revised overview text
Roger Dingledine

Roger Dingledine commited on 2004-12-09 17:32:45
Zeige 1 geänderte Dateien mit 145 Einfügungen und 71 Löschungen.

... ...
@@ -24,50 +24,103 @@
24 24
 
25 25
 <h2>Tor: Overview</h2>
26 26
 
27
-<h3>Traffic analysis</h3>
28 27
 <p>
29
-Traffic analysis can be used to infer who is talking to whom over a
30
-public network. For example, Internet packets have a header used for
31
-routing, and a payload that carries the data. The header, which must be
32
-visible to the network (and to observers of the network), reveals the
33
-source and destination of the packet. Even if the header were obscured
34
-in some way, the packet could still be tracked as it moves through the
35
-network. Encrypting the payload is similarly ineffective, because the
36
-routing information is all an observer needs.
28
+Tor is a network-within-a-network that allows people and groups to
29
+improve their privacy and security on the Internet.  It also enables
30
+future software developers to create new kinds of communication tools
31
+that have built-in privacy features.  Tor can provide the foundation for
32
+a whole range of applications that allow organizations and individuals
33
+to share information over public networks without compromising their
34
+privacy.
37 35
 </p>
38 36
 
39 37
 <p>
40
-Knowing the source and destination of your Internet traffic allows
41
-somebody to track your behavior and interests, impacting your checkbook or
42
-even threatening your job or physical safety.
38
+Individuals can use Tor to shield themselves and their family members
39
+from being tracked by remote websites.  They can also use it to connect
40
+to resources such as news sites or instant messaging services that are
41
+blocked by their local Internet service providers (ISPs).
43 42
 </p>
44 43
 
45 44
 <p>
46
-Individuals, corporations, and governments all have an interest in
47
-traffic analysis protection. Individuals want to protect themselves and
48
-their family members from remote websites, or connect to resources such
49
-as news sites or instant messaging services that are blocked locally.
50
-User groups such as the German "Diabetes People" organization recommend
51
-Tor for their members' online privacy and security.  Activist groups such
52
-as the Electronic Frontier Foundation are publicizing Tor as a mechanism
53
-for maintaining civil liberties online.  Corporations such as Google and
54
-Wal-Mart are investigating Tor as a safe avenue for competitive analysis
55
-or to try out new experimental projects without associating their name
56
-with the project.  A branch of the U.S. Navy uses Tor for open source
57
-intelligence gathering, and one of their teams used Tor while deployed
58
-in the Middle East recently.
45
+Groups such as the German "Diabetes People" organization recommend Tor
46
+for safeguarding their members' online privacy and security.  Activist
47
+groups like the Electronic Frontier Foundation (EFF) are supporting
48
+Tor's development as a mechanism for maintaining civil liberties online.
49
+Corporations are investigating Tor as a safe way to conduct competitive
50
+analysis, and are considering using Tor to test new experimental projects
51
+without associating their names with these projects. A branch of the
52
+US Navy uses Tor for open source intelligence gathering, and one of its
53
+teams used Tor while deployed in the Middle East recently.
59 54
 </p>
60 55
 
61
-<h3>Network structure</h3>
62 56
 <p>
63
-Tor helps to reduce the traffic analysis risk by distributing your
64
-transactions over several places on the Internet, so no single point can
65
-link you to your destination. To make private connections in Tor, a client
66
-incrementally builds a path or <em>circuit</em> of encrypted connections
67
-through servers on the network, extending it one step at a time so that
68
-each server in the circuit only learns which server extended to it and
69
-which server it has been asked to extend to.  The client negotiates a
70
-separate set of encryption keys for each step along the circuit.
57
+The variety of people who use Tor is actually part of what makes it
58
+so secure.  The more populous and diverse the user base for Tor is,
59
+the more your anonymity will be protected.
60
+</p>
61
+
62
+<h3>Why We Need Tor</h3>
63
+
64
+<p>
65
+Using Tor protects you against a common form of Internet surveillance
66
+known as "traffic analysis."  Traffic analysis can be used to infer
67
+who is talking to whom over a public network.  Knowing the source
68
+and destination of your Internet traffic allows others to track your
69
+behavior and interests.  This can impact your checkbook if, for example,
70
+an e-commerce site uses price discrimination based on your country or
71
+institution of origin.  It can even threaten your job and physical safety
72
+by revealing who and where you are.
73
+</p>
74
+
75
+<p>
76
+How does traffic analysis work?  Internet data packets have two parts:
77
+a data payload, and a header used for routing.  The data payload is
78
+whatever is being sent, whether that's an email message, a web page, or an
79
+audio file.  Even if you encrypt the data payload of your communications,
80
+traffic analysis still reveals a great deal about what you're doing and,
81
+possibly, what you're saying.  That's because it focuses on the header,
82
+which discloses source, destination, size, timing, and so on.
83
+</p>
84
+
85
+<p>
86
+A basic problem, for the privacy minded, is that the recipient of your
87
+communications can see who sent them by looking at headers.  So can
88
+authorized intermediaries like Internet service providers, and sometimes
89
+unauthorized intermediaries as well.  A very simple form of traffic
90
+analysis might involve sitting somewhere between sender and recipient on
91
+the network, looking at headers.
92
+</p>
93
+
94
+<p>
95
+But there are also more powerful kinds of traffic analysis.  Some
96
+attackers spy on multiple parts of the Internet and use sophisticated
97
+statistical techniques to track the communications patterns of many
98
+different organizations and individuals.
99
+</p>
100
+
101
+<h3>The Solution: a Distributed, Anonymous Network</h3>
102
+
103
+<p>
104
+Tor helps to reduce the risks of both simple and sophisticated traffic
105
+analysis by distributing your transactions over several places on the
106
+Internet, so no single point can link you to your destination.  The idea
107
+is similar to using a twisty, hard-to-follow route in order to throw off
108
+somebody who is tailing you -- and then periodically erasing your
109
+footprints.  Instead of taking a direct route from source to
110
+destination, data packets on the Tor network take a random pathway
111
+through several servers that cover your tracks so no observer at any
112
+single point can tell where the data came from or where it's going.
113
+</p>
114
+
115
+<p>
116
+To create a private network pathway with Tor, the user's software or
117
+client incrementally builds a circuit of encrypted connections through
118
+servers on the network.  The circuit is extended one hop at a time, and
119
+each server along the way knows only which server gave it data and which
120
+server it is giving data to.  No individual server will ever know the
121
+complete path that a data packet has taken.  The client negotiates a
122
+separate set of encryption keys for each hop along the circuit to ensure
123
+that each hop can't see what these connections are as they pass through.
71 124
 </p>
72 125
 
73 126
 <p>
... ...
@@ -75,57 +128,78 @@ separate set of encryption keys for each step along the circuit.
75 128
 </p>
76 129
 
77 130
 <p>
78
-Once a circuit has been established, the client software waits for
79
-applications to request TCP connections, and directs these application
80
-streams along the circuit.  Many streams can be multiplexed along a single
81
-circuit, so applications don't need to wait for keys to be negotiated
82
-every time they open a connection.  Because each server sees no
83
-more than one end of the connection, a local eavesdropper or a compromised
84
-server cannot use traffic analysis to link the connection's source and
85
-destination.  The Tor client software rotates circuits periodically
86
-to prevent long-term linkability between different actions by a
87
-single user.
131
+Once a circuit has been established, many kinds of data can be exchanged
132
+and several different sorts of software applications can be deployed
133
+over the Tor network.  Because each server sees no more than one hop in
134
+the circuit, neither an eavesdropper nor a compromised server can use
135
+traffic analysis to link the connection's source and destination.  Tor
136
+only works for TCP streams and can be used by any application with SOCKS
137
+support.
138
+</p>
139
+
140
+<p>
141
+For efficiency, the Tor software uses the same circuit for connections
142
+that happen within the same minute or so.  Later requests are given a
143
+new circuit, to keep people from linking your earlier actions to the new
144
+ones.
88 145
 </p>
89 146
 
90
-<!--
147
+<h3>Hidden Services</h3>
148
+
91 149
 <p>
92
-Many protocols, not just web.
150
+Tor also makes it possible for users to hide their locations while
151
+offering various kinds of services, such as web publishing or an instant
152
+messaging server.  Using Tor "rendezvous points," other Tor users can
153
+connect to these hidden services, each without knowing the other's
154
+network identity.  This hidden service functionality could allow Tor
155
+users to set up a website where people publish material without worrying
156
+about censorship.  Nobody would be able to determine who was offering
157
+the site, and nobody who offered the site would know who was posting to it.
93 158
 </p>
94
--->
159
+
160
+<h3>Staying Anonymous</h3>
95 161
 
96 162
 <p>
97
-Tor also makes it possible for the clients to be hidden. Using Tor
98
-"rendezvous points," other Tor clients can connect to these hidden
99
-services, each without knowing the other's network identity. These hidden
100
-websites let users publish material without worrying about censorship.
163
+Of course, Tor can't solve all anonymity problems.  It focuses only on
164
+protecting the transport of data.  You need to use protocol-specific
165
+support software if you don't want the sites you visit to see your
166
+identifying information.  For example, web proxies such as Privoxy can
167
+be used while web browsing to block cookies and withhold information
168
+about your browser type.
101 169
 </p>
102 170
 
103
-<h3>Privacy</h3>
104 171
 <p>
105
-Of course, Tor can't solve all privacy problems itself. Tor focuses on
106
-protecting the <em>transport</em>. You need to use other protocol-specific
107
-software, such as Privoxy for web browsing, to clean identifying
108
-information like browser type and characteristics, and you need
109
-to use other common sense: don't provide your name or other
110
-revealing information in web forms. Also, like all anonymizing networks
111
-that are fast enough for web browsing, Tor does not provide protection
112
-against end-to-end timing attacks: if your attacker can watch the traffic
113
-coming out of your computer, and also the traffic arriving at your chosen
114
-destination, he can use simple statistics to discover that they are part
115
-of the same circuit.
172
+Also, to protect your anonymity, be smart.  Don't provide your name
173
+or other revealing information in web forms.  Be aware that like all
174
+anonymizing networks that are fast enough for web browsing, Tor does not
175
+provide protection against end-to-end timing attacks: if your attacker
176
+can watch the traffic coming out of your computer, and also the traffic
177
+arriving at your chosen destination, he can use statistical analysis to
178
+discover that they are part of the same circuit.
179
+</p>
180
+
181
+<h3>The Future of Tor</h3>
182
+
183
+<p>
184
+Providing a usable anonymizing network on the Internet today is an
185
+ongoing challenge.  We want software that meets users' needs.  And we
186
+also want to keep the network up and running in a way that handles
187
+as many users as possible. Security and usability don't have to be at
188
+odds: as Tor's usability increases, it will attract more users, which
189
+in turn will increase security for everyone. We're making progress,
190
+but we need your help.  Please consider <a
191
+href="cvs/tor/doc/tor-doc.html#installing">installing</a> a <a
192
+href="cvs/tor/doc/tor-doc.html#server">server</a>
193
+or <a href="contribute.html">volunteering</a> as a <a
194
+href="developers.html">developer</a>.
116 195
 </p>
117 196
 
118 197
 <p>
119 198
 Anonymity is threatened as never before by trends in law, policy, and
120 199
 technology that are undermining our ability to speak and read freely
121
-online without revealing who we are. Rather than trusting to laws to
122
-maintain our rights, Tor aims to give people the power to make their own
123
-decisions about their privacy. Providing a usable anonymizing network on
124
-the Internet today is an ongoing challenge, both in terms of making
125
-usable software that meets users' needs, and also in terms of keeping the
126
-network up and able to handle all the users; but we're making progress
127
-at finding a good balance to provide both usability and security. Please
128
-do what you can to help out.
200
+online without being forced to reveal who we are.  With each new user
201
+and server, we enhance Tor's ability to restore people's control over
202
+their privacy.
129 203
 </p>
130 204
 
131 205
   </div><!-- #main -->
132 206