dl> |
| 411 | 397 |
</p> |
| 412 | 398 |
|
| 413 | 399 |