the 'who uses tor' draft that shava wrote 12 months ago. needs cleaning up.
Roger Dingledine

Roger Dingledine commited on 2007-10-21 11:13:47
Zeige 1 geänderte Dateien mit 370 Einfügungen und 0 Löschungen.

... ...
@@ -0,0 +1,370 @@
1
+## translation metadata
2
+# Revision: $Revision$
3
+
4
+#include "head.wmi" TITLE="Who uses Tor?"
5
+
6
+<div class="main-column">
7
+
8
+<h1>Who uses Tor?</h1>
9
+<hr />
10
+
11
+<h2>People like you use Tor every day to...</h2>
12
+
13
+<ul>
14
+<li>...protect their privacy from marketers </li>
15
+
16
+<p>Anonymity helps defeat marketing that doesn't have your permissions.
17
+There are all kinds of unscrupulous marketing techniques that track your
18
+activity through cookies, web bugs, and malware by using your IP address
19
+to build marketing databases, often selling your private information
20
+without your permission.  Tor helps defeat a number of these violations
21
+of your privacy.</p>
22
+
23
+<li>...preserve their kids' safety online</li>
24
+
25
+<p>&ldquo;I'm proud my mom and dad let me stay alone at home now.&rdquo;
26
+You've told your kids they shouldn't share personally identifying
27
+information online, but they may be sharing their location simply
28
+by not concealing their IP address from predators.  Increasingly, IP
29
+numbers can be literally mapped to street locations, and in the US the
30
+government is pushing to get this mapping closer and closer to your
31
+street address.  What if a predator heard your child was alone, and
32
+called up the satellite view of your address to find the best approach
33
+from the back of the property?</p>
34
+
35
+<li>...research sensitive topics</li>
36
+
37
+<p>There's a wealth of information available online.   Perhaps, in your
38
+country, access to information on AIDS, birth control, Tibetan culture,
39
+or world religions may be restricted inside a national firewall.
40
+Or perhaps are you afraid that if you research a particular set of
41
+symptoms, at some later date an insurance company could establish that
42
+you had suspicions of a pre-existing condition?  Want to research airline
43
+security statistics or animal rights without the risk that your national
44
+security authorities are going to think you are a terrorist? </p>
45
+
46
+<li>...find out how other folks live</li>
47
+
48
+<p>Tor, in combination with Blossom, allows you to see the World Wide
49
+Web from a specific perspective.  Want to see Google come up in Polish?
50
+If you ask to leave the Tor cloud at a Polish Tor server, you'll see what
51
+Poland sees online.  Want to check the differential pricing offered by
52
+an online retailer or wholesaler to folks in another country, compared
53
+to the pricing offered to you or your company?  Tor and Blossom can
54
+provide that window to the world, also.</p>
55
+
56
+</ul>
57
+
58
+<h2>Journalists use Tor</h2>
59
+
60
+<ul>
61
+
62
+<li>Reporters without Borders</li>
63
+
64
+<p><a href="www.rsf.org">Reporters without Borders </a> advises
65
+journalists, sources, bloggers, and dissidents online to use Tor to
66
+ensure their privacy.  RSF tracks internet prisoners of conscience and
67
+jailed or harmed journalists all over the world.</p>
68
+
69
+<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
70
+
71
+<p>IBB recommends Tor for Internet users in countries that can not get
72
+safe access to free media.  Tor not only protects freedom of expression,
73
+but preserves the ability of persons behind national firewalls or under
74
+the surveillance of repressive regimes to view information that gives
75
+a global perspective on democracy, economics, religion, and other vital
76
+topics to a full global perspective on culture.</p>
77
+
78
+<li>MediaGiraffe</li>
79
+
80
+<p>A conference for people in the media &ldquo;willing to
81
+stick their necks out&rdquo; recently asked Tor executive
82
+director, Shava Nerad, to lead a discussion of identity
83
+and anonymity for journalists online, and profiled <a
84
+href="http://www.mediagiraffe.org/wiki/index.php/Shava_Nerad">here.</a></p>
85
+
86
+<li>Reporters in sensitive locations</li>
87
+
88
+<p>Reporters in sensitive environments can use Tor to be more secure in
89
+filing their stories.</p>
90
+
91
+<li>sources</li>
92
+
93
+<p>Journalists' sources often use Tor to report sensitive information,
94
+or to discuss items with journalists from sensitive locations.</p>
95
+
96
+<li>whistleblowers</li>
97
+
98
+<p>Likewise, whistleblowers use Tor to safely leave tips on governmental
99
+and corporate malfeasance.
100
+
101
+<li>citizen journalism</li>
102
+
103
+<p>Citizen journalists in China and &ldquo;other Internet black
104
+holes&rdquo; use Tor to write about local events and to encourage social
105
+change and political reform, more secure that there will not be a knock
106
+on their door at midnight.</p>
107
+
108
+</ul>
109
+
110
+<h2>Human rights workers use Tor</h2>
111
+
112
+<p>Reporting human rights violations from within their country of origin
113
+is a task for peaceful warriors.  It takes courage and a good eye to risk
114
+mitigation.  Human rights activists use Tor to anonymously report from
115
+danger zones.  Internationally, labor rights workers use Tor and other
116
+forms of online and offline anonymity to organize workers in accordance
117
+with the Universal Declaration of Human Rights.  Are they within the law?
118
+But, does that mean they are safe?</p>
119
+
120
+<ul>
121
+
122
+<li>Human Rights Watch</li>
123
+
124
+<p>In their report &ldquo;Race to the Bottom: Corporate
125
+Complicity in Chinese Internet Censorship,&rdquo; a study
126
+co-author interviewed Roger Dingledine, Tor principal developer,
127
+on Tor use.  They cover Tor in the section on how to breach the <a
128
+href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
129
+Firewall of China &rdquo;</a></p>
130
+
131
+<a href="http://hrw.org/doc/?t=internet">web site</a>
132
+
133
+<p>Human Rights Watch recommends Tor for human rights workers throughout
134
+the globe for &ldquo;secure browsing and communications.&rdquo;</p>
135
+
136
+<p>Tor has been invited to create a training for HRW field agents to be
137
+delivered this fall in NYC.</p>
138
+
139
+<li>Amnesty International</li>
140
+
141
+<p>Tor has consulted and volunteered help to Amnesty International's
142
+recent corporate responsibility campaign, http://irrepressible.info/,
143
+see also their full report on China Internet issues at
144
+http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf</p>
145
+
146
+<li>Global Voices</li>
147
+
148
+<p>Global Voices can't stop recommending Tor throughout their <a
149
+href="http://www.google.com/search?hl=en&lr=&rls=DVFC,DVFC:1970--2,DVFC:en&q=+site:www.globalvoicesonline.org+global+voices+tor">
150
+web site.</a></p>
151
+
152
+<li>10% for corruption</li>
153
+
154
+<p>A contact of ours who works with a public health nonprofit in
155
+Africa reports that his nonprofit must budget 10% to cover various
156
+sorts of corruption, mostly bribes and such.  When that percentage
157
+rises steeply, not only can they not afford the money, but they can
158
+not afford to complain -- this is the point at which open objection can
159
+become dangerous.  So his nonprofit is trying to figure out how to use
160
+Tor to safely whistleblow on governmental corruption in order to continue
161
+their work more effectively and safely.</p>
162
+
163
+<li>Labor organizers in the US and overseas</li>
164
+
165
+<p>At a recent conference a Tor staffer ran into a woman who came from
166
+a  &ldquo;company town &rdquo; in a mountainous area of the
167
+eastern United States. She was attempting to blog anonymously to rally
168
+local residents to urge reform on the company that dominated the towns
169
+economic and governmental affairs, fully cognizant that the kind of
170
+organizing she was doing could lead to harm or &ldquo;fatal
171
+accidents.&rdquo;</p>
172
+
173
+<p>In east Asia, some labor organizers use anonymity to reveal information
174
+regarding sweatshops that produce goods for western countries and to
175
+organize local labor.</p>
176
+
177
+</ul>
178
+
179
+<h2>People with high profile community roles use Tor</h2>
180
+
181
+<p>Does being in the public spotlight shut you off from having a private
182
+life, forever, online?  A rural lawyer in a small New England state keeps
183
+an anonymous blog because, with the diverse clientele at his prestigious
184
+law firm, his political beliefs are bound to offend someone.  Yet, he
185
+doesn't want to remain silent on issues he cares about.  Tor helps him
186
+feel secure that he can express his opinion without consequences to his
187
+public role.</p>
188
+
189
+<h2>Poor people use Tor</h2>
190
+
191
+<p>People living in poverty often don't participate fully in civil society
192
+-- not out of ignorance or apathy, but out of fear.  If something you
193
+write were to get back to your boss, would you lose your job?  If your
194
+social worker read about your opinion of the system, would she treat
195
+you differently?  Anonymity gives a voice to the voiceless.</p>
196
+
197
+<ul>
198
+
199
+<li>VISTA grant</li>
200
+
201
+<p>Tor has an open Americorps/VISTA position.  This
202
+government grant will cover a full time stipend for a volunteer to create
203
+curricula to show low-income populations how to use anonymity online for
204
+safer civic engagement.  Although it's often said that the poor do not use
205
+online access for civic engagment, failing to act in their self-interests,
206
+it is our hypothesis (based on personal conversations and anecdotal
207
+information) that it is precisely the &ldquo;permanent record &rdquo;
208
+left online that keeps many of the poor from speaking out on the Internet.
209
+Where speaking out on social programs or job related issues might seem
210
+in their enlightened self interest, they see things closer to home.
211
+The boss or social worker or educational advisor virtually looking over
212
+their shoulder could put a fragile situation into a tailspin.</p>
213
+
214
+<p>We hope to show people how to more safely engage online, and then at
215
+the end of the year, evaluate how online and offline civic engagement has
216
+changed, and how the population sees this continuing in clear channels
217
+and anonymously into the future.</p>
218
+
219
+</ul>
220
+
221
+<h2>People who care about privacy, in general, increasingly use Tor</h2>
222
+
223
+<p>In the section below on recent media mentions of Tor, it becomes
224
+clear that the recent revelation of users' browsing patterns by AOL has
225
+piqued the conscience of the everyday Internet surfer in more privacy.
226
+All over the net, Tor is being recommended to people newly concerned
227
+about their privacy in the face of increasing breaches and betrayals of
228
+private data.</p>
229
+
230
+<h2>Soldiers in the field use Tor</h2>
231
+
232
+<ul>
233
+
234
+<li>Field agents</li>
235
+
236
+<p>How much, do you imagine, would the Iraqi insurgency pay to find out
237
+the location of every computer in Baghdad that logged into a military
238
+server in Maryland to read email?  Tor can protect military personnel in
239
+the field by hiding their location, and even by concealing the location
240
+of Command and Control servers.</p>
241
+
242
+<li>Hidden services</li>
243
+
244
+</ul>
245
+
246
+<p>When the Internet was designed by DARPA, its primary purpose was to
247
+be able to facilitate distributed, robust communications in case of
248
+local strikes.  However, some functions must be centralized, such as
249
+command and control sites.  It's the nature of the Internet protocols to
250
+reveal the geographic location of any server that is reachable online,
251
+however Tor's hidden services capacity allows military command and
252
+control to be physically secure from discovery and takedown.</p>
253
+
254
+<h2>Law enforcement officers use Tor</h2>
255
+
256
+<p>Undercover officers use Tor to conceal their IP of origin during
257
+sting operations. &ldquo;Anonymous tip lines&rdquo; may still
258
+preserve a log of IP origins, if the informant isn't using Tor.</p>
259
+
260
+<ul>
261
+
262
+<li>online surveillance</li>
263
+
264
+<p>Tor allows officials to surf questionable web sites and services
265
+without leaving tell-tale tracks.  If the system administrator of an
266
+illegal gambling site, for example, were to see multiple connections from
267
+governmental or law enforcement computers in usage logs, investigations
268
+would be hampered.</p>
269
+
270
+<li>sting operations</li>
271
+
272
+<p>Similarly, anonymity allows law officers to engage in online
273
+&ldquo;undercover &rdquo; operations.  Regardless of how good an
274
+undercover officer's &ldquo;street cred&rdquo; may be, if his or her
275
+email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p>
276
+
277
+<li>truly anonymous tip lines</li>
278
+
279
+</ul>
280
+
281
+<p>While online anonymous tip lines are popular, without anonymity
282
+software, they are far less useful.  Sophisticated sources understand that
283
+although a name or email address is not attached to information, server
284
+logs can identify them very quickly.  As a result, tip line web sites that
285
+do not encourage anonymity are limiting the sources of their tips.</p>
286
+
287
+<h2>Whistleblowers use Tor</h2>
288
+
289
+<p>In the US, the Supreme Court recently stripped legal protections from
290
+government whistleblowers.  But whistleblowers working for governmental
291
+transparency or corporate accountability can use Tor to seek justice
292
+without personal repercussions.</p>
293
+
294
+<h2>Bloggers use Tor</h2>
295
+
296
+<p>Every day we hear about bloggers who are sued or fired for saying
297
+perfectly legal things online, in their blog.  In addition to following
298
+the guidelines of EFF's Guide and RSF's guide, we recommend using Tor.</p>
299
+
300
+<h2>Citizens of repressive regimes use Tor</h2>
301
+
302
+<p>Whether to read information on censored topics (such as AIDS, Tibet,
303
+or democracy), or to write about controversial topics, people inside
304
+oppressive regimes can risk life and livelihood.  Tor helps cover the
305
+tracks of dissidents, foreign nationals, or even just people who want
306
+free accesss to information most of us take for granted.</p>
307
+
308
+<h2>People organizing for change use Tor</h2>
309
+
310
+<ul>
311
+<li>union organizers/labor activists</li>
312
+
313
+See mentions above
314
+
315
+<li>democracy activists/dissidents</li>
316
+
317
+See mentions above
318
+
319
+<li>peace/green activists</li>
320
+
321
+<p>When groups such as the Friends Service Committee and environmental
322
+groups are increasingly falling under surveillance in the United States
323
+under laws meant to protect against terrorism, many peaceful agents of
324
+change rely on Tor for basic privacy for legitimate activities.</p>
325
+
326
+</ul>
327
+
328
+<h2>Business executives use Tor</h2>
329
+<ul>
330
+
331
+<li>security breach information clearinghouses</li>
332
+
333
+<p>Say a financial institution participates in a security clearinghouse
334
+of information on Internet attacks.  Such a repository requires members
335
+to report breaches to a central group, who correlates attacks to detect
336
+coordinated patterns and send out alerts.  But if a specific bank in
337
+St. Louis is breached, they don't want an attacker watching the incoming
338
+traffic to such a repository to be able to track where information is
339
+coming from.  Even though every packet were encrypted, the Internet
340
+address would betray the location of a compromised system.  Tor allows
341
+such repositories of sensitive information to resist compromises.</p>
342
+
343
+<li>seeing your competition as your market does</li>
344
+
345
+<p>If you try to check out a competitor's pricing, you may find no
346
+information or misleading information on their web site.  This is because
347
+their web server may be keyed to detect connections from competitors,
348
+and block or spread disinformation to your staff.  Tor allows a business
349
+to view their sector as the general public would view it.</p>
350
+
351
+<li>keeping strategies confidential</li>
352
+
353
+<p>An investment bank, for example, might not want industry snoopers to be
354
+able to track what web sites their analysts are watching.  The strategic
355
+importance of traffic patterns, and the vulnerability of the surveillance
356
+of such data, is starting to be more widely recognized in several areas
357
+of the business world.</p>
358
+
359
+<li>accountability
360
+
361
+</ul>
362
+
363
+<p>In an age when irresponsible and unreported corporate activity has
364
+undermined multi-billion dollar businesses, an executive exercising true
365
+stewardship wants the whole staff to feel free to disclose internal
366
+malfeasance.  Tor facilitates internal accountability before it turns
367
+into whistleblowing.</p>
368
+
369
+#include <foot.wmi>
370
+
0 371