Roger Dingledine commited on 2004-12-14 08:20:20
Zeige 3 geänderte Dateien mit 26 Einfügungen und 25 Löschungen.
... | ... |
@@ -23,7 +23,7 @@ |
23 | 23 |
</div><!-- #side --> |
24 | 24 |
<div class="main" id="main"> |
25 | 25 |
|
26 |
-<h2>Tor: an anonymous Internet communication system</h2> |
|
26 |
+<h2>Tor: An anonymous Internet communication system</h2> |
|
27 | 27 |
|
28 | 28 |
<p> |
29 | 29 |
Tor is a toolset for a wide range of organizations and people who want |
... | ... |
@@ -40,7 +40,7 @@ are bounced around a distributed network of servers called <a |
40 | 40 |
href="howitworks.html">onion routers</a> -- this makes it hard for |
41 | 41 |
recipients, observers, and even the onion routers themselves to figure |
42 | 42 |
out who and where you are. Tor's technology aims to provide Internet |
43 |
-users with protection against <em>traffic analysis</em>, a form of |
|
43 |
+users with protection against "traffic analysis," a form of |
|
44 | 44 |
network surveillance that threatens personal anonymity and privacy, |
45 | 45 |
confidential business activities and relationships, and state security. |
46 | 46 |
</p> |
... | ... |
@@ -49,7 +49,8 @@ confidential business activities and relationships, and state security. |
49 | 49 |
Traffic analysis is used every day by companies, governments, and |
50 | 50 |
individuals who want to keep track of where people and organizations go |
51 | 51 |
and what they do on the Internet. Instead of looking at the content of |
52 |
-your communications, traffic analysis tracks where they go. For example, |
|
52 |
+your communications, traffic analysis tracks where your data goes and |
|
53 |
+when, as well as how big it is. For example, |
|
53 | 54 |
online advertising company Doubleclick uses traffic analysis to record |
54 | 55 |
what webpages you've visited, and can build a profile of your interests |
55 | 56 |
from that. A pharmaceutical company could use traffic analysis to monitor |
... | ... |
@@ -50,7 +50,7 @@ Tor's development as a mechanism for maintaining civil liberties online. |
50 | 50 |
Corporations are investigating Tor as a safe way to conduct competitive |
51 | 51 |
analysis, and are considering using Tor to test new experimental projects |
52 | 52 |
without associating their names with these projects. A branch of the |
53 |
-US Navy uses Tor for open source intelligence gathering, and one of its |
|
53 |
+U.S. Navy uses Tor for open source intelligence gathering, and one of its |
|
54 | 54 |
teams used Tor while deployed in the Middle East recently. |
55 | 55 |
</p> |
56 | 56 |
|
... | ... |
@@ -70,16 +70,16 @@ and destination of your Internet traffic allows others to track your |
70 | 70 |
behavior and interests. This can impact your checkbook if, for example, |
71 | 71 |
an e-commerce site uses price discrimination based on your country or |
72 | 72 |
institution of origin. It can even threaten your job and physical safety |
73 |
-by revealing who and where you are. For example, someone travelling |
|
74 |
-abroad who connects to their employer's computers to check or send mail |
|
75 |
-or for other reasons will reveal her national origin and professional |
|
76 |
-affiliation to any local observing the network even if the connection |
|
73 |
+by revealing who and where you are. For example, if you're travelling |
|
74 |
+abroad and you connect to your employer's computers to check or send mail, |
|
75 |
+you can inadvertently reveal your national origin and professional |
|
76 |
+affiliation to any local observing the network, even if the connection |
|
77 | 77 |
is encrypted. |
78 | 78 |
</p> |
79 | 79 |
|
80 | 80 |
<p> |
81 | 81 |
How does traffic analysis work? Internet data packets have two parts: |
82 |
-a data payload, and a header used for routing. The data payload is |
|
82 |
+a data payload and a header used for routing. The data payload is |
|
83 | 83 |
whatever is being sent, whether that's an email message, a web page, or an |
84 | 84 |
audio file. Even if you encrypt the data payload of your communications, |
85 | 85 |
traffic analysis still reveals a great deal about what you're doing and, |
... | ... |
@@ -88,8 +88,8 @@ which discloses source, destination, size, timing, and so on. |
88 | 88 |
</p> |
89 | 89 |
|
90 | 90 |
<p> |
91 |
-A basic problem, for the privacy minded, is that the recipient of your |
|
92 |
-communications can see who sent them by looking at headers. So can |
|
91 |
+A basic problem for the privacy minded is that the recipient of your |
|
92 |
+communications can see that you sent it by looking at headers. So can |
|
93 | 93 |
authorized intermediaries like Internet service providers, and sometimes |
94 | 94 |
unauthorized intermediaries as well. A very simple form of traffic |
95 | 95 |
analysis might involve sitting somewhere between sender and recipient on |
... | ... |
@@ -168,16 +168,16 @@ the site, and nobody who offered the site would know who was posting to it. |
168 | 168 |
Of course, Tor can't solve all anonymity problems. It focuses only on |
169 | 169 |
protecting the transport of data. You need to use protocol-specific |
170 | 170 |
support software if you don't want the sites you visit to see your |
171 |
-identifying information. For example, web proxies such as Privoxy can |
|
172 |
-be used while web browsing to block cookies and withhold information |
|
171 |
+identifying information. For example, you can use web proxies such as |
|
172 |
+Privoxy while web browsing to block cookies and withhold information |
|
173 | 173 |
about your browser type. |
174 | 174 |
</p> |
175 | 175 |
|
176 | 176 |
<p> |
177 | 177 |
Also, to protect your anonymity, be smart. Don't provide your name |
178 |
-or other revealing information in web forms. Be aware that like all |
|
178 |
+or other revealing information in web forms. Be aware that, like all |
|
179 | 179 |
anonymizing networks that are fast enough for web browsing, Tor does not |
180 |
-provide protection against end-to-end timing attacks: if your attacker |
|
180 |
+provide protection against end-to-end timing attacks: If your attacker |
|
181 | 181 |
can watch the traffic coming out of your computer, and also the traffic |
182 | 182 |
arriving at your chosen destination, he can use statistical analysis to |
183 | 183 |
discover that they are part of the same circuit. |
... | ... |
@@ -186,16 +186,16 @@ discover that they are part of the same circuit. |
186 | 186 |
<h3>The Future of Tor</h3> |
187 | 187 |
|
188 | 188 |
<p> |
189 |
-Providing a usable anonymizing network on the Internet today is |
|
190 |
-an ongoing challenge. We want software that meets users' needs. |
|
191 |
-And we also want to keep the network up and running in a way that |
|
192 |
-handles as many users as possible. Security and usability don't have |
|
193 |
-to be at odds: as Tor's usability increases, it will attract more |
|
194 |
-users, which will increase the possible sources and destinations |
|
195 |
-of each communication, thus increasing security for everyone. |
|
189 |
+Providing a usable anonymizing network on the Internet today is an |
|
190 |
+ongoing challenge. We want software that meets users' needs. We also |
|
191 |
+want to keep the network up and running in a way that handles as many |
|
192 |
+users as possible. Security and usability don't have to be at odds: |
|
193 |
+As Tor's usability increases, it will attract more users, which will |
|
194 |
+increase the possible sources and destinations of each communication, |
|
195 |
+thus increasing security for everyone. |
|
196 | 196 |
We're making progress, but we need your help. Please consider |
197 |
-<a href="cvs/tor/doc/tor-doc.html#installing">installing</a> |
|
198 |
-a <a href="cvs/tor/doc/tor-doc.html#server">server</a> |
|
197 |
+<a href="cvs/tor/doc/tor-doc.html#installing">installing</a> a <a |
|
198 |
+href="cvs/tor/doc/tor-doc.html#server">server</a> |
|
199 | 199 |
or <a href="contribute.html">volunteering</a> as a <a |
200 | 200 |
href="developers.html">developer</a>. |
201 | 201 |
</p> |
202 | 202 |