make whousestor not quite as wrong. man, there is much work remaining in this one.
Roger Dingledine

Roger Dingledine commited on 2007-10-21 12:42:21
Zeige 1 geänderte Dateien mit 31 Einfügungen und 39 Löschungen.

... ...
@@ -17,7 +17,7 @@
17 17
 There are all kinds of unscrupulous marketing techniques that track your
18 18
 activity through cookies, web bugs, and malware by using your IP address
19 19
 to build marketing databases, often selling your private information
20
-without your permission.  Tor helps defeat a number of these violations
20
+without your permission.  Tor helps defeat many of these violations
21 21
 of your privacy.</p>
22 22
 
23 23
 <li>...preserve their kids' safety online</li>
... ...
@@ -26,7 +26,7 @@ of your privacy.</p>
26 26
 You've told your kids they shouldn't share personally identifying
27 27
 information online, but they may be sharing their location simply
28 28
 by not concealing their IP address from predators.  Increasingly, IP
29
-numbers can be literally mapped to street locations, and in the US the
29
+addresses can be literally mapped to street locations, and in the US the
30 30
 government is pushing to get this mapping closer and closer to your
31 31
 street address.  What if a predator heard your child was alone, and
32 32
 called up the satellite view of your address to find the best approach
... ...
@@ -39,19 +39,19 @@ country, access to information on AIDS, birth control, Tibetan culture,
39 39
 or world religions may be restricted inside a national firewall.
40 40
 Or perhaps are you afraid that if you research a particular set of
41 41
 symptoms, at some later date an insurance company could establish that
42
-you had suspicions of a pre-existing condition?  Want to research airline
42
+you had suspicions of a pre-existing condition.  Want to research airline
43 43
 security statistics or animal rights without the risk that your national
44 44
 security authorities are going to think you are a terrorist? </p>
45 45
 
46 46
 <li>...find out how other folks live</li>
47 47
 
48
-<p>Tor, in combination with Blossom, allows you to see the World Wide
49
-Web from a specific perspective.  Want to see Google come up in Polish?
50
-If you ask to leave the Tor cloud at a Polish Tor relay, you'll see what
48
+<p>Tor allows you to see the World Wide
49
+Web from a different perspective.  Want to see Google come up in Polish?
50
+If you leave the Tor cloud at a Polish Tor relay, you'll see what
51 51
 Poland sees online.  Want to check the differential pricing offered by
52 52
 an online retailer or wholesaler to folks in another country, compared
53
-to the pricing offered to you or your company?  Tor and Blossom can
54
-provide that window to the world, also.</p>
53
+to the pricing offered to you or your company?  Tor can
54
+provide that window to the world.</p>
55 55
 
56 56
 </ul>
57 57
 
... ...
@@ -61,28 +61,22 @@ provide that window to the world, also.</p>
61 61
 
62 62
 <li>Reporters without Borders</li>
63 63
 
64
-<p><a href="www.rsf.org">Reporters without Borders </a> advises
64
+<p><a href="http://www.rsf.org/">Reporters without Borders</a> advises
65 65
 journalists, sources, bloggers, and dissidents online to use Tor to
66 66
 ensure their privacy.  RSF tracks internet prisoners of conscience and
67 67
 jailed or harmed journalists all over the world.</p>
68 68
 
69 69
 <li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
70 70
 
71
-<p>IBB recommends Tor for Internet users in countries that can not get
71
+<p>The US <a href="http://www.ibb.gov/">International Broadcasting
72
+Bureau</a> is supporting Tor development Internet users in countries
73
+that can't get
72 74
 safe access to free media.  Tor not only protects freedom of expression,
73 75
 but preserves the ability of persons behind national firewalls or under
74 76
 the surveillance of repressive regimes to view information that gives
75 77
 a global perspective on democracy, economics, religion, and other vital
76 78
 topics to a full global perspective on culture.</p>
77 79
 
78
-<li>MediaGiraffe</li>
79
-
80
-<p>A conference for people in the media &ldquo;willing to
81
-stick their necks out&rdquo; recently asked Tor executive
82
-director, Shava Nerad, to lead a discussion of identity
83
-and anonymity for journalists online, and profiled <a
84
-href="http://www.mediagiraffe.org/wiki/index.php/Shava_Nerad">here.</a></p>
85
-
86 80
 <li>Reporters in sensitive locations</li>
87 81
 
88 82
 <p>Reporters in sensitive environments can use Tor to be more secure in
... ...
@@ -100,7 +94,7 @@ and corporate malfeasance.
100 94
 
101 95
 <li>citizen journalism</li>
102 96
 
103
-<p>Citizen journalists in China and &ldquo;other Internet black
97
+<p>Citizen journalists in China and other &ldquo;Internet black
104 98
 holes&rdquo; use Tor to write about local events and to encourage social
105 99
 change and political reform, more secure that there will not be a knock
106 100
 on their door at midnight.</p>
... ...
@@ -123,30 +117,28 @@ But, does that mean they are safe?</p>
123 117
 
124 118
 <p>In their report &ldquo;Race to the Bottom: Corporate
125 119
 Complicity in Chinese Internet Censorship,&rdquo; a study
126
-co-author interviewed Roger Dingledine, Tor principal developer,
120
+co-author interviewed Roger Dingledine, Tor project leader,
127 121
 on Tor use.  They cover Tor in the section on how to breach the <a
128 122
 href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
129 123
 Firewall of China &rdquo;</a></p>
130 124
 
131
-<a href="http://hrw.org/doc/?t=internet">web site</a>
132
-
133
-<p>Human Rights Watch recommends Tor for human rights workers throughout
125
+<p><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a>
126
+recommends Tor for human rights workers throughout
134 127
 the globe for &ldquo;secure browsing and communications.&rdquo;</p>
135 128
 
136
-<p>Tor has been invited to create a training for HRW field agents to be
137
-delivered this fall in NYC.</p>
138
-
139 129
 <li>Amnesty International</li>
140 130
 
141 131
 <p>Tor has consulted and volunteered help to Amnesty International's
142
-recent corporate responsibility campaign, http://irrepressible.info/,
143
-see also their full report on China Internet issues at
144
-http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf</p>
132
+recent corporate responsibility campaign at
133
+<a href="http://irrepressible.info/">http://irrepressible.info/</a>.
134
+See also their <a
135
+href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
136
+report</a> on China Internet issues.</p>
145 137
 
146 138
 <li>Global Voices</li>
147 139
 
148 140
 <p>Global Voices can't stop recommending Tor throughout their <a
149
-href="http://www.google.com/search?hl=en&lr=&rls=DVFC,DVFC:1970--2,DVFC:en&q=+site:www.globalvoicesonline.org+global+voices+tor">
141
+href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
150 142
 web site.</a></p>
151 143
 
152 144
 <li>10% for corruption</li>
... ...
@@ -156,7 +148,7 @@ Africa reports that his nonprofit must budget 10% to cover various
156 148
 sorts of corruption, mostly bribes and such.  When that percentage
157 149
 rises steeply, not only can they not afford the money, but they can
158 150
 not afford to complain -- this is the point at which open objection can
159
-become dangerous.  So his nonprofit is trying to figure out how to use
151
+become dangerous.  So his nonprofit has been working to use
160 152
 Tor to safely whistleblow on governmental corruption in order to continue
161 153
 their work more effectively and safely.</p>
162 154
 
... ...
@@ -165,7 +157,7 @@ their work more effectively and safely.</p>
165 157
 <p>At a recent conference a Tor staffer ran into a woman who came from
166 158
 a &ldquo;company town&rdquo; in a mountainous area of the
167 159
 eastern United States. She was attempting to blog anonymously to rally
168
-local residents to urge reform on the company that dominated the towns
160
+local residents to urge reform on the company that dominated the town's
169 161
 economic and governmental affairs, fully cognizant that the kind of
170 162
 organizing she was doing could lead to harm or &ldquo;fatal
171 163
 accidents.&rdquo;</p>
... ...
@@ -253,9 +245,9 @@ control to be physically secure from discovery and takedown.</p>
253 245
 
254 246
 <h2>Law enforcement officers use Tor</h2>
255 247
 
256
-<p>Undercover officers use Tor to conceal their IP of origin during
248
+<p>Undercover officers use Tor to conceal their IP address during
257 249
 sting operations. &ldquo;Anonymous tip lines&rdquo; may still
258
-preserve a log of IP origins, if the informant isn't using Tor.</p>
250
+preserve a log of IP addresses, if the informant isn't using Tor.</p>
259 251
 
260 252
 <ul>
261 253
 
... ...
@@ -276,14 +268,14 @@ email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p>
276 268
 
277 269
 <li>truly anonymous tip lines</li>
278 270
 
279
-</ul>
280
-
281 271
 <p>While online anonymous tip lines are popular, without anonymity
282 272
 software, they are far less useful.  Sophisticated sources understand that
283 273
 although a name or email address is not attached to information, server
284 274
 logs can identify them very quickly.  As a result, tip line web sites that
285 275
 do not encourage anonymity are limiting the sources of their tips.</p>
286 276
 
277
+</ul>
278
+
287 279
 <h2>Whistleblowers use Tor</h2>
288 280
 
289 281
 <p>In the US, the Supreme Court recently stripped legal protections from
... ...
@@ -356,9 +348,7 @@ importance of traffic patterns, and the vulnerability of the surveillance
356 348
 of such data, is starting to be more widely recognized in several areas
357 349
 of the business world.</p>
358 350
 
359
-<li>accountability
360
-
361
-</ul>
351
+<li>accountability</li>
362 352
 
363 353
 <p>In an age when irresponsible and unreported corporate activity has
364 354
 undermined multi-billion dollar businesses, an executive exercising true
... ...
@@ -366,5 +356,7 @@ stewardship wants the whole staff to feel free to disclose internal
366 356
 malfeasance.  Tor facilitates internal accountability before it turns
367 357
 into whistleblowing.</p>
368 358
 
359
+</ul>
360
+
369 361
 #include <foot.wmi>
370 362
 
371 363