Andrew Lewman commited on 2008-10-14 01:47:34
Zeige 5 geänderte Dateien mit 139 Einfügungen und 37 Löschungen.
... | ... |
@@ -0,0 +1,77 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision: 16919 $ |
|
3 |
+# Translation-Priority: 1-high |
|
4 |
+ |
|
5 |
+#include "head.wmi" TITLE="Tor Summary" CHARSET="UTF-8" |
|
6 |
+ |
|
7 |
+<div class="main-column"> |
|
8 |
+ |
|
9 |
+<h2>Why You Need Tor</h2> |
|
10 |
+<hr /> |
|
11 |
+<p>Few issues affect the legitimacy of the Internet more than protecting |
|
12 |
+people's personal data while they're online. Because the vast majority |
|
13 |
+of internet traffic passes along public routes, it is relatively easy |
|
14 |
+for prying eyes to view the comings and goings of internet users -- and |
|
15 |
+even gather some important financial or personal information. These |
|
16 |
+snoopers can get their information almost anywhere. Like your internet |
|
17 |
+service provider. Or your favorite website, which may be disclosing your |
|
18 |
+shopping patterns. Or maybe a politically rigid government is compiling |
|
19 |
+a list of its citizens reading outlawed journals. </p> |
|
20 |
+ |
|
21 |
+<p>These activities are commonly called "traffic analysis" and |
|
22 |
+corporations, governments and other parties are becoming increasingly |
|
23 |
+sophisticated at it. While these organizations remain vague in their |
|
24 |
+intentions, their affect on Internet users is clear. For some people, |
|
25 |
+this electronic spying is a nuisance that can affect their pocketbook; |
|
26 |
+for others, it could jeopardize their personal security.</p> |
|
27 |
+ |
|
28 |
+<p>Since 2001, the Tor Project has been developing free and open-source |
|
29 |
+software that helps provide anonymity for Internet users. It works by |
|
30 |
+allowing users to travel the web on a circuitous route on a set of |
|
31 |
+servers positioned around the world. When you use Tor, your route on |
|
32 |
+the Internet appears haphazard, so snoops have a difficult time |
|
33 |
+following your path and seizing vital information. Tor also has special |
|
34 |
+functionality, called hidden services, that allows users to publish to |
|
35 |
+websites without revealing their location.</p> |
|
36 |
+ |
|
37 |
+<p>Tor is compatible with different operating systems, such as Microsoft |
|
38 |
+Windows, Apple Mac, and various versions of Linux Tor works with most |
|
39 |
+programs that connect your computer to the Internet.</p> |
|
40 |
+ |
|
41 |
+<p>Today, Tor is used by hundreds of thousands of people to protect their |
|
42 |
+activities online. This could be journalists or human rights workers in |
|
43 |
+politically rigid countries communicating with whistle blowers and |
|
44 |
+dissidents. Law enforcement officers on Internet sting operations stay |
|
45 |
+anonymous with Tor. As do people wanting to post socially sensitive |
|
46 |
+information in chat rooms, like rape or abuse survivors and those with |
|
47 |
+illnesses. The Tor Network also provides protection for people looking |
|
48 |
+for another layer of privacy from the millions of websites bent on |
|
49 |
+collecting private information and tracking their moves online.</p> |
|
50 |
+ |
|
51 |
+<h2>Why Tor Needs You</h2> |
|
52 |
+<hr /> |
|
53 |
+<p>Other than a few developers, the Tor Project is largely run by |
|
54 |
+volunteers. To help keep Tor's worldwide server network running and its |
|
55 |
+open source software up-to-date, the Tor project is looking for new |
|
56 |
+sponsors and funding. Join organizations like Google, Bell Security |
|
57 |
+Solutions, Cyber Threat-Analytics, the National Science Foundation, the |
|
58 |
+NLnet Foundation from the Netherlands, Human Rights Watch, and more than |
|
59 |
+500 individuals who have donated funds to the Tor Project.</p> |
|
60 |
+ |
|
61 |
+<p>We guarantee your money will be put to good use. For every dollar |
|
62 |
+donated to the Tor Project, 75 cents goes directly into development. We |
|
63 |
+also promise good service. Sponsors receive personal attention, better |
|
64 |
+support and the chance to influence the direction of Tor.</p> |
|
65 |
+ |
|
66 |
+<p>The Tor Project is a registered 501 (c)(3) non-profit, making donations |
|
67 |
+tax deductible for those living in the United States or those paying |
|
68 |
+taxes with charitable donation reciprocity with the U.S.</p> |
|
69 |
+ |
|
70 |
+<p>In this day and age, Tor provides a vital layer of protection for you |
|
71 |
+and your data. Your donations will help keep this project on the cutting |
|
72 |
+edge. If you have any questions about funding the Tor Project, please |
|
73 |
+contact: donations@torproject.org</p> |
|
74 |
+ |
|
75 |
+</div><!-- #main --> |
|
76 |
+ |
|
77 |
+#include <foot.wmi> |
... | ... |
@@ -2,21 +2,7 @@ |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
# Translation-Priority: 1-high |
4 | 4 |
|
5 |
-#include "head.wmi" TITLE="Tor: anonymity online" |
|
6 |
- |
|
7 |
-<!-- SIDEBAR (OPTIONAL) --> |
|
8 |
-<div class="sidebar"> |
|
9 |
-<a href="<page download>"><img src="$(IMGROOT)/download_tor.png" alt="Download Tor" /></a> |
|
10 |
- |
|
11 |
-<br /> |
|
12 |
- |
|
13 |
-<a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a> |
|
14 |
-<div class="donatebutton"> |
|
15 |
-<a href="<page donate>">Support Tor: donate!</a> |
|
16 |
-</div> |
|
17 |
- |
|
18 |
-</div> |
|
19 |
-<!-- END SIDEBAR --> |
|
5 |
+#include "head.wmi" TITLE="Tor: anonymity online" CHARSET="UTF-8" |
|
20 | 6 |
|
21 | 7 |
<div class="main-column"> |
22 | 8 |
|
... | ... |
@@ -25,6 +11,20 @@ |
25 | 11 |
<h2>Tor: anonymity online</h2> |
26 | 12 |
<hr /> |
27 | 13 |
|
14 |
+<!-- BEGIN SIDEBAR --> |
|
15 |
+<div class="sidebar"> |
|
16 |
+<h3>Summary</h3> |
|
17 |
+<p> |
|
18 |
+<p><a href="<page 30seconds>">What is Tor?</a></p> |
|
19 |
+<p><a href="<page torusers>">Who uses Tor?</a></p> |
|
20 |
+<p><a href="<page overview>">How does Tor work in detail?</a></p> |
|
21 |
+<hr /> |
|
22 |
+<div class="donatebutton"> |
|
23 |
+<p><a href="<page donate>">Donate to support Tor!</a></p> |
|
24 |
+</div> |
|
25 |
+</div> |
|
26 |
+<!-- END SIDEBAR --> |
|
27 |
+ |
|
28 | 28 |
<p>Tor is a software project that helps you defend against <a |
29 | 29 |
href="<page overview>">traffic analysis</a>, a form of network |
30 | 30 |
surveillance that threatens personal freedom and privacy, confidential |
... | ... |
@@ -5,20 +5,26 @@ |
5 | 5 |
#include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8" |
6 | 6 |
|
7 | 7 |
<div class="main-column"> |
8 |
-<h1>Who uses Tor?</h1> |
|
8 |
+ |
|
9 |
+<h2>Inception</h2> |
|
10 |
+ |
|
11 |
+<!-- BEGIN SIDEBAR --> |
|
12 |
+<div class="sidebar-left"> |
|
13 |
+<h3>Who uses Tor?</h3> |
|
9 | 14 |
<ul> |
10 |
-<li><a href="<page torusers>#normalusers">Everyday, ordinary Internet users use Tor</a></li> |
|
15 |
+<li><a href="<page torusers>#normalusers">Normal people use Tor</a></li> |
|
11 | 16 |
<li><a href="<page torusers>#military">Militaries use Tor</a></li> |
12 | 17 |
<li><a href="<page torusers>#journalist">Journalists and their audience use Tor</a></li> |
13 | 18 |
<li><a href="<page torusers>#lawenforcement">Law enforcement officers use Tor</a></li> |
14 | 19 |
<li><a href="<page torusers>#activists">Activists & Whistleblowers use Tor</a></li> |
15 |
-<li><a href="<page torusers>#spotlight">Both high and low profile people use Tor</a></li> |
|
20 |
+<li><a href="<page torusers>#spotlight">High & low profile people use Tor</a></li> |
|
16 | 21 |
<li><a href="<page torusers>#executives">Business executives use Tor</a></li> |
17 | 22 |
<li><a href="<page torusers>#bloggers">Bloggers use Tor</a></li> |
18 | 23 |
</ul> |
19 |
-<p> |
|
24 |
+</div> |
|
25 |
+<!-- END SIDEBAR --> |
|
20 | 26 |
|
21 |
-<h2>Inception</h2> |
|
27 |
+<hr /> |
|
22 | 28 |
<p> |
23 | 29 |
Tor was originally designed, implemented, and deployed as a third-generation |
24 | 30 |
<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>. |
... | ... |
@@ -27,7 +33,8 @@ Today, it is used every day for a wide variety of purposes by the military, jour |
27 | 33 |
</p> |
28 | 34 |
|
29 | 35 |
<a name="normalusers"></a> |
30 |
-<h2><a class="anchor" href="#normalusers">Everyday, ordinary Internet users use Tor</a></h2> |
|
36 |
+<h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2> |
|
37 |
+<hr /> |
|
31 | 38 |
<ul> |
32 | 39 |
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
33 | 40 |
Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month"> |
... | ... |
@@ -58,6 +65,7 @@ or world religions is behind a national firewall. |
58 | 65 |
|
59 | 66 |
<a name="military"></a> |
60 | 67 |
<h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
68 |
+<hr /> |
|
61 | 69 |
<ul> |
62 | 70 |
|
63 | 71 |
<li> |
... | ... |
@@ -84,6 +92,7 @@ to record a military address, thereby revealing the surveillance. |
84 | 92 |
|
85 | 93 |
<a name="journalist"></a> |
86 | 94 |
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> |
95 |
+<hr /> |
|
87 | 96 |
<ul> |
88 | 97 |
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
89 | 98 |
tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise |
... | ... |
@@ -108,6 +117,7 @@ avoid risking the personal consequences of intellectual curiosity. |
108 | 117 |
|
109 | 118 |
<a name="lawenforcement"></a> |
110 | 119 |
<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2> |
120 |
+<hr /> |
|
111 | 121 |
<ul> |
112 | 122 |
<li><strong>Online surveillance:</strong> |
113 | 123 |
Tor allows officials to surf questionable web sites and services |
... | ... |
@@ -133,6 +143,7 @@ do not encourage anonymity are limiting the sources of their tips. |
133 | 143 |
|
134 | 144 |
<a name="activists"></a> |
135 | 145 |
<h2><a class="anchor" href="#activists">Activists & Whistleblowers use Tor</a></h2> |
146 |
+<hr /> |
|
136 | 147 |
<ul> |
137 | 148 |
<li><strong>Human rights activists use Tor to anonymously report abuses from |
138 | 149 |
danger zones.</strong> Internationally, labor rights workers use Tor and other |
... | ... |
@@ -198,7 +209,8 @@ to help organize a strike. |
198 | 209 |
</ul> |
199 | 210 |
|
200 | 211 |
<a name="spotlight"></a> |
201 |
-<h2><a class="anchor" href="#spotlight">Both high and low profile people use Tor</a></h2> |
|
212 |
+<h2><a class="anchor" href="#spotlight">High & low profile people use Tor</a></h2> |
|
213 |
+<hr /> |
|
202 | 214 |
<ul> |
203 | 215 |
<li>Does being in the public spotlight shut you off from having a private |
204 | 216 |
life, forever, online? A rural lawyer in a New England state keeps |
... | ... |
@@ -229,6 +241,7 @@ changed, and how the population sees this continuing into the future. |
229 | 241 |
|
230 | 242 |
<a name="executives"></a> |
231 | 243 |
<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2> |
244 |
+<hr /> |
|
232 | 245 |
<ul> |
233 | 246 |
<li><strong>Security breach information clearinghouses:</strong> |
234 | 247 |
Say a financial institution participates in a security clearinghouse |
... | ... |
@@ -265,6 +278,7 @@ into whistleblowing. |
265 | 278 |
|
266 | 279 |
<a name="bloggers"></a> |
267 | 280 |
<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2> |
281 |
+<hr /> |
|
268 | 282 |
<ul> |
269 | 283 |
<li>Every day we hear about bloggers who are |
270 | 284 |
<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or |
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
body { |
2 |
- background-color: #FFFFFF; |
|
2 |
+ background-color: white; |
|
3 | 3 |
margin-top: 0px; |
4 | 4 |
font-family: Arial, Helvetica, sans-serif; |
5 | 5 |
font-size: 1em; |
... | ... |
@@ -75,18 +75,29 @@ div.bottom { |
75 | 75 |
text-align: right; |
76 | 76 |
} |
77 | 77 |
|
78 |
-/* the sidebar */ |
|
78 |
+/* the sidebars */ |
|
79 | 79 |
|
80 | 80 |
div.sidebar { |
81 |
+ background-color: #e5e5e5; |
|
81 | 82 |
float: right; |
82 |
- padding-top: 10px; |
|
83 |
- padding-right: 10px; |
|
84 |
- padding-bottom: 15px; |
|
85 |
- padding-left: 10px; |
|
86 |
- width: 260px; |
|
83 |
+ margin: 0 0 10px 10px; |
|
84 |
+ /* border: 2px solid #666; */ |
|
85 |
+ padding: 10px; |
|
86 |
+ width: 150px; |
|
87 | 87 |
text-align: center; |
88 | 88 |
} |
89 | 89 |
|
90 |
+div.sidebar-left { |
|
91 |
+ background-color: #e5e5e5; |
|
92 |
+ float: right; |
|
93 |
+ margin: 0 0 5px 5px; |
|
94 |
+ /* border: 2px solid #666; */ |
|
95 |
+ padding: 5px; |
|
96 |
+ width: 275px; |
|
97 |
+ text-align: left; |
|
98 |
+} |
|
99 |
+ |
|
100 |
+ |
|
90 | 101 |
|
91 | 102 |
/* The main column (left text) */ |
92 | 103 |
|
... | ... |
@@ -24,7 +24,7 @@ |
24 | 24 |
body { |
25 | 25 |
background-color: #FFFFFF; |
26 | 26 |
margin-top: 0px; |
27 |
- font-family: Arial, Helvetica, sans-serif; |
|
27 |
+ font-family: Helvetica, Arial, sans-serif; |
|
28 | 28 |
font-size: 1em; |
29 | 29 |
font-style: normal; |
30 | 30 |
color: #000000; |
... | ... |
@@ -101,12 +101,12 @@ div.bottom { |
101 | 101 |
/* the sidebar */ |
102 | 102 |
|
103 | 103 |
div.sidebar { |
104 |
+ /* background-color: #80c97f; */ |
|
104 | 105 |
float: right; |
105 |
- padding-top: 10px; |
|
106 |
- padding-right: 10px; |
|
107 |
- padding-bottom: 15px; |
|
108 |
- padding-left: 10px; |
|
109 |
- width: 260px; |
|
106 |
+ margin: 0 0 10px 10px; |
|
107 |
+ border: 1px solid #666; |
|
108 |
+ padding: 10px; |
|
109 |
+ width: 150px; |
|
110 | 110 |
text-align: center; |
111 | 111 |
} |
112 | 112 |
|
... | ... |
@@ -267,10 +266,10 @@ td.banner-right { |
267 | 266 |
display: block; |
268 | 267 |
padding: 6px; |
269 | 268 |
background-color: #00802B; |
270 |
- border-top: 1px solid #00A838; |
|
269 |
+ /* border-top: 1px solid #00A838; |
|
271 | 270 |
border-left: 1px solid #00A838; |
272 | 271 |
border-bottom: 1px solid #00591E; |
273 |
- border-right: 1px solid #00591E; |
|
272 |
+ border-right: 1px solid #00591E; */ |
|
274 | 273 |
color: #FFFFFF; |
275 | 274 |
} |
276 | 275 |
|
277 | 276 |