Andrew Lewman commited on 2009-03-03 05:27:31
Zeige 1 geänderte Dateien mit 30 Einfügungen und 9 Löschungen.
... | ... |
@@ -6,7 +6,22 @@ |
6 | 6 |
|
7 | 7 |
<div class="main-column"> |
8 | 8 |
|
9 |
-<h2>Tor: Overview</h2> |
|
9 |
+<a name="overview"></a> |
|
10 |
+<h2><a class="anchor" href="#overview">Tor: Overview</a></h2> |
|
11 |
+<!-- BEGIN SIDEBAR --> |
|
12 |
+<div class="sidebar-left"> |
|
13 |
+<h3>Topics</h3> |
|
14 |
+<ul> |
|
15 |
+<li><a href="<page overview>#overview">Overview</a></li> |
|
16 |
+<li><a href="<page overview>#whyweneedtor">Why we need Tor</a></li> |
|
17 |
+<li><a href="<page overview>#thesolution">The Solution</a></li> |
|
18 |
+<li><a href="<page overview>#hiddenservices">Hidden services</a></li> |
|
19 |
+<li><a href="<page overview>#stayinganonymous">Staying anonymous</a></li> |
|
20 |
+<li><a href="<page overview>#thefutureoftor">The future of Tor</a></li> |
|
21 |
+</ul> |
|
22 |
+</div> |
|
23 |
+<!-- END SIDEBAR --> |
|
24 |
+ |
|
10 | 25 |
<hr /> |
11 | 26 |
|
12 | 27 |
<p> |
... | ... |
@@ -68,7 +83,8 @@ so the more populous and diverse the user base for Tor is, the more your |
68 | 83 |
anonymity will be protected. |
69 | 84 |
</p> |
70 | 85 |
|
71 |
-<h3>Why we need Tor</h3> |
|
86 |
+<a name="whyweneedtor"></a> |
|
87 |
+<h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3> |
|
72 | 88 |
|
73 | 89 |
<p> |
74 | 90 |
Using Tor protects you against a common form of Internet surveillance |
... | ... |
@@ -113,7 +129,8 @@ these attackers, since it only hides the content of Internet traffic, not |
113 | 129 |
the headers. |
114 | 130 |
</p> |
115 | 131 |
|
116 |
-<h3>The solution: a distributed, anonymous network</h3> |
|
132 |
+<a name="thesolution"></a> |
|
133 |
+<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> |
|
117 | 134 |
|
118 | 135 |
<p> |
119 | 136 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
... | ... |
@@ -127,7 +144,7 @@ through several relays that cover your tracks so no observer at any |
127 | 144 |
single point can tell where the data came from or where it's going. |
128 | 145 |
</p> |
129 | 146 |
|
130 |
-<img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /> |
|
147 |
+<p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p> |
|
131 | 148 |
|
132 | 149 |
<p> |
133 | 150 |
To create a private network pathway with Tor, the user's software or |
... | ... |
@@ -140,7 +157,7 @@ separate set of encryption keys for each hop along the circuit to ensure |
140 | 157 |
that each hop can't trace these connections as they pass through. |
141 | 158 |
</p> |
142 | 159 |
|
143 |
-<img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /> |
|
160 |
+<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p> |
|
144 | 161 |
|
145 | 162 |
<p> |
146 | 163 |
Once a circuit has been established, many kinds of data can be exchanged |
... | ... |
@@ -159,9 +176,11 @@ new circuit, to keep people from linking your earlier actions to the new |
159 | 176 |
ones. |
160 | 177 |
</p> |
161 | 178 |
|
162 |
-<img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /> |
|
179 |
+<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p> |
|
180 |
+ |
|
163 | 181 |
|
164 |
-<h3>Hidden services</h3> |
|
182 |
+<a name="hiddenservices"></a> |
|
183 |
+<h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3> |
|
165 | 184 |
|
166 | 185 |
<p> |
167 | 186 |
Tor also makes it possible for users to hide their locations while |
... | ... |
@@ -177,7 +196,8 @@ hidden services</a> and how the <a href="<page hidden-services>">hidden |
177 | 196 |
service protocol</a> works. |
178 | 197 |
</p> |
179 | 198 |
|
180 |
-<h3>Staying anonymous</h3> |
|
199 |
+<a name="stayinganonymous"></a> |
|
200 |
+<h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3> |
|
181 | 201 |
|
182 | 202 |
<p> |
183 | 203 |
Tor can't solve all anonymity problems. It focuses only on |
... | ... |
@@ -198,7 +218,8 @@ arriving at your chosen destination, he can use statistical analysis to |
198 | 218 |
discover that they are part of the same circuit. |
199 | 219 |
</p> |
200 | 220 |
|
201 |
-<h3>The future of Tor</h3> |
|
221 |
+<a name="thefutureoftor"></a> |
|
222 |
+<h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3> |
|
202 | 223 |
|
203 | 224 |
<p> |
204 | 225 |
Providing a usable anonymizing network on the Internet today is an |
205 | 226 |