Update who uses tor. Good enough for exposure to the world, if arma agrees.
Andrew Lewman

Andrew Lewman commited on 2008-01-01 04:09:22
Zeige 1 geänderte Dateien mit 28 Einfügungen und 19 Löschungen.

... ...
@@ -9,16 +9,28 @@
9 9
 
10 10
 <div class="main-column">
11 11
 <h1>Who uses Tor?</h1>
12
+<ul>
13
+<li><a href="<page torusers>#normalusers">Everyday, ordinary Internet users use Tor</a></li>
14
+<li><a href="<page torusers>#military">Militaries use Tor</a></li>
15
+<li><a href="<page torusers>#journalist">Journalists and their audience use Tor</a></li>
16
+<li><a href="<page torusers>#lawenforcement">Law enforcement officers use Tor</a></li>
17
+<li><a href="<page torusers>#activists">Activists &amp; Whistleblowers use Tor</a></li>
18
+<li><a href="<page torusers>#spotlight">Both high and low profile people use Tor</a></li>
19
+<li><a href="<page torusers>#executives">Business executives use Tor</a></li>
20
+<li><a href="<page torusers>#bloggers">Bloggers use Tor</a></li>
21
+</ul>
22
+<p>
12 23
 
24
+<h2>Inception</h2>
13 25
 <p>
14 26
 Tor was originally designed, implemented, and deployed as a third-generation
15
-<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>,
16
-and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
27
+<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>.
28
+It was originally developed by, and for, the U.S. Navy for the primary purpose of protecting government communications.
17 29
 Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend.
18 30
 </p>
19 31
 
20 32
 <a link="normalusers"></a>
21
-<h2>Everyday, ordinary Internet surfers use Tor</h2>
33
+<h2><a class="anchor" href="#normalusers">Everyday, ordinary Internet users use Tor</a></h2>
22 34
 <ul>
23 35
 <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
24 36
 Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
... ...
@@ -30,7 +42,7 @@ has proven incorrect</a>.  A full record of every site you visit, the text of ev
30 42
 userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
31 43
 </li>
32 44
 <li><strong> They protect their communications from irresponsible corporations.</strong>
33
-All over the net, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
45
+All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
34 46
 private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
35 47
 <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
36 48
 your data is often not well protected by those you are supposed to trust to keep it safe.
... ...
@@ -43,14 +55,12 @@ In the United States, the government is pushing to make this mapping increasingl
43 55
 <li><strong>They research sensitive topics.</strong>
44 56
 There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
45 57
 <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
46
-or world religions is behind a national firewall.  Or perhaps you are worried that if you research a particular set of
47
-symptoms, at some later date an insurance company might buy the logs of the websites you visited and establish that
48
-you had suspicions of a pre-existing condition.
58
+or world religions is behind a national firewall.  
49 59
 </li>
50 60
 </ul>
51 61
 
52 62
 <a link="military"></a>
53
-<h2>Militaries use Tor</h2>
63
+<h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
54 64
 <ul>
55 65
 
56 66
 <li>
... ...
@@ -58,7 +68,7 @@ you had suspicions of a pre-existing condition.
58 68
 It is not difficult for insurgents to monitor internet traffic and
59 69
 discover all the hotels and other locations from which people are
60 70
 connecting to known military servers.
61
-Military field agents deployed away from home have used Tor to
71
+Military field agents deployed away from home use Tor to
62 72
 mask the sites they are visiting, protecting military interests and
63 73
 operations, as well as protecting themselves from physical harm.
64 74
 </li>
... ...
@@ -76,7 +86,7 @@ to record a military address, thereby revealing the surveillance.
76 86
 </ul>
77 87
 
78 88
 <a link="journalist"></a>
79
-<h2>Journalists and their audience use Tor</h2>
89
+<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
80 90
 <ul>
81 91
 <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
82 92
 tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
... ...
@@ -100,7 +110,7 @@ avoid risking the personal consequences of intellectual curiosity.
100 110
 </ul>
101 111
 
102 112
 <a link="lawenforcement"></a>
103
-<h2>Law enforcement officers use Tor</h2>
113
+<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
104 114
 <ul>
105 115
 <li><strong>Online surveillance:</strong>
106 116
 Tor allows officials to surf questionable web sites and services
... ...
@@ -113,7 +123,7 @@ may be hampered.
113 123
 Similarly, anonymity allows law officers to engage in online
114 124
 &ldquo;undercover &rdquo; operations.  Regardless of how good an
115 125
 undercover officer's &ldquo;street cred&rdquo; may be, if the 
116
-communications include nypd.nyc.ny.state.us, the cover is blown.
126
+communications include IP ranges from police addresses, the cover is blown.
117 127
 </li>
118 128
 <li><strong>Truly anonymous tip lines:</strong>
119 129
 While online anonymous tip lines are popular, without anonymity
... ...
@@ -125,7 +135,7 @@ do not encourage anonymity are limiting the sources of their tips.
125 135
 </ul>
126 136
 
127 137
 <a link="activists"></a>
128
-<h2>Activists &amp; whistleblowers use Tor</h2>
138
+<h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
129 139
 <ul>
130 140
 <li><strong>Human rights activists use Tor to anonymously report abuses from
131 141
 danger zones.</strong>  Internationally, labor rights workers use Tor and other
... ...
@@ -191,7 +201,7 @@ to help organize a strike.
191 201
 </ul>
192 202
 
193 203
 <a link="spotlight"></a>
194
-<h2>Both high and low profile people use Tor</h2>
204
+<h2><a class="anchor" href="#spotlight">Both high and low profile people use Tor</a></h2>
195 205
 <ul>
196 206
 <li>Does being in the public spotlight shut you off from having a private
197 207
 life, forever, online?  A rural lawyer in a New England state keeps
... ...
@@ -221,14 +231,13 @@ changed, and how the population sees this continuing into the future.
221 231
 </ul>
222 232
 
223 233
 <a link="executives"></a>
224
-<h2>Business executives use Tor</h2>
234
+<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
225 235
 <ul>
226 236
 <li><strong>Security breach information clearinghouses:</strong>
227 237
 Say a financial institution participates in a security clearinghouse
228 238
 of information on Internet attacks.  Such a repository requires members
229 239
 to report breaches to a central group, who correlates attacks to detect
230
-coordinated patterns and send out alerts.  But if a specific bank in
231
-St. Louis is breached, they don't want an attacker watching the incoming
240
+coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
232 241
 traffic to such a repository to be able to track where information is
233 242
 coming from.  Even though every packet were encrypted, the IP
234 243
 address would betray the location of a compromised system.  Tor allows
... ...
@@ -258,7 +267,7 @@ into whistleblowing.
258 267
 </ul>
259 268
 
260 269
 <a link="bloggers"></a>
261
-<h2>Bloggers use Tor</h2>
270
+<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
262 271
 <ul>
263 272
 <li>Every day we hear about bloggers who are
264 273
 <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
... ...
@@ -293,6 +302,6 @@ the possible abuse cases for Tor, but suffice it to say that if you want to abus
293 302
 purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
294 303
 <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
295 304
 you have better options than Tor. While not dismissing the potential abuses of Tor,
296
-this page shows a few of the many important ways anonymity is used today.</p>
305
+this page shows a few of the many important ways anonymity is used online today.</p>
297 306
 </div>
298 307
 #include <foot.wmi>
299 308