Roger Dingledine commited on 2007-10-21 12:42:21
Zeige 1 geänderte Dateien mit 31 Einfügungen und 39 Löschungen.
... | ... |
@@ -17,7 +17,7 @@ |
17 | 17 |
There are all kinds of unscrupulous marketing techniques that track your |
18 | 18 |
activity through cookies, web bugs, and malware by using your IP address |
19 | 19 |
to build marketing databases, often selling your private information |
20 |
-without your permission. Tor helps defeat a number of these violations |
|
20 |
+without your permission. Tor helps defeat many of these violations |
|
21 | 21 |
of your privacy.</p> |
22 | 22 |
|
23 | 23 |
<li>...preserve their kids' safety online</li> |
... | ... |
@@ -26,7 +26,7 @@ of your privacy.</p> |
26 | 26 |
You've told your kids they shouldn't share personally identifying |
27 | 27 |
information online, but they may be sharing their location simply |
28 | 28 |
by not concealing their IP address from predators. Increasingly, IP |
29 |
-numbers can be literally mapped to street locations, and in the US the |
|
29 |
+addresses can be literally mapped to street locations, and in the US the |
|
30 | 30 |
government is pushing to get this mapping closer and closer to your |
31 | 31 |
street address. What if a predator heard your child was alone, and |
32 | 32 |
called up the satellite view of your address to find the best approach |
... | ... |
@@ -39,19 +39,19 @@ country, access to information on AIDS, birth control, Tibetan culture, |
39 | 39 |
or world religions may be restricted inside a national firewall. |
40 | 40 |
Or perhaps are you afraid that if you research a particular set of |
41 | 41 |
symptoms, at some later date an insurance company could establish that |
42 |
-you had suspicions of a pre-existing condition? Want to research airline |
|
42 |
+you had suspicions of a pre-existing condition. Want to research airline |
|
43 | 43 |
security statistics or animal rights without the risk that your national |
44 | 44 |
security authorities are going to think you are a terrorist? </p> |
45 | 45 |
|
46 | 46 |
<li>...find out how other folks live</li> |
47 | 47 |
|
48 |
-<p>Tor, in combination with Blossom, allows you to see the World Wide |
|
49 |
-Web from a specific perspective. Want to see Google come up in Polish? |
|
50 |
-If you ask to leave the Tor cloud at a Polish Tor relay, you'll see what |
|
48 |
+<p>Tor allows you to see the World Wide |
|
49 |
+Web from a different perspective. Want to see Google come up in Polish? |
|
50 |
+If you leave the Tor cloud at a Polish Tor relay, you'll see what |
|
51 | 51 |
Poland sees online. Want to check the differential pricing offered by |
52 | 52 |
an online retailer or wholesaler to folks in another country, compared |
53 |
-to the pricing offered to you or your company? Tor and Blossom can |
|
54 |
-provide that window to the world, also.</p> |
|
53 |
+to the pricing offered to you or your company? Tor can |
|
54 |
+provide that window to the world.</p> |
|
55 | 55 |
|
56 | 56 |
</ul> |
57 | 57 |
|
... | ... |
@@ -61,28 +61,22 @@ provide that window to the world, also.</p> |
61 | 61 |
|
62 | 62 |
<li>Reporters without Borders</li> |
63 | 63 |
|
64 |
-<p><a href="www.rsf.org">Reporters without Borders </a> advises |
|
64 |
+<p><a href="http://www.rsf.org/">Reporters without Borders</a> advises |
|
65 | 65 |
journalists, sources, bloggers, and dissidents online to use Tor to |
66 | 66 |
ensure their privacy. RSF tracks internet prisoners of conscience and |
67 | 67 |
jailed or harmed journalists all over the world.</p> |
68 | 68 |
|
69 | 69 |
<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li> |
70 | 70 |
|
71 |
-<p>IBB recommends Tor for Internet users in countries that can not get |
|
71 |
+<p>The US <a href="http://www.ibb.gov/">International Broadcasting |
|
72 |
+Bureau</a> is supporting Tor development Internet users in countries |
|
73 |
+that can't get |
|
72 | 74 |
safe access to free media. Tor not only protects freedom of expression, |
73 | 75 |
but preserves the ability of persons behind national firewalls or under |
74 | 76 |
the surveillance of repressive regimes to view information that gives |
75 | 77 |
a global perspective on democracy, economics, religion, and other vital |
76 | 78 |
topics to a full global perspective on culture.</p> |
77 | 79 |
|
78 |
-<li>MediaGiraffe</li> |
|
79 |
- |
|
80 |
-<p>A conference for people in the media “willing to |
|
81 |
-stick their necks out” recently asked Tor executive |
|
82 |
-director, Shava Nerad, to lead a discussion of identity |
|
83 |
-and anonymity for journalists online, and profiled <a |
|
84 |
-href="http://www.mediagiraffe.org/wiki/index.php/Shava_Nerad">here.</a></p> |
|
85 |
- |
|
86 | 80 |
<li>Reporters in sensitive locations</li> |
87 | 81 |
|
88 | 82 |
<p>Reporters in sensitive environments can use Tor to be more secure in |
... | ... |
@@ -100,7 +94,7 @@ and corporate malfeasance. |
100 | 94 |
|
101 | 95 |
<li>citizen journalism</li> |
102 | 96 |
|
103 |
-<p>Citizen journalists in China and “other Internet black |
|
97 |
+<p>Citizen journalists in China and other “Internet black |
|
104 | 98 |
holes” use Tor to write about local events and to encourage social |
105 | 99 |
change and political reform, more secure that there will not be a knock |
106 | 100 |
on their door at midnight.</p> |
... | ... |
@@ -123,30 +117,28 @@ But, does that mean they are safe?</p> |
123 | 117 |
|
124 | 118 |
<p>In their report “Race to the Bottom: Corporate |
125 | 119 |
Complicity in Chinese Internet Censorship,” a study |
126 |
-co-author interviewed Roger Dingledine, Tor principal developer, |
|
120 |
+co-author interviewed Roger Dingledine, Tor project leader, |
|
127 | 121 |
on Tor use. They cover Tor in the section on how to breach the <a |
128 | 122 |
href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great |
129 | 123 |
Firewall of China ”</a></p> |
130 | 124 |
|
131 |
-<a href="http://hrw.org/doc/?t=internet">web site</a> |
|
132 |
- |
|
133 |
-<p>Human Rights Watch recommends Tor for human rights workers throughout |
|
125 |
+<p><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a> |
|
126 |
+recommends Tor for human rights workers throughout |
|
134 | 127 |
the globe for “secure browsing and communications.”</p> |
135 | 128 |
|
136 |
-<p>Tor has been invited to create a training for HRW field agents to be |
|
137 |
-delivered this fall in NYC.</p> |
|
138 |
- |
|
139 | 129 |
<li>Amnesty International</li> |
140 | 130 |
|
141 | 131 |
<p>Tor has consulted and volunteered help to Amnesty International's |
142 |
-recent corporate responsibility campaign, http://irrepressible.info/, |
|
143 |
-see also their full report on China Internet issues at |
|
144 |
-http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf</p> |
|
132 |
+recent corporate responsibility campaign at |
|
133 |
+<a href="http://irrepressible.info/">http://irrepressible.info/</a>. |
|
134 |
+See also their <a |
|
135 |
+href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full |
|
136 |
+report</a> on China Internet issues.</p> |
|
145 | 137 |
|
146 | 138 |
<li>Global Voices</li> |
147 | 139 |
|
148 | 140 |
<p>Global Voices can't stop recommending Tor throughout their <a |
149 |
-href="http://www.google.com/search?hl=en&lr=&rls=DVFC,DVFC:1970--2,DVFC:en&q=+site:www.globalvoicesonline.org+global+voices+tor"> |
|
141 |
+href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor"> |
|
150 | 142 |
web site.</a></p> |
151 | 143 |
|
152 | 144 |
<li>10% for corruption</li> |
... | ... |
@@ -156,7 +148,7 @@ Africa reports that his nonprofit must budget 10% to cover various |
156 | 148 |
sorts of corruption, mostly bribes and such. When that percentage |
157 | 149 |
rises steeply, not only can they not afford the money, but they can |
158 | 150 |
not afford to complain -- this is the point at which open objection can |
159 |
-become dangerous. So his nonprofit is trying to figure out how to use |
|
151 |
+become dangerous. So his nonprofit has been working to use |
|
160 | 152 |
Tor to safely whistleblow on governmental corruption in order to continue |
161 | 153 |
their work more effectively and safely.</p> |
162 | 154 |
|
... | ... |
@@ -165,7 +157,7 @@ their work more effectively and safely.</p> |
165 | 157 |
<p>At a recent conference a Tor staffer ran into a woman who came from |
166 | 158 |
a “company town” in a mountainous area of the |
167 | 159 |
eastern United States. She was attempting to blog anonymously to rally |
168 |
-local residents to urge reform on the company that dominated the towns |
|
160 |
+local residents to urge reform on the company that dominated the town's |
|
169 | 161 |
economic and governmental affairs, fully cognizant that the kind of |
170 | 162 |
organizing she was doing could lead to harm or “fatal |
171 | 163 |
accidents.”</p> |
... | ... |
@@ -253,9 +245,9 @@ control to be physically secure from discovery and takedown.</p> |
253 | 245 |
|
254 | 246 |
<h2>Law enforcement officers use Tor</h2> |
255 | 247 |
|
256 |
-<p>Undercover officers use Tor to conceal their IP of origin during |
|
248 |
+<p>Undercover officers use Tor to conceal their IP address during |
|
257 | 249 |
sting operations. “Anonymous tip lines” may still |
258 |
-preserve a log of IP origins, if the informant isn't using Tor.</p> |
|
250 |
+preserve a log of IP addresses, if the informant isn't using Tor.</p> |
|
259 | 251 |
|
260 | 252 |
<ul> |
261 | 253 |
|
... | ... |
@@ -276,14 +268,14 @@ email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p> |
276 | 268 |
|
277 | 269 |
<li>truly anonymous tip lines</li> |
278 | 270 |
|
279 |
-</ul> |
|
280 |
- |
|
281 | 271 |
<p>While online anonymous tip lines are popular, without anonymity |
282 | 272 |
software, they are far less useful. Sophisticated sources understand that |
283 | 273 |
although a name or email address is not attached to information, server |
284 | 274 |
logs can identify them very quickly. As a result, tip line web sites that |
285 | 275 |
do not encourage anonymity are limiting the sources of their tips.</p> |
286 | 276 |
|
277 |
+</ul> |
|
278 |
+ |
|
287 | 279 |
<h2>Whistleblowers use Tor</h2> |
288 | 280 |
|
289 | 281 |
<p>In the US, the Supreme Court recently stripped legal protections from |
... | ... |
@@ -356,9 +348,7 @@ importance of traffic patterns, and the vulnerability of the surveillance |
356 | 348 |
of such data, is starting to be more widely recognized in several areas |
357 | 349 |
of the business world.</p> |
358 | 350 |
|
359 |
-<li>accountability |
|
360 |
- |
|
361 |
-</ul> |
|
351 |
+<li>accountability</li> |
|
362 | 352 |
|
363 | 353 |
<p>In an age when irresponsible and unreported corporate activity has |
364 | 354 |
undermined multi-billion dollar businesses, an executive exercising true |
... | ... |
@@ -366,5 +356,7 @@ stewardship wants the whole staff to feel free to disclose internal |
366 | 356 |
malfeasance. Tor facilitates internal accountability before it turns |
367 | 357 |
into whistleblowing.</p> |
368 | 358 |
|
359 |
+</ul> |
|
360 |
+ |
|
369 | 361 |
#include <foot.wmi> |
370 | 362 |
|
371 | 363 |