Roger Dingledine commited on 2004-12-14 08:20:20
Zeige 3 geänderte Dateien mit 26 Einfügungen und 25 Löschungen.
| ... | ... |
@@ -23,7 +23,7 @@ |
| 23 | 23 |
</div><!-- #side --> |
| 24 | 24 |
<div class="main" id="main"> |
| 25 | 25 |
|
| 26 |
-<h2>Tor: an anonymous Internet communication system</h2> |
|
| 26 |
+<h2>Tor: An anonymous Internet communication system</h2> |
|
| 27 | 27 |
|
| 28 | 28 |
<p> |
| 29 | 29 |
Tor is a toolset for a wide range of organizations and people who want |
| ... | ... |
@@ -40,7 +40,7 @@ are bounced around a distributed network of servers called <a |
| 40 | 40 |
href="howitworks.html">onion routers</a> -- this makes it hard for |
| 41 | 41 |
recipients, observers, and even the onion routers themselves to figure |
| 42 | 42 |
out who and where you are. Tor's technology aims to provide Internet |
| 43 |
-users with protection against <em>traffic analysis</em>, a form of |
|
| 43 |
+users with protection against "traffic analysis," a form of |
|
| 44 | 44 |
network surveillance that threatens personal anonymity and privacy, |
| 45 | 45 |
confidential business activities and relationships, and state security. |
| 46 | 46 |
</p> |
| ... | ... |
@@ -49,7 +49,8 @@ confidential business activities and relationships, and state security. |
| 49 | 49 |
Traffic analysis is used every day by companies, governments, and |
| 50 | 50 |
individuals who want to keep track of where people and organizations go |
| 51 | 51 |
and what they do on the Internet. Instead of looking at the content of |
| 52 |
-your communications, traffic analysis tracks where they go. For example, |
|
| 52 |
+your communications, traffic analysis tracks where your data goes and |
|
| 53 |
+when, as well as how big it is. For example, |
|
| 53 | 54 |
online advertising company Doubleclick uses traffic analysis to record |
| 54 | 55 |
what webpages you've visited, and can build a profile of your interests |
| 55 | 56 |
from that. A pharmaceutical company could use traffic analysis to monitor |
| ... | ... |
@@ -50,7 +50,7 @@ Tor's development as a mechanism for maintaining civil liberties online. |
| 50 | 50 |
Corporations are investigating Tor as a safe way to conduct competitive |
| 51 | 51 |
analysis, and are considering using Tor to test new experimental projects |
| 52 | 52 |
without associating their names with these projects. A branch of the |
| 53 |
-US Navy uses Tor for open source intelligence gathering, and one of its |
|
| 53 |
+U.S. Navy uses Tor for open source intelligence gathering, and one of its |
|
| 54 | 54 |
teams used Tor while deployed in the Middle East recently. |
| 55 | 55 |
</p> |
| 56 | 56 |
|
| ... | ... |
@@ -70,16 +70,16 @@ and destination of your Internet traffic allows others to track your |
| 70 | 70 |
behavior and interests. This can impact your checkbook if, for example, |
| 71 | 71 |
an e-commerce site uses price discrimination based on your country or |
| 72 | 72 |
institution of origin. It can even threaten your job and physical safety |
| 73 |
-by revealing who and where you are. For example, someone travelling |
|
| 74 |
-abroad who connects to their employer's computers to check or send mail |
|
| 75 |
-or for other reasons will reveal her national origin and professional |
|
| 76 |
-affiliation to any local observing the network even if the connection |
|
| 73 |
+by revealing who and where you are. For example, if you're travelling |
|
| 74 |
+abroad and you connect to your employer's computers to check or send mail, |
|
| 75 |
+you can inadvertently reveal your national origin and professional |
|
| 76 |
+affiliation to any local observing the network, even if the connection |
|
| 77 | 77 |
is encrypted. |
| 78 | 78 |
</p> |
| 79 | 79 |
|
| 80 | 80 |
<p> |
| 81 | 81 |
How does traffic analysis work? Internet data packets have two parts: |
| 82 |
-a data payload, and a header used for routing. The data payload is |
|
| 82 |
+a data payload and a header used for routing. The data payload is |
|
| 83 | 83 |
whatever is being sent, whether that's an email message, a web page, or an |
| 84 | 84 |
audio file. Even if you encrypt the data payload of your communications, |
| 85 | 85 |
traffic analysis still reveals a great deal about what you're doing and, |
| ... | ... |
@@ -88,8 +88,8 @@ which discloses source, destination, size, timing, and so on. |
| 88 | 88 |
</p> |
| 89 | 89 |
|
| 90 | 90 |
<p> |
| 91 |
-A basic problem, for the privacy minded, is that the recipient of your |
|
| 92 |
-communications can see who sent them by looking at headers. So can |
|
| 91 |
+A basic problem for the privacy minded is that the recipient of your |
|
| 92 |
+communications can see that you sent it by looking at headers. So can |
|
| 93 | 93 |
authorized intermediaries like Internet service providers, and sometimes |
| 94 | 94 |
unauthorized intermediaries as well. A very simple form of traffic |
| 95 | 95 |
analysis might involve sitting somewhere between sender and recipient on |
| ... | ... |
@@ -168,16 +168,16 @@ the site, and nobody who offered the site would know who was posting to it. |
| 168 | 168 |
Of course, Tor can't solve all anonymity problems. It focuses only on |
| 169 | 169 |
protecting the transport of data. You need to use protocol-specific |
| 170 | 170 |
support software if you don't want the sites you visit to see your |
| 171 |
-identifying information. For example, web proxies such as Privoxy can |
|
| 172 |
-be used while web browsing to block cookies and withhold information |
|
| 171 |
+identifying information. For example, you can use web proxies such as |
|
| 172 |
+Privoxy while web browsing to block cookies and withhold information |
|
| 173 | 173 |
about your browser type. |
| 174 | 174 |
</p> |
| 175 | 175 |
|
| 176 | 176 |
<p> |
| 177 | 177 |
Also, to protect your anonymity, be smart. Don't provide your name |
| 178 |
-or other revealing information in web forms. Be aware that like all |
|
| 178 |
+or other revealing information in web forms. Be aware that, like all |
|
| 179 | 179 |
anonymizing networks that are fast enough for web browsing, Tor does not |
| 180 |
-provide protection against end-to-end timing attacks: if your attacker |
|
| 180 |
+provide protection against end-to-end timing attacks: If your attacker |
|
| 181 | 181 |
can watch the traffic coming out of your computer, and also the traffic |
| 182 | 182 |
arriving at your chosen destination, he can use statistical analysis to |
| 183 | 183 |
discover that they are part of the same circuit. |
| ... | ... |
@@ -186,16 +186,16 @@ discover that they are part of the same circuit. |
| 186 | 186 |
<h3>The Future of Tor</h3> |
| 187 | 187 |
|
| 188 | 188 |
<p> |
| 189 |
-Providing a usable anonymizing network on the Internet today is |
|
| 190 |
-an ongoing challenge. We want software that meets users' needs. |
|
| 191 |
-And we also want to keep the network up and running in a way that |
|
| 192 |
-handles as many users as possible. Security and usability don't have |
|
| 193 |
-to be at odds: as Tor's usability increases, it will attract more |
|
| 194 |
-users, which will increase the possible sources and destinations |
|
| 195 |
-of each communication, thus increasing security for everyone. |
|
| 189 |
+Providing a usable anonymizing network on the Internet today is an |
|
| 190 |
+ongoing challenge. We want software that meets users' needs. We also |
|
| 191 |
+want to keep the network up and running in a way that handles as many |
|
| 192 |
+users as possible. Security and usability don't have to be at odds: |
|
| 193 |
+As Tor's usability increases, it will attract more users, which will |
|
| 194 |
+increase the possible sources and destinations of each communication, |
|
| 195 |
+thus increasing security for everyone. |
|
| 196 | 196 |
We're making progress, but we need your help. Please consider |
| 197 |
-<a href="cvs/tor/doc/tor-doc.html#installing">installing</a> |
|
| 198 |
-a <a href="cvs/tor/doc/tor-doc.html#server">server</a> |
|
| 197 |
+<a href="cvs/tor/doc/tor-doc.html#installing">installing</a> a <a |
|
| 198 |
+href="cvs/tor/doc/tor-doc.html#server">server</a> |
|
| 199 | 199 |
or <a href="contribute.html">volunteering</a> as a <a |
| 200 | 200 |
href="developers.html">developer</a>. |
| 201 | 201 |
</p> |
| 202 | 202 |