Andrew Lewman commited on 2009-03-03 05:27:31
              Zeige 1 geänderte Dateien mit 30 Einfügungen und 9 Löschungen.
            
| ... | ... | 
                      @@ -6,7 +6,22 @@  | 
                  
| 6 | 6 | 
                         | 
                    
| 7 | 7 | 
                        <div class="main-column">  | 
                    
| 8 | 8 | 
                         | 
                    
| 9 | 
                        -<h2>Tor: Overview</h2>  | 
                    |
| 9 | 
                        +<a name="overview"></a>  | 
                    |
| 10 | 
                        +<h2><a class="anchor" href="#overview">Tor: Overview</a></h2>  | 
                    |
| 11 | 
                        +<!-- BEGIN SIDEBAR -->  | 
                    |
| 12 | 
                        +<div class="sidebar-left">  | 
                    |
| 13 | 
                        +<h3>Topics</h3>  | 
                    |
| 14 | 
                        +<ul>  | 
                    |
| 15 | 
                        +<li><a href="<page overview>#overview">Overview</a></li>  | 
                    |
| 16 | 
                        +<li><a href="<page overview>#whyweneedtor">Why we need Tor</a></li>  | 
                    |
| 17 | 
                        +<li><a href="<page overview>#thesolution">The Solution</a></li>  | 
                    |
| 18 | 
                        +<li><a href="<page overview>#hiddenservices">Hidden services</a></li>  | 
                    |
| 19 | 
                        +<li><a href="<page overview>#stayinganonymous">Staying anonymous</a></li>  | 
                    |
| 20 | 
                        +<li><a href="<page overview>#thefutureoftor">The future of Tor</a></li>  | 
                    |
| 21 | 
                        +</ul>  | 
                    |
| 22 | 
                        +</div>  | 
                    |
| 23 | 
                        +<!-- END SIDEBAR -->  | 
                    |
| 24 | 
                        +  | 
                    |
| 10 | 25 | 
                        <hr />  | 
                    
| 11 | 26 | 
                         | 
                    
| 12 | 27 | 
                        <p>  | 
                    
| ... | ... | 
                      @@ -68,7 +83,8 @@ so the more populous and diverse the user base for Tor is, the more your  | 
                  
| 68 | 83 | 
                        anonymity will be protected.  | 
                    
| 69 | 84 | 
                        </p>  | 
                    
| 70 | 85 | 
                         | 
                    
| 71 | 
                        -<h3>Why we need Tor</h3>  | 
                    |
| 86 | 
                        +<a name="whyweneedtor"></a>  | 
                    |
| 87 | 
                        +<h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>  | 
                    |
| 72 | 88 | 
                         | 
                    
| 73 | 89 | 
                        <p>  | 
                    
| 74 | 90 | 
                        Using Tor protects you against a common form of Internet surveillance  | 
                    
| ... | ... | 
                      @@ -113,7 +129,8 @@ these attackers, since it only hides the content of Internet traffic, not  | 
                  
| 113 | 129 | 
                        the headers.  | 
                    
| 114 | 130 | 
                        </p>  | 
                    
| 115 | 131 | 
                         | 
                    
| 116 | 
                        -<h3>The solution: a distributed, anonymous network</h3>  | 
                    |
| 132 | 
                        +<a name="thesolution"></a>  | 
                    |
| 133 | 
                        +<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>  | 
                    |
| 117 | 134 | 
                         | 
                    
| 118 | 135 | 
                        <p>  | 
                    
| 119 | 136 | 
                        Tor helps to reduce the risks of both simple and sophisticated traffic  | 
                    
| ... | ... | 
                      @@ -127,7 +144,7 @@ through several relays that cover your tracks so no observer at any  | 
                  
| 127 | 144 | 
                        single point can tell where the data came from or where it's going.  | 
                    
| 128 | 145 | 
                        </p>  | 
                    
| 129 | 146 | 
                         | 
                    
| 130 | 
                        -<img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" />  | 
                    |
| 147 | 
                        +<p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p>  | 
                    |
| 131 | 148 | 
                         | 
                    
| 132 | 149 | 
                        <p>  | 
                    
| 133 | 150 | 
                        To create a private network pathway with Tor, the user's software or  | 
                    
| ... | ... | 
                      @@ -140,7 +157,7 @@ separate set of encryption keys for each hop along the circuit to ensure  | 
                  
| 140 | 157 | 
                        that each hop can't trace these connections as they pass through.  | 
                    
| 141 | 158 | 
                        </p>  | 
                    
| 142 | 159 | 
                         | 
                    
| 143 | 
                        -<img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" />  | 
                    |
| 160 | 
                        +<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p>  | 
                    |
| 144 | 161 | 
                         | 
                    
| 145 | 162 | 
                        <p>  | 
                    
| 146 | 163 | 
                        Once a circuit has been established, many kinds of data can be exchanged  | 
                    
| ... | ... | 
                      @@ -159,9 +176,11 @@ new circuit, to keep people from linking your earlier actions to the new  | 
                  
| 159 | 176 | 
                        ones.  | 
                    
| 160 | 177 | 
                        </p>  | 
                    
| 161 | 178 | 
                         | 
                    
| 162 | 
                        -<img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" />  | 
                    |
| 179 | 
                        +<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p>  | 
                    |
| 180 | 
                        +  | 
                    |
| 163 | 181 | 
                         | 
                    
| 164 | 
                        -<h3>Hidden services</h3>  | 
                    |
| 182 | 
                        +<a name="hiddenservices"></a>  | 
                    |
| 183 | 
                        +<h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>  | 
                    |
| 165 | 184 | 
                         | 
                    
| 166 | 185 | 
                        <p>  | 
                    
| 167 | 186 | 
                        Tor also makes it possible for users to hide their locations while  | 
                    
| ... | ... | 
                      @@ -177,7 +196,8 @@ hidden services</a> and how the <a href="<page hidden-services>">hidden  | 
                  
| 177 | 196 | 
                        service protocol</a> works.  | 
                    
| 178 | 197 | 
                        </p>  | 
                    
| 179 | 198 | 
                         | 
                    
| 180 | 
                        -<h3>Staying anonymous</h3>  | 
                    |
| 199 | 
                        +<a name="stayinganonymous"></a>  | 
                    |
| 200 | 
                        +<h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>  | 
                    |
| 181 | 201 | 
                         | 
                    
| 182 | 202 | 
                        <p>  | 
                    
| 183 | 203 | 
                        Tor can't solve all anonymity problems. It focuses only on  | 
                    
| ... | ... | 
                      @@ -198,7 +218,8 @@ arriving at your chosen destination, he can use statistical analysis to  | 
                  
| 198 | 218 | 
                        discover that they are part of the same circuit.  | 
                    
| 199 | 219 | 
                        </p>  | 
                    
| 200 | 220 | 
                         | 
                    
| 201 | 
                        -<h3>The future of Tor</h3>  | 
                    |
| 221 | 
                        +<a name="thefutureoftor"></a>  | 
                    |
| 222 | 
                        +<h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>  | 
                    |
| 202 | 223 | 
                         | 
                    
| 203 | 224 | 
                        <p>  | 
                    
| 204 | 225 | 
                        Providing a usable anonymizing network on the Internet today is an  | 
                    
| 205 | 226 |