Roger Dingledine commited on 2008-09-13 09:23:38
Zeige 1 geänderte Dateien mit 43 Einfügungen und 59 Löschungen.
... | ... |
@@ -7,6 +7,9 @@ |
7 | 7 |
|
8 | 8 |
<!-- PUT CONTENT AFTER THIS TAG --> |
9 | 9 |
|
10 |
+# Translators: you probably don't want to translate this file yet, |
|
11 |
+# since I'm hoping it will keep changing for a while. Thanks! -RD |
|
12 |
+ |
|
10 | 13 |
<h2>Tor FAQ</h2> |
11 | 14 |
<hr /> |
12 | 15 |
|
... | ... |
@@ -24,84 +27,65 @@ |
24 | 27 |
|
25 | 28 |
<a id="General"></a> |
26 | 29 |
|
27 |
-<a id="WhatIsTor"></a> |
|
28 |
-<h3><a class="anchor" href="#WhatIsTor">What is Tor?</a></h3> |
|
29 |
- |
|
30 |
-<p> |
|
31 |
-Tor is an anonymity network. It protects your privacy on the |
|
32 |
-internet. Tor uses a series of three proxies - computers (or |
|
33 |
-nodes) which communicate on your behalf using their own identifying |
|
34 |
-information - in such a way that none of them know both your identifying |
|
35 |
-information and your destination. Tor can also help people get around |
|
36 |
-restrictive firewalls which censor web content. Read the <a href="<page |
|
37 |
-overview>">Tor overview</a> to learn more about Tor and what it can do |
|
38 |
-for you. |
|
39 |
-</p> |
|
40 |
- |
|
41 | 30 |
<a id="CompatibleApplications"></a> |
42 |
-<h3><a class="anchor" href="#CompatibleApplications">What programs and |
|
43 |
-applications work with Tor?</a></h3> |
|
31 |
+<h3><a class="anchor" href="#CompatibleApplications">What programs work |
|
32 |
+with Tor?</a></h3> |
|
44 | 33 |
|
45 | 34 |
<p> |
46 |
-Tor presents a SOCKS proxy interface to applications, so any application that |
|
47 |
-supports SOCKS (versions 4, 4a and 5) can be anonymized using Tor. Most |
|
48 |
-web browsers, many instant messaging and IRC clients, SSH clients and |
|
49 |
-email clients already have built-in support for SOCKS. However, not all SOCKS |
|
50 |
-interfaces are equal. See [#SOCKSAndDNS below] for information about how some |
|
51 |
-SOCKS interfaces may leak information via DNS about where you are going on the |
|
52 |
-internet, and how you can avoid this. |
|
35 |
+There are two pieces to "Torifying" a program: connection-level anonymity |
|
36 |
+and application-level anonymity. Connection-level anonymity focuses on |
|
37 |
+making sure the application's Internet connections get sent into Tor, |
|
38 |
+so they can be anonymized. This step is normally done by configuring |
|
39 |
+the program to use your Tor client as a "socks" proxy, but there are |
|
40 |
+other ways to do it too. For application-level anonymity, you need to |
|
41 |
+make sure that the information the application sends out doesn't hurt |
|
42 |
+your privacy. (Even if the connections are being routed through Tor, you |
|
43 |
+still don't want to include sensitive information like your name.) This |
|
44 |
+second step needs to be done on a program-by-program basis, which is |
|
45 |
+why we don't yet recommend very many programs for safe use with Tor. |
|
53 | 46 |
</p> |
54 | 47 |
|
55 | 48 |
<p> |
56 |
-Since Tor does not filter message content, additional software |
|
57 |
-agents should be used to filter content. For example, <a |
|
58 |
-href="http://www.privoxy.org/">Privoxy</a> is a good HTTP proxy for |
|
59 |
-filtering dangerous or annoying web content, such as tracking scripts |
|
60 |
-and ads. |
|
49 |
+Most of our work so far has focused on the Firefox web browser. The |
|
50 |
+bundles on the <a href="<page download>">download page</a> automatically |
|
51 |
+install the <a href="<page torbutton/index>">Torbutton Firefox |
|
52 |
+extension</a> if you have Firefox installed. As of version 1.2.0, |
|
53 |
+Torbutton now takes care of a lot of the connection-level and |
|
54 |
+application-level worries. |
|
61 | 55 |
</p> |
62 | 56 |
|
63 | 57 |
<p> |
64 |
-We have compiled a <a |
|
65 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/SupportPrograms">list |
|
66 |
-of applications that help you direct your traffic |
|
67 |
-through Tor</a>, and a list of instructions for <a |
|
58 |
+There are plenty of other programs you can use with Tor, |
|
59 |
+but we haven't researched the application-level anonymity |
|
60 |
+issues on them well enough to be able to recommend a safe |
|
61 |
+configuration. Our wiki has a list of instructions for <a |
|
68 | 62 |
href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torifying |
69 |
-specific applications</a>. Please add to these lists and help us keep |
|
70 |
-them accurate! |
|
71 |
-</p> |
|
72 |
- |
|
73 |
-<a id="Volunteer"></a> |
|
74 |
-<h3><a class="anchor" href="#Volunteer">How can I help?</a></h3> |
|
75 |
- |
|
76 |
-<p> |
|
77 |
-We've set up a preliminary <a href="<page volunteer>">"volunteer" |
|
78 |
-page</a>, which lists a few ways to help. If you have something to |
|
79 |
-contribute that we haven't listed there, chances are we still need it. |
|
80 |
-</p> |
|
81 |
- |
|
82 |
-<p> |
|
83 |
-There are also more answers in the <a href="#WhySlow">Why is Tor slow?</a> |
|
84 |
-answer and the <a href="#Funding">What we need to work on</a> answer. |
|
63 |
+specific applications</a>. There's also a <a |
|
64 |
+href="https://wiki.torproject.org/noreply/TheOnionRouter/SupportPrograms">list |
|
65 |
+of applications that help you direct your traffic through Tor</a>. |
|
66 |
+Please add to these lists and help us keep them accurate! |
|
85 | 67 |
</p> |
86 | 68 |
|
87 | 69 |
<a id="WhyCalledTor"></a> |
88 | 70 |
<h3><a class="anchor" href="#WhyCalledTor">Why is it called Tor?</a></h3> |
89 | 71 |
|
90 | 72 |
<p> |
91 |
-Because Tor is the onion routing network. I kept telling people I was |
|
92 |
-working on onion routing, and they said "Neat. Which one?" Even if onion |
|
93 |
-routing has become a standard household term, this is the actual onion |
|
94 |
-routing project, started out of the Naval Research Lab. |
|
73 |
+Because Tor is the onion routing network. When we were starting the |
|
74 |
+new next-generation design and implementation of onion routing in |
|
75 |
+2001-2002, we would tell people we were working on onion routing, |
|
76 |
+and they would say "Neat. Which one?" Even if onion routing has |
|
77 |
+become a standard household term, Tor was born out of the actual <a |
|
78 |
+href="http://www.onion-router.net/">onion routing project</a> run by |
|
79 |
+the Naval Research Lab. |
|
95 | 80 |
</p> |
96 | 81 |
|
97 | 82 |
<p> |
98 |
-(Theories about recursive acronyms are ok too. It's also got a fine |
|
99 |
-translation into German.) |
|
83 |
+(It's also got a fine translation from German and Turkish.) |
|
100 | 84 |
</p> |
101 | 85 |
|
102 | 86 |
<p> |
103 |
-Note: even though it comes from an acronym, Tor is not spelled "TOR". |
|
104 |
-Only the first letter is capitalized. |
|
87 |
+Note: even though it originally came from an acronym, Tor is not spelled |
|
88 |
+"TOR". Only the first letter is capitalized. |
|
105 | 89 |
</p> |
106 | 90 |
|
107 | 91 |
<a id="Backdoor"></a> |
... | ... |
@@ -135,13 +119,13 @@ nobody messed with the distribution sites. |
135 | 119 |
|
136 | 120 |
<p> |
137 | 121 |
Also, there might be accidental bugs in Tor that could affect your |
138 |
-anonymity. We don't know of such bugs right now. If we learn of any, |
|
139 |
-we will let you know. |
|
122 |
+anonymity. We periodically find and fix anonymity-related bugs, so make |
|
123 |
+sure you keep your Tor versions up-to-date. |
|
140 | 124 |
</p> |
141 | 125 |
|
142 | 126 |
<a id="DistributingTor"></a> |
143 | 127 |
<h3><a class="anchor" href="#DistributingTor">Can I distribute Tor on |
144 |
-my magazine's CD??</a></h3> |
|
128 |
+my magazine's CD?</a></h3> |
|
145 | 129 |
|
146 | 130 |
<p> |
147 | 131 |
Yes. |
148 | 132 |