selectively apply a patch from rransom to torusers
Andrew Lewman

Andrew Lewman commited on 2010-10-11 02:11:28
Zeige 1 geänderte Dateien mit 43 Einfügungen und 43 Löschungen.

... ...
@@ -18,7 +18,7 @@
18 18
     Tor was originally designed, implemented, and deployed as a
19 19
     third-generation <a href="http://www.onion-router.net/">onion routing
20 20
     project of the Naval Research Laboratory</a>.  It was originally
21
-    developed with the U.S. Navy in mind, primarily for the purpose of
21
+    developed with the U.S. Navy in mind, for the primary purpose of
22 22
     protecting government communications.  Today, it is used every day
23 23
     for a wide variety of purposes by the military, journalists, law
24 24
     enforcement officers, activists, and many others. Here are some of
... ...
@@ -31,8 +31,8 @@
31 31
     <hr>
32 32
     <ul>
33 33
     <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
34
-    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">sell
35
-    your Internet browsing records</a> to marketers and anyone else
34
+    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
35
+    sell your Internet browsing records</a> to marketers or anyone else
36 36
     willing to pay for it. ISPs typically say that
37 37
     they anonymize the data by not providing personally identifiable information, but
38 38
     <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
... ...
@@ -47,7 +47,7 @@
47 47
     </li>
48 48
     <li><strong>They protect their children online.</strong>
49 49
     You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
50
-    by not concealing their IP address. Increasingly, IP addresses can literally be <a href="http://whatismyipaddress.com/">mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
50
+    by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
51 51
     In the United States, the government is pushing to make this mapping increasingly precise.
52 52
     </li>
53 53
     <li><strong>They research sensitive topics.</strong>
... ...
@@ -74,20 +74,20 @@
74 74
     </li>
75 75
     
76 76
     <li><strong>Hidden services:</strong>
77
-    When the Internet was designed by DARPA, its primary purpose was to facilitate distributed, robust communications in case of
78
-    local strikes.  However, some functions must be centralized, such as command and control sites.  By their nature, Internet protocols
79
-    reveal the geographic location of any server that is reachable online.  Tor's <a href="<page docs/hidden-services>">hidden service capability</a> allows military command and
77
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
78
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
79
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
80 80
     control to be physically secure from discovery and takedown.
81 81
     </li>
82 82
     <li><strong>Intelligence gathering:</strong>
83 83
     Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
84
-    to record a military address, thereby revealing that the site is under surveillance.
84
+    to record a military address, thereby revealing the surveillance.
85 85
     </li>
86 86
     </ul>
87 87
     
88 88
     <a name="journalist"></a>
89 89
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
90
-    <h2><a class="anchor" href="#journalist">Journalists and their audiences use Tor</a></h2>
90
+    <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
91 91
     <hr>
92 92
     <ul>
93 93
     <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
... ...
@@ -96,8 +96,8 @@
96 96
     </li>
97 97
     <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
98 98
     (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
99
-    safe access to free media.  Tor preserves the ability of persons behind national firewalls, or under
100
-    the surveillance of repressive regimes, to obtain a global perspective on controversial topics including democracy,
99
+    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
100
+    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
101 101
     economics and religion.
102 102
     </li>
103 103
     <li><strong>Citizen journalists in China</strong> use Tor to write about
... ...
@@ -125,13 +125,13 @@
125 125
     <li><strong>Sting operations:</strong>
126 126
     Similarly, anonymity allows law officers to engage in online
127 127
     &ldquo;undercover &rdquo; operations.  Regardless of how good an
128
-    undercover officer's &ldquo;street cred&rdquo; may be, if his
129
-    communications come from IP addresses allocated to the police, his cover is blown.
128
+    undercover officer's &ldquo;street cred&rdquo; may be, if the
129
+    communications include IP ranges from police addresses, the cover is blown.
130 130
     </li>
131 131
     <li><strong>Truly anonymous tip lines:</strong>
132 132
     While online anonymous tip lines are popular, without anonymity
133 133
     software, they are far less useful.  Sophisticated sources understand that
134
-    although a name or e-mail address is not attached to information, server
134
+    although a name or email address is not attached to information, server
135 135
     logs can identify them very quickly.  As a result, tip line web sites that
136 136
     do not encourage anonymity are limiting the sources of their tips.
137 137
     </li>
... ...
@@ -145,7 +145,7 @@
145 145
     <li><strong>Human rights activists use Tor to anonymously report abuses from
146 146
     danger zones.</strong>  Internationally, labor rights workers use Tor and other
147 147
     forms of online and offline anonymity to organize workers in accordance
148
-    with the Universal Declaration of Human Rights. Even though their actions are within
148
+    with the Universal Declaration of Human Rights. Even though they are within
149 149
     the law, it does not mean they are safe. Tor provides the ability to
150 150
     avoid persecution while still raising a voice.
151 151
     </li>
... ...
@@ -155,14 +155,14 @@
155 155
     change rely on Tor for basic privacy during legitimate activities.
156 156
     </li>
157 157
     <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
158
-    recommends Tor in their report,
159
-    &ldquo;<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
158
+    recommends Tor in their report, &ldquo;
159
+    <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
160 160
     Complicity in Chinese Internet Censorship</a>.&rdquo; The study
161 161
     co-author interviewed Roger Dingledine, Tor project leader,
162
-    regarding Tor use.  They cover Tor in the section on how to breach the <a
162
+    on Tor use.  They cover Tor in the section on how to breach the <a
163 163
     href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
164
-    Firewall of China&rdquo;</a>, and recommend that human rights workers throughout
165
-    the globe use Tor for &ldquo;secure browsing and communications&rdquo;.
164
+    Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
165
+    the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
166 166
     </li>
167 167
     <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
168 168
     recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
... ...
@@ -172,7 +172,7 @@
172 172
     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
173 173
     recommends Tor, especially for <strong>anonymous blogging</strong>,
174 174
     throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
175
-    web site</a>.
175
+    web site.</a>
176 176
     </li>
177 177
     <li>In the US, the Supreme Court recently stripped legal protections from
178 178
     government whistleblowers.  But whistleblowers working for governmental
... ...
@@ -181,8 +181,8 @@
181 181
     </li>
182 182
     <li>A contact of ours who works with a public health nonprofit in
183 183
     Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
184
-    mostly bribes and such.  When that percentage rises steeply, not only are they unable to afford the money, but they
185
-    cannot afford to complain &mdash; this is the point at which open objection can
184
+    mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
185
+    not afford to complain &mdash; this is the point at which open objection can
186 186
     become dangerous.  So his nonprofit has been working to
187 187
     <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
188 188
     </li>
... ...
@@ -191,17 +191,17 @@
191 191
     local residents to <strong>urge reform in the company</strong> that dominated the town's
192 192
     economic and government affairs. She is fully cognizant that the kind of
193 193
     organizing she was doing <strong>could lead to harm or &ldquo;fatal
194
-    accidents&rdquo;</strong>.
194
+    accidents.&rdquo;</strong>
195 195
     </li>
196 196
     <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
197
-    regarding sweatshops</strong> that produce goods for western countries, and to
197
+    regarding sweatshops</strong> that produce goods for western countries and to
198 198
     organize local labor.
199 199
     </li>
200 200
     <li>
201 201
     Tor can help activists avoid government or corporate censorship that hinders organization.
202
-    In one such case,
203
-    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">a Canadian ISP blocked access to a union website</a>
204
-    used by its own employees to help organize a strike.
202
+    In one such case, a
203
+    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
204
+    to help organize a strike.
205 205
     </li>
206 206
     </ul>
207 207
     
... ...
@@ -246,23 +246,23 @@
246 246
     of information on Internet attacks.  Such a repository requires members
247 247
     to report breaches to a central group, who correlates attacks to detect
248 248
     coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
249
-    traffic to such a repository to where the report is
250
-    sent from.  Even if every packet were encrypted, the IP
249
+    traffic to such a repository to be able to track where information is
250
+    coming from.  Even though every packet were encrypted, the IP
251 251
     address would betray the location of a compromised system.  Tor allows
252
-    such repositories of sensitive information to resist eavesdropping.
252
+    such repositories of sensitive information to resist compromises.
253 253
     </li>
254 254
     <li><strong>Seeing your competition as your market does:</strong>
255
-    If you try to check out your competitor's pricing, you may find no
255
+    If you try to check out a competitor's pricing, you may find no
256 256
     information or misleading information on their web site.  This is because
257 257
     their web server may be keyed to detect connections from competitors,
258
-    and block your staff or spread disinformation to them.  Tor allows a business
259
-    to view its sector as the general public would view it.
258
+    and block or spread disinformation to your staff.  Tor allows a business
259
+    to view their sector as the general public would view it.
260 260
     </li>
261 261
     <li><strong>Keeping strategies confidential:</strong>
262 262
     An investment bank, for example, might not want industry snoopers to be
263 263
     able to track what web sites their analysts are watching.  The strategic
264
-    importance of traffic patterns, and the vulnerability of such data
265
-    to surveillance, is starting to be more widely recognized in several areas
264
+    importance of traffic patterns, and the vulnerability of the surveillance
265
+    of such data, is starting to be more widely recognized in several areas
266 266
     of the business world.
267 267
     </li>
268 268
     <li><strong>Accountability:</strong>
... ...
@@ -290,11 +290,11 @@
290 290
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
291 291
     <hr>
292 292
     <ul>
293
-    <li>To verify IP-address-based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges to access a site. Tor can be used to verify those configurations by using an IP number outside the company's alloted IP block.</li>
294
-    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. When a log review reveals a possible violation, Tor can be used to verify the information without putting an exception into corporate security systems.</li>
293
+    <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
294
+    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
295 295
     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
296
-    <li>To access Internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the Internet while leaving standard security policies in place.</li>
297
-    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make Internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations.</li>
296
+    <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
297
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
298 298
     </ul>
299 299
     
300 300
     <p>
... ...
@@ -310,15 +310,15 @@
310 310
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
311 311
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
312 312
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
313
-    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor Project is based on the belief that anonymity is not
314
-    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The EFF maintains <a href="http://www.eff.org/issues/anonymity">a good overview of how anonymity was crucial to the founding of the United States</a>.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
313
+    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
314
+    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
315 315
     <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
316 316
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
317 317
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
318 318
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
319 319
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
320 320
     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
321
-    purposes (e.g., the majority of Tor relays do not support SMTP, in order to prevent anonymous e-mail spamming), or if you're one of the
321
+    purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
322 322
     <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
323 323
     you have better options than Tor. While not dismissing the potential abuses of Tor,
324 324
     this page shows a few of the many important ways anonymity is used online today.</p>
325 325