Andrew Lewman commited on 2008-01-01 04:09:22
Zeige 1 geänderte Dateien mit 28 Einfügungen und 19 Löschungen.
... | ... |
@@ -9,16 +9,28 @@ |
9 | 9 |
|
10 | 10 |
<div class="main-column"> |
11 | 11 |
<h1>Who uses Tor?</h1> |
12 |
+<ul> |
|
13 |
+<li><a href="<page torusers>#normalusers">Everyday, ordinary Internet users use Tor</a></li> |
|
14 |
+<li><a href="<page torusers>#military">Militaries use Tor</a></li> |
|
15 |
+<li><a href="<page torusers>#journalist">Journalists and their audience use Tor</a></li> |
|
16 |
+<li><a href="<page torusers>#lawenforcement">Law enforcement officers use Tor</a></li> |
|
17 |
+<li><a href="<page torusers>#activists">Activists & Whistleblowers use Tor</a></li> |
|
18 |
+<li><a href="<page torusers>#spotlight">Both high and low profile people use Tor</a></li> |
|
19 |
+<li><a href="<page torusers>#executives">Business executives use Tor</a></li> |
|
20 |
+<li><a href="<page torusers>#bloggers">Bloggers use Tor</a></li> |
|
21 |
+</ul> |
|
22 |
+<p> |
|
12 | 23 |
|
24 |
+<h2>Inception</h2> |
|
13 | 25 |
<p> |
14 | 26 |
Tor was originally designed, implemented, and deployed as a third-generation |
15 |
-<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>, |
|
16 |
-and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications. |
|
27 |
+<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>. |
|
28 |
+It was originally developed by, and for, the U.S. Navy for the primary purpose of protecting government communications. |
|
17 | 29 |
Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend. |
18 | 30 |
</p> |
19 | 31 |
|
20 | 32 |
<a link="normalusers"></a> |
21 |
-<h2>Everyday, ordinary Internet surfers use Tor</h2> |
|
33 |
+<h2><a class="anchor" href="#normalusers">Everyday, ordinary Internet users use Tor</a></h2> |
|
22 | 34 |
<ul> |
23 | 35 |
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
24 | 36 |
Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month"> |
... | ... |
@@ -30,7 +42,7 @@ has proven incorrect</a>. A full record of every site you visit, the text of ev |
30 | 42 |
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information. |
31 | 43 |
</li> |
32 | 44 |
<li><strong> They protect their communications from irresponsible corporations.</strong> |
33 |
-All over the net, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of |
|
45 |
+All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of |
|
34 | 46 |
private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to |
35 | 47 |
<a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>, |
36 | 48 |
your data is often not well protected by those you are supposed to trust to keep it safe. |
... | ... |
@@ -43,14 +55,12 @@ In the United States, the government is pushing to make this mapping increasingl |
43 | 55 |
<li><strong>They research sensitive topics.</strong> |
44 | 56 |
There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control, |
45 | 57 |
<a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>, |
46 |
-or world religions is behind a national firewall. Or perhaps you are worried that if you research a particular set of |
|
47 |
-symptoms, at some later date an insurance company might buy the logs of the websites you visited and establish that |
|
48 |
-you had suspicions of a pre-existing condition. |
|
58 |
+or world religions is behind a national firewall. |
|
49 | 59 |
</li> |
50 | 60 |
</ul> |
51 | 61 |
|
52 | 62 |
<a link="military"></a> |
53 |
-<h2>Militaries use Tor</h2> |
|
63 |
+<h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
|
54 | 64 |
<ul> |
55 | 65 |
|
56 | 66 |
<li> |
... | ... |
@@ -58,7 +68,7 @@ you had suspicions of a pre-existing condition. |
58 | 68 |
It is not difficult for insurgents to monitor internet traffic and |
59 | 69 |
discover all the hotels and other locations from which people are |
60 | 70 |
connecting to known military servers. |
61 |
-Military field agents deployed away from home have used Tor to |
|
71 |
+Military field agents deployed away from home use Tor to |
|
62 | 72 |
mask the sites they are visiting, protecting military interests and |
63 | 73 |
operations, as well as protecting themselves from physical harm. |
64 | 74 |
</li> |
... | ... |
@@ -76,7 +86,7 @@ to record a military address, thereby revealing the surveillance. |
76 | 86 |
</ul> |
77 | 87 |
|
78 | 88 |
<a link="journalist"></a> |
79 |
-<h2>Journalists and their audience use Tor</h2> |
|
89 |
+<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> |
|
80 | 90 |
<ul> |
81 | 91 |
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
82 | 92 |
tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise |
... | ... |
@@ -100,7 +110,7 @@ avoid risking the personal consequences of intellectual curiosity. |
100 | 110 |
</ul> |
101 | 111 |
|
102 | 112 |
<a link="lawenforcement"></a> |
103 |
-<h2>Law enforcement officers use Tor</h2> |
|
113 |
+<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2> |
|
104 | 114 |
<ul> |
105 | 115 |
<li><strong>Online surveillance:</strong> |
106 | 116 |
Tor allows officials to surf questionable web sites and services |
... | ... |
@@ -113,7 +123,7 @@ may be hampered. |
113 | 123 |
Similarly, anonymity allows law officers to engage in online |
114 | 124 |
“undercover ” operations. Regardless of how good an |
115 | 125 |
undercover officer's “street cred” may be, if the |
116 |
-communications include nypd.nyc.ny.state.us, the cover is blown. |
|
126 |
+communications include IP ranges from police addresses, the cover is blown. |
|
117 | 127 |
</li> |
118 | 128 |
<li><strong>Truly anonymous tip lines:</strong> |
119 | 129 |
While online anonymous tip lines are popular, without anonymity |
... | ... |
@@ -125,7 +135,7 @@ do not encourage anonymity are limiting the sources of their tips. |
125 | 135 |
</ul> |
126 | 136 |
|
127 | 137 |
<a link="activists"></a> |
128 |
-<h2>Activists & whistleblowers use Tor</h2> |
|
138 |
+<h2><a class="anchor" href="#activists">Activists & Whistleblowers use Tor</a></h2> |
|
129 | 139 |
<ul> |
130 | 140 |
<li><strong>Human rights activists use Tor to anonymously report abuses from |
131 | 141 |
danger zones.</strong> Internationally, labor rights workers use Tor and other |
... | ... |
@@ -191,7 +201,7 @@ to help organize a strike. |
191 | 201 |
</ul> |
192 | 202 |
|
193 | 203 |
<a link="spotlight"></a> |
194 |
-<h2>Both high and low profile people use Tor</h2> |
|
204 |
+<h2><a class="anchor" href="#spotlight">Both high and low profile people use Tor</a></h2> |
|
195 | 205 |
<ul> |
196 | 206 |
<li>Does being in the public spotlight shut you off from having a private |
197 | 207 |
life, forever, online? A rural lawyer in a New England state keeps |
... | ... |
@@ -221,14 +231,13 @@ changed, and how the population sees this continuing into the future. |
221 | 231 |
</ul> |
222 | 232 |
|
223 | 233 |
<a link="executives"></a> |
224 |
-<h2>Business executives use Tor</h2> |
|
234 |
+<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2> |
|
225 | 235 |
<ul> |
226 | 236 |
<li><strong>Security breach information clearinghouses:</strong> |
227 | 237 |
Say a financial institution participates in a security clearinghouse |
228 | 238 |
of information on Internet attacks. Such a repository requires members |
229 | 239 |
to report breaches to a central group, who correlates attacks to detect |
230 |
-coordinated patterns and send out alerts. But if a specific bank in |
|
231 |
-St. Louis is breached, they don't want an attacker watching the incoming |
|
240 |
+coordinated patterns and send out alerts. But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming |
|
232 | 241 |
traffic to such a repository to be able to track where information is |
233 | 242 |
coming from. Even though every packet were encrypted, the IP |
234 | 243 |
address would betray the location of a compromised system. Tor allows |
... | ... |
@@ -258,7 +267,7 @@ into whistleblowing. |
258 | 267 |
</ul> |
259 | 268 |
|
260 | 269 |
<a link="bloggers"></a> |
261 |
-<h2>Bloggers use Tor</h2> |
|
270 |
+<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2> |
|
262 | 271 |
<ul> |
263 | 272 |
<li>Every day we hear about bloggers who are |
264 | 273 |
<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or |
... | ... |
@@ -293,6 +302,6 @@ the possible abuse cases for Tor, but suffice it to say that if you want to abus |
293 | 302 |
purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the |
294 | 303 |
<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
295 | 304 |
you have better options than Tor. While not dismissing the potential abuses of Tor, |
296 |
-this page shows a few of the many important ways anonymity is used today.</p> |
|
305 |
+this page shows a few of the many important ways anonymity is used online today.</p> |
|
297 | 306 |
</div> |
298 | 307 |
#include <foot.wmi> |
299 | 308 |