formatting changes to torusers
Andrew Lewman

Andrew Lewman commited on 2007-12-13 02:22:29
Zeige 1 geänderte Dateien mit 39 Einfügungen und 74 Löschungen.

... ...
@@ -16,7 +16,7 @@ great for users, but not so good for us, since publishing success
16 16
 stories about how people or organizations are staying anonymous could be
17 17
 counterproductive.  As an example, we talked to an FBI officer who explained that he uses Tor every day for his
18 18
 work &mdash; but he quickly followed up with a request not to provide details or mention his name.</p>
19
-<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and evil.  You have probably seen at least some of the vigorous debate
19
+<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and evil.  You have probably seen some of the vigorous debate
20 20
 (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
21 21
 <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
22 22
 and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
... ...
@@ -24,45 +24,35 @@ over anonymity. The Tor project is based on the belief that anonymity is not jus
24 24
 <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
25 25
 <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
26 26
 <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
27
-and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support port 25 to prevent anonymous email spamming), or if you're one of the
28
-<a
29
-href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
27
+and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
28
+are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
29
+the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
30
+purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
31
+<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
30 32
 you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:</p>
31 33
 
32 34
 <h2>Everyday, ordinary Internet surfers use Tor</h2>
33 35
 <ul>
34
-<li>
35
-<strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
36
-Internet Service Providers (ISPs)
37
-<a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
36
+<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
37
+Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
38 38
 sell your Internet browsing records</a> to marketers or anyone else willing to pay for it. They typically say that 
39
-they anonymize it by not providing your username or personally 
40
-identifiable information, but
39
+they anonymize it by not providing your username or personally identifiable information, but
41 40
 <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.
42 41
 A full record of every site you visit, the text of every search you perform, and potentially 
43
-userid and even password information can still be part of this data.
44
-In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>)
45
-you visit have their own logs,
46
-containing the same or more information.
42
+userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
47 43
 </li>
48
-<li>
49
-<strong> They protect their communications from irresponsible corporations.</strong>
50
-All over the net, Tor is being recommended to people newly concerned
51
-about their privacy in the face of increasing breaches and betrayals of
44
+<li><strong> They protect their communications from irresponsible corporations.</strong>
45
+All over the net, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
52 46
 private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
53 47
 <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
54 48
 your data is often not well protected by those you are supposed to trust to keep it safe.
55 49
 </li>
56
-<li>
57
-<strong>They protect their children online.</strong>
50
+<li><strong>They protect their children online.</strong>
58 51
 You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
59
-by not concealing their IP address. Increasingly, IP addresses can be
60
-<a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>,
61
-and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
52
+by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
62 53
 In the United States the government is pushing to make this mapping increasingly precise.
63 54
 </li>
64
-<li>
65
-<strong>They research sensitive topics.</strong>
55
+<li><strong>They research sensitive topics.</strong>
66 56
 There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
67 57
 <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
68 58
 or world religions is behind a national firewall.  Or perhaps you are worried that if you research a particular set of
... ...
@@ -73,13 +63,11 @@ you had suspicions of a pre-existing condition.
73 63
 
74 64
 <h2>Militaries use Tor</h2>
75 65
 <ul>
76
-<li>
77
-<strong>Field agents:</strong>
66
+<li><strong>Field agents:</strong>
78 67
 Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research
79 68
 Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
80 69
 </li>
81
-<li>
82
-<strong>Hidden services:</strong>
70
+<li><strong>Hidden services:</strong>
83 71
 When the Internet was designed by DARPA, its primary purpose was to
84 72
 be able to facilitate distributed, robust communications in case of
85 73
 local strikes.  However, some functions must be centralized, such as
... ...
@@ -88,8 +76,7 @@ reveal the geographic location of any server that is reachable online.
88 76
 Tor's hidden services capacity allows military command and
89 77
 control to be physically secure from discovery and takedown.
90 78
 </li>
91
-<li>
92
-<strong>Intelligence gathering:</strong>
79
+<li><strong>Intelligence gathering:</strong>
93 80
 Military personnel need to use electronic resources run and monitored
94 81
 by insurgents. Obviously, they do not want the server logs on an insurgent
95 82
 website to show a military address, revealing their surveillance.
... ...
@@ -102,15 +89,13 @@ website to show a military address, revealing their surveillance.
102 89
 tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
103 90
 journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
104 91
 </li>
105
-<li>
106
-<strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> 
92
+<li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> 
107 93
 (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
108 94
 safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
109 95
 the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
110 96
 economics and religion.
111 97
 </li>
112
-<li>
113
-Although we often think of foreign journalists working in far off lands,
98
+<li>Although we often think of foreign journalists working in far off lands,
114 99
 <strong>citizen journalists in China and other <a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
115 100
 use Tor to write about local events</strong> and to encourage social change and political reform, more secure that there will not be a knock
116 101
 on the door at midnight.
... ...
@@ -119,23 +104,20 @@ on the door at midnight.
119 104
 
120 105
 <h2>Law enforcement officers use Tor</h2>
121 106
 <ul>
122
-<li>
123
-<strong>Online surveillance:</strong>
107
+<li><strong>Online surveillance:</strong>
124 108
 Tor allows officials to surf questionable web sites and services
125 109
 without leaving tell-tale tracks.  If the system administrator of an
126 110
 illegal gambling site, for example, were to see multiple connections from
127 111
 governmental or law enforcement computers in usage logs, investigations
128 112
 would be hampered.
129 113
 </li>
130
-<li>
131
-<strong>Sting operations:</strong>
114
+<li><strong>Sting operations:</strong>
132 115
 Similarly, anonymity allows law officers to engage in online
133 116
 &ldquo;undercover &rdquo; operations.  Regardless of how good an
134 117
 undercover officer's &ldquo;street cred&rdquo; may be, if his or her
135 118
 email headers include nypd.nyc.ny.state.us, his or her cover is blown.
136 119
 </li>
137
-<li>
138
-<strong>Truly anonymous tip lines:</strong>
120
+<li><strong>Truly anonymous tip lines:</strong>
139 121
 While online anonymous tip lines are popular, without anonymity
140 122
 software, they are far less useful.  Sophisticated sources understand that
141 123
 although a name or email address is not attached to information, server
... ...
@@ -146,22 +128,19 @@ do not encourage anonymity are limiting the sources of their tips.
146 128
 
147 129
 <h2>Activists &amp; whistleblowers use Tor</h2>
148 130
 <ul>
149
-<li>
150
-<strong>Human rights activists use Tor to anonymously report abuses from
131
+<li><strong>Human rights activists use Tor to anonymously report abuses from
151 132
 danger zones.</strong>  Internationally, labor rights workers use Tor and other
152 133
 forms of online and offline anonymity to organize workers in accordance
153 134
 with the Universal Declaration of Human Rights. Even though they are within
154 135
 the law, it does not mean they are safe. Tor provides the ability to
155 136
 avoid persecution while still raising a voice.
156 137
 </li>
157
-<li>
158
-When groups such as the <strong>Friends Service Committee and environmental
138
+<li>When groups such as the <strong>Friends Service Committee and environmental
159 139
 groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
160 140
 in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of
161 141
 change rely on Tor for basic privacy during legitimate activities.
162 142
 </li>
163
-<li>
164
-<strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
143
+<li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
165 144
 recommends Tor in their report, &ldquo;
166 145
 <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
167 146
 Complicity in Chinese Internet Censorship</a>.&rdquo; The study
... ...
@@ -171,42 +150,36 @@ href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Grea
171 150
 Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
172 151
 the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
173 152
 </li>
174
-<li>
175
-Tor has consulted with and volunteered help to <strong>Amnesty International's
153
+<li> Tor has consulted with and volunteered help to <strong>Amnesty International's
176 154
 recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
177 155
 See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
178 156
 report</a> on China Internet issues.
179 157
 </li>
180
-<li>
181
-<a href="http://www.globalvoicesonline.org">Global Voices</a>
158
+<li><a href="http://www.globalvoicesonline.org">Global Voices</a>
182 159
 can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,
183 160
 throughout their <a href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
184 161
 web site.</a>
185 162
 </li>
186
-<li>
187
-In the US, the Supreme Court recently stripped legal protections from
163
+<li>In the US, the Supreme Court recently stripped legal protections from
188 164
 government whistleblowers.  But whistleblowers working for governmental
189 165
 transparency or corporate accountability can use Tor to seek justice
190 166
 without personal repercussions.
191 167
 </li>
192
-<li>
193
-A contact of ours who works with a public health nonprofit in
168
+<li>A contact of ours who works with a public health nonprofit in
194 169
 Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
195 170
 mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
196 171
 not afford to complain &mdash; this is the point at which open objection can
197 172
 become dangerous.  So his nonprofit has been working to
198 173
 <strong>use Tor to safely whistleblow on governmental corruption</strong> in order to continue their work.
199 174
 </li>
200
-<li>
201
-At a recent conference, a Tor staffer ran into a woman who came from
175
+<li>At a recent conference, a Tor staffer ran into a woman who came from
202 176
 a &ldquo;company town&rdquo; in the eastern United States. She was attempting to blog anonymously to rally
203 177
 local residents to <strong>urge reform on the company</strong> that dominated the town's
204 178
 economic and governmental affairs, fully cognizant that the kind of
205 179
 organizing she was doing <strong>could lead to harm or &ldquo;fatal
206 180
 accidents.&rdquo;</strong>
207 181
 </li>
208
-<li>
209
-In east Asia, some labor organizers use anonymity to <strong>reveal information
182
+<li>In east Asia, some labor organizers use anonymity to <strong>reveal information
210 183
 regarding sweatshops</strong> that produce goods for western countries and to
211 184
 organize local labor.
212 185
 </li>
... ...
@@ -215,8 +188,7 @@ organize local labor.
215 188
 
216 189
 <h2>Both high and low profile people use Tor</h2>
217 190
 <ul>
218
-<li>
219
-Does being in the public spotlight shut you off from having a private
191
+<li>Does being in the public spotlight shut you off from having a private
220 192
 life, forever, online?  A rural lawyer in a small New England state keeps
221 193
 an anonymous blog because, with the diverse clientele at his prestigious
222 194
 law firm, <strong>his political beliefs are bound to offend someone</strong>.  Yet, he
... ...
@@ -229,8 +201,7 @@ public role.
229 201
 write were to get back to your boss, would you lose your job?  If your
230 202
 social worker read about your opinion of the system, would she treat
231 203
 you differently?  Anonymity gives a voice to the voiceless.
232
-To support this,
233
-<strong>Tor currently has an open Americorps/VISTA position</strong> pending.  This
204
+To support this, <strong>Tor currently has an open Americorps/VISTA position</strong> pending.  This
234 205
 government grant will cover a full time stipend for a volunteer to create
235 206
 curricula to <strong>show low-income populations how to use anonymity online for
236 207
 safer civic engagement</strong>.  Although it's often said that the poor do not use
... ...
@@ -246,8 +217,7 @@ changed, and how the population sees this continuing into the future.
246 217
 
247 218
 <h2>Business executives use Tor</h2>
248 219
 <ul>
249
-<li>
250
-<strong>Security breach information clearinghouses:</strong>
220
+<li><strong>Security breach information clearinghouses:</strong>
251 221
 Say a financial institution participates in a security clearinghouse
252 222
 of information on Internet attacks.  Such a repository requires members
253 223
 to report breaches to a central group, who correlates attacks to detect
... ...
@@ -258,24 +228,21 @@ coming from.  Even though every packet were encrypted, the Internet
258 228
 address would betray the location of a compromised system.  Tor allows
259 229
 such repositories of sensitive information to resist compromises.
260 230
 </li>
261
-<li>
262
-<strong>Seeing your competition as your market does:</strong>
231
+<li><strong>Seeing your competition as your market does:</strong>
263 232
 If you try to check out a competitor's pricing, you may find no
264 233
 information or misleading information on their web site.  This is because
265 234
 their web server may be keyed to detect connections from competitors,
266 235
 and block or spread disinformation to your staff.  Tor allows a business
267 236
 to view their sector as the general public would view it.
268 237
 </li>
269
-<li>
270
-<strong>Keeping strategies confidential:</strong>
238
+<li><strong>Keeping strategies confidential:</strong>
271 239
 An investment bank, for example, might not want industry snoopers to be
272 240
 able to track what web sites their analysts are watching.  The strategic
273 241
 importance of traffic patterns, and the vulnerability of the surveillance
274 242
 of such data, is starting to be more widely recognized in several areas
275 243
 of the business world.
276 244
 </li>
277
-<li>
278
-<strong>Accountability:</strong>
245
+<li><strong>Accountability:</strong>
279 246
 In an age when irresponsible and unreported corporate activity has
280 247
 undermined multi-billion dollar businesses, an executive exercising true
281 248
 stewardship wants the whole staff to feel free to disclose internal
... ...
@@ -284,11 +251,9 @@ into whistleblowing.
284 251
 </li>
285 252
 </ul>
286 253
 
287
-
288 254
 <h2>Bloggers use Tor</h2>
289 255
 <ul>
290
-<li>
291
-Every day we hear about bloggers who are
256
+<li>Every day we hear about bloggers who are
292 257
 <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
293 258
 <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
294 259
 for saying perfectly legal things online, in their blog.  In addition to following
295 260