Andrew Lewman commited on 2009-12-08 07:56:43
Zeige 1 geänderte Dateien mit 18 Einfügungen und 0 Löschungen.
| ... | ... |
@@ -22,6 +22,7 @@ |
| 22 | 22 |
<li><a href="<page faq-abuse>#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li> |
| 23 | 23 |
<li><a href="<page faq-abuse>#Bans">I want to ban the Tor network from my service.</a></li> |
| 24 | 24 |
<li><a href="<page faq-abuse>#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li> |
| 25 |
+<li><a href="<page faq-abuse>#RemovingContent">I want some content removed from a .onion address.</a></li> |
|
| 25 | 26 |
<li><a href="<page faq-abuse>#LegalQuestions">I have legal questions about Tor abuse.</a></li> |
| 26 | 27 |
</ul> |
| 27 | 28 |
</div> |
| ... | ... |
@@ -341,6 +342,23 @@ interviewing suspects, surveillance and keyboard taps, writing style |
| 341 | 342 |
analysis, sting operations, and other physical investigations. |
| 342 | 343 |
</p> |
| 343 | 344 |
|
| 345 |
+<a id="ContentRemoval"></a> |
|
| 346 |
+<h3><a class="anchor" href="#ContentRemoval">I want some content removed from a .onion address.</a></h3> |
|
| 347 |
+<p>The Tor Project does not host, control, nor have the ability to |
|
| 348 |
+discover the owner or location of a .onion address. The .onion address is |
|
| 349 |
+an address from <a href="<page docs/tor-hidden-service>">a hidden |
|
| 350 |
+service</a>. The name you see ending in .onion is a hidden service descriptor. |
|
| 351 |
+It's an automatically generated name which can be located on any Tor |
|
| 352 |
+relay or client anywhere on the Internet. Hidden services are designed |
|
| 353 |
+to protect both the user and service provider from discovering who they |
|
| 354 |
+are and where they are from. The design of hidden services means the |
|
| 355 |
+owner and location of the .onion site is hidden even from us.</p> |
|
| 356 |
+<p>But remember that this doesn't mean that hidden services are |
|
| 357 |
+invulnerable. Traditional police techniques can still be very effective |
|
| 358 |
+against them, such as interviewing suspects, surveillance and keyboard |
|
| 359 |
+taps, writing style analysis, sting operations, and other physical |
|
| 360 |
+investigations.</p> |
|
| 361 |
+ |
|
| 344 | 362 |
<a id="LegalQuestions"></a> |
| 345 | 363 |
<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3> |
| 346 | 364 |
|
| 347 | 365 |