Roger Dingledine commited on 2007-10-21 11:13:47
Zeige 1 geänderte Dateien mit 370 Einfügungen und 0 Löschungen.
... | ... |
@@ -0,0 +1,370 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision$ |
|
3 |
+ |
|
4 |
+#include "head.wmi" TITLE="Who uses Tor?" |
|
5 |
+ |
|
6 |
+<div class="main-column"> |
|
7 |
+ |
|
8 |
+<h1>Who uses Tor?</h1> |
|
9 |
+<hr /> |
|
10 |
+ |
|
11 |
+<h2>People like you use Tor every day to...</h2> |
|
12 |
+ |
|
13 |
+<ul> |
|
14 |
+<li>...protect their privacy from marketers </li> |
|
15 |
+ |
|
16 |
+<p>Anonymity helps defeat marketing that doesn't have your permissions. |
|
17 |
+There are all kinds of unscrupulous marketing techniques that track your |
|
18 |
+activity through cookies, web bugs, and malware by using your IP address |
|
19 |
+to build marketing databases, often selling your private information |
|
20 |
+without your permission. Tor helps defeat a number of these violations |
|
21 |
+of your privacy.</p> |
|
22 |
+ |
|
23 |
+<li>...preserve their kids' safety online</li> |
|
24 |
+ |
|
25 |
+<p>“I'm proud my mom and dad let me stay alone at home now.” |
|
26 |
+You've told your kids they shouldn't share personally identifying |
|
27 |
+information online, but they may be sharing their location simply |
|
28 |
+by not concealing their IP address from predators. Increasingly, IP |
|
29 |
+numbers can be literally mapped to street locations, and in the US the |
|
30 |
+government is pushing to get this mapping closer and closer to your |
|
31 |
+street address. What if a predator heard your child was alone, and |
|
32 |
+called up the satellite view of your address to find the best approach |
|
33 |
+from the back of the property?</p> |
|
34 |
+ |
|
35 |
+<li>...research sensitive topics</li> |
|
36 |
+ |
|
37 |
+<p>There's a wealth of information available online. Perhaps, in your |
|
38 |
+country, access to information on AIDS, birth control, Tibetan culture, |
|
39 |
+or world religions may be restricted inside a national firewall. |
|
40 |
+Or perhaps are you afraid that if you research a particular set of |
|
41 |
+symptoms, at some later date an insurance company could establish that |
|
42 |
+you had suspicions of a pre-existing condition? Want to research airline |
|
43 |
+security statistics or animal rights without the risk that your national |
|
44 |
+security authorities are going to think you are a terrorist? </p> |
|
45 |
+ |
|
46 |
+<li>...find out how other folks live</li> |
|
47 |
+ |
|
48 |
+<p>Tor, in combination with Blossom, allows you to see the World Wide |
|
49 |
+Web from a specific perspective. Want to see Google come up in Polish? |
|
50 |
+If you ask to leave the Tor cloud at a Polish Tor server, you'll see what |
|
51 |
+Poland sees online. Want to check the differential pricing offered by |
|
52 |
+an online retailer or wholesaler to folks in another country, compared |
|
53 |
+to the pricing offered to you or your company? Tor and Blossom can |
|
54 |
+provide that window to the world, also.</p> |
|
55 |
+ |
|
56 |
+</ul> |
|
57 |
+ |
|
58 |
+<h2>Journalists use Tor</h2> |
|
59 |
+ |
|
60 |
+<ul> |
|
61 |
+ |
|
62 |
+<li>Reporters without Borders</li> |
|
63 |
+ |
|
64 |
+<p><a href="www.rsf.org">Reporters without Borders </a> advises |
|
65 |
+journalists, sources, bloggers, and dissidents online to use Tor to |
|
66 |
+ensure their privacy. RSF tracks internet prisoners of conscience and |
|
67 |
+jailed or harmed journalists all over the world.</p> |
|
68 |
+ |
|
69 |
+<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li> |
|
70 |
+ |
|
71 |
+<p>IBB recommends Tor for Internet users in countries that can not get |
|
72 |
+safe access to free media. Tor not only protects freedom of expression, |
|
73 |
+but preserves the ability of persons behind national firewalls or under |
|
74 |
+the surveillance of repressive regimes to view information that gives |
|
75 |
+a global perspective on democracy, economics, religion, and other vital |
|
76 |
+topics to a full global perspective on culture.</p> |
|
77 |
+ |
|
78 |
+<li>MediaGiraffe</li> |
|
79 |
+ |
|
80 |
+<p>A conference for people in the media “willing to |
|
81 |
+stick their necks out” recently asked Tor executive |
|
82 |
+director, Shava Nerad, to lead a discussion of identity |
|
83 |
+and anonymity for journalists online, and profiled <a |
|
84 |
+href="http://www.mediagiraffe.org/wiki/index.php/Shava_Nerad">here.</a></p> |
|
85 |
+ |
|
86 |
+<li>Reporters in sensitive locations</li> |
|
87 |
+ |
|
88 |
+<p>Reporters in sensitive environments can use Tor to be more secure in |
|
89 |
+filing their stories.</p> |
|
90 |
+ |
|
91 |
+<li>sources</li> |
|
92 |
+ |
|
93 |
+<p>Journalists' sources often use Tor to report sensitive information, |
|
94 |
+or to discuss items with journalists from sensitive locations.</p> |
|
95 |
+ |
|
96 |
+<li>whistleblowers</li> |
|
97 |
+ |
|
98 |
+<p>Likewise, whistleblowers use Tor to safely leave tips on governmental |
|
99 |
+and corporate malfeasance. |
|
100 |
+ |
|
101 |
+<li>citizen journalism</li> |
|
102 |
+ |
|
103 |
+<p>Citizen journalists in China and “other Internet black |
|
104 |
+holes” use Tor to write about local events and to encourage social |
|
105 |
+change and political reform, more secure that there will not be a knock |
|
106 |
+on their door at midnight.</p> |
|
107 |
+ |
|
108 |
+</ul> |
|
109 |
+ |
|
110 |
+<h2>Human rights workers use Tor</h2> |
|
111 |
+ |
|
112 |
+<p>Reporting human rights violations from within their country of origin |
|
113 |
+is a task for peaceful warriors. It takes courage and a good eye to risk |
|
114 |
+mitigation. Human rights activists use Tor to anonymously report from |
|
115 |
+danger zones. Internationally, labor rights workers use Tor and other |
|
116 |
+forms of online and offline anonymity to organize workers in accordance |
|
117 |
+with the Universal Declaration of Human Rights. Are they within the law? |
|
118 |
+But, does that mean they are safe?</p> |
|
119 |
+ |
|
120 |
+<ul> |
|
121 |
+ |
|
122 |
+<li>Human Rights Watch</li> |
|
123 |
+ |
|
124 |
+<p>In their report “Race to the Bottom: Corporate |
|
125 |
+Complicity in Chinese Internet Censorship,” a study |
|
126 |
+co-author interviewed Roger Dingledine, Tor principal developer, |
|
127 |
+on Tor use. They cover Tor in the section on how to breach the <a |
|
128 |
+href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great |
|
129 |
+Firewall of China ”</a></p> |
|
130 |
+ |
|
131 |
+<a href="http://hrw.org/doc/?t=internet">web site</a> |
|
132 |
+ |
|
133 |
+<p>Human Rights Watch recommends Tor for human rights workers throughout |
|
134 |
+the globe for “secure browsing and communications.”</p> |
|
135 |
+ |
|
136 |
+<p>Tor has been invited to create a training for HRW field agents to be |
|
137 |
+delivered this fall in NYC.</p> |
|
138 |
+ |
|
139 |
+<li>Amnesty International</li> |
|
140 |
+ |
|
141 |
+<p>Tor has consulted and volunteered help to Amnesty International's |
|
142 |
+recent corporate responsibility campaign, http://irrepressible.info/, |
|
143 |
+see also their full report on China Internet issues at |
|
144 |
+http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf</p> |
|
145 |
+ |
|
146 |
+<li>Global Voices</li> |
|
147 |
+ |
|
148 |
+<p>Global Voices can't stop recommending Tor throughout their <a |
|
149 |
+href="http://www.google.com/search?hl=en&lr=&rls=DVFC,DVFC:1970--2,DVFC:en&q=+site:www.globalvoicesonline.org+global+voices+tor"> |
|
150 |
+web site.</a></p> |
|
151 |
+ |
|
152 |
+<li>10% for corruption</li> |
|
153 |
+ |
|
154 |
+<p>A contact of ours who works with a public health nonprofit in |
|
155 |
+Africa reports that his nonprofit must budget 10% to cover various |
|
156 |
+sorts of corruption, mostly bribes and such. When that percentage |
|
157 |
+rises steeply, not only can they not afford the money, but they can |
|
158 |
+not afford to complain -- this is the point at which open objection can |
|
159 |
+become dangerous. So his nonprofit is trying to figure out how to use |
|
160 |
+Tor to safely whistleblow on governmental corruption in order to continue |
|
161 |
+their work more effectively and safely.</p> |
|
162 |
+ |
|
163 |
+<li>Labor organizers in the US and overseas</li> |
|
164 |
+ |
|
165 |
+<p>At a recent conference a Tor staffer ran into a woman who came from |
|
166 |
+a “company town ” in a mountainous area of the |
|
167 |
+eastern United States. She was attempting to blog anonymously to rally |
|
168 |
+local residents to urge reform on the company that dominated the towns |
|
169 |
+economic and governmental affairs, fully cognizant that the kind of |
|
170 |
+organizing she was doing could lead to harm or “fatal |
|
171 |
+accidents.”</p> |
|
172 |
+ |
|
173 |
+<p>In east Asia, some labor organizers use anonymity to reveal information |
|
174 |
+regarding sweatshops that produce goods for western countries and to |
|
175 |
+organize local labor.</p> |
|
176 |
+ |
|
177 |
+</ul> |
|
178 |
+ |
|
179 |
+<h2>People with high profile community roles use Tor</h2> |
|
180 |
+ |
|
181 |
+<p>Does being in the public spotlight shut you off from having a private |
|
182 |
+life, forever, online? A rural lawyer in a small New England state keeps |
|
183 |
+an anonymous blog because, with the diverse clientele at his prestigious |
|
184 |
+law firm, his political beliefs are bound to offend someone. Yet, he |
|
185 |
+doesn't want to remain silent on issues he cares about. Tor helps him |
|
186 |
+feel secure that he can express his opinion without consequences to his |
|
187 |
+public role.</p> |
|
188 |
+ |
|
189 |
+<h2>Poor people use Tor</h2> |
|
190 |
+ |
|
191 |
+<p>People living in poverty often don't participate fully in civil society |
|
192 |
+-- not out of ignorance or apathy, but out of fear. If something you |
|
193 |
+write were to get back to your boss, would you lose your job? If your |
|
194 |
+social worker read about your opinion of the system, would she treat |
|
195 |
+you differently? Anonymity gives a voice to the voiceless.</p> |
|
196 |
+ |
|
197 |
+<ul> |
|
198 |
+ |
|
199 |
+<li>VISTA grant</li> |
|
200 |
+ |
|
201 |
+<p>Tor has an open Americorps/VISTA position. This |
|
202 |
+government grant will cover a full time stipend for a volunteer to create |
|
203 |
+curricula to show low-income populations how to use anonymity online for |
|
204 |
+safer civic engagement. Although it's often said that the poor do not use |
|
205 |
+online access for civic engagment, failing to act in their self-interests, |
|
206 |
+it is our hypothesis (based on personal conversations and anecdotal |
|
207 |
+information) that it is precisely the “permanent record ” |
|
208 |
+left online that keeps many of the poor from speaking out on the Internet. |
|
209 |
+Where speaking out on social programs or job related issues might seem |
|
210 |
+in their enlightened self interest, they see things closer to home. |
|
211 |
+The boss or social worker or educational advisor virtually looking over |
|
212 |
+their shoulder could put a fragile situation into a tailspin.</p> |
|
213 |
+ |
|
214 |
+<p>We hope to show people how to more safely engage online, and then at |
|
215 |
+the end of the year, evaluate how online and offline civic engagement has |
|
216 |
+changed, and how the population sees this continuing in clear channels |
|
217 |
+and anonymously into the future.</p> |
|
218 |
+ |
|
219 |
+</ul> |
|
220 |
+ |
|
221 |
+<h2>People who care about privacy, in general, increasingly use Tor</h2> |
|
222 |
+ |
|
223 |
+<p>In the section below on recent media mentions of Tor, it becomes |
|
224 |
+clear that the recent revelation of users' browsing patterns by AOL has |
|
225 |
+piqued the conscience of the everyday Internet surfer in more privacy. |
|
226 |
+All over the net, Tor is being recommended to people newly concerned |
|
227 |
+about their privacy in the face of increasing breaches and betrayals of |
|
228 |
+private data.</p> |
|
229 |
+ |
|
230 |
+<h2>Soldiers in the field use Tor</h2> |
|
231 |
+ |
|
232 |
+<ul> |
|
233 |
+ |
|
234 |
+<li>Field agents</li> |
|
235 |
+ |
|
236 |
+<p>How much, do you imagine, would the Iraqi insurgency pay to find out |
|
237 |
+the location of every computer in Baghdad that logged into a military |
|
238 |
+server in Maryland to read email? Tor can protect military personnel in |
|
239 |
+the field by hiding their location, and even by concealing the location |
|
240 |
+of Command and Control servers.</p> |
|
241 |
+ |
|
242 |
+<li>Hidden services</li> |
|
243 |
+ |
|
244 |
+</ul> |
|
245 |
+ |
|
246 |
+<p>When the Internet was designed by DARPA, its primary purpose was to |
|
247 |
+be able to facilitate distributed, robust communications in case of |
|
248 |
+local strikes. However, some functions must be centralized, such as |
|
249 |
+command and control sites. It's the nature of the Internet protocols to |
|
250 |
+reveal the geographic location of any server that is reachable online, |
|
251 |
+however Tor's hidden services capacity allows military command and |
|
252 |
+control to be physically secure from discovery and takedown.</p> |
|
253 |
+ |
|
254 |
+<h2>Law enforcement officers use Tor</h2> |
|
255 |
+ |
|
256 |
+<p>Undercover officers use Tor to conceal their IP of origin during |
|
257 |
+sting operations. “Anonymous tip lines” may still |
|
258 |
+preserve a log of IP origins, if the informant isn't using Tor.</p> |
|
259 |
+ |
|
260 |
+<ul> |
|
261 |
+ |
|
262 |
+<li>online surveillance</li> |
|
263 |
+ |
|
264 |
+<p>Tor allows officials to surf questionable web sites and services |
|
265 |
+without leaving tell-tale tracks. If the system administrator of an |
|
266 |
+illegal gambling site, for example, were to see multiple connections from |
|
267 |
+governmental or law enforcement computers in usage logs, investigations |
|
268 |
+would be hampered.</p> |
|
269 |
+ |
|
270 |
+<li>sting operations</li> |
|
271 |
+ |
|
272 |
+<p>Similarly, anonymity allows law officers to engage in online |
|
273 |
+“undercover ” operations. Regardless of how good an |
|
274 |
+undercover officer's “street cred” may be, if his or her |
|
275 |
+email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p> |
|
276 |
+ |
|
277 |
+<li>truly anonymous tip lines</li> |
|
278 |
+ |
|
279 |
+</ul> |
|
280 |
+ |
|
281 |
+<p>While online anonymous tip lines are popular, without anonymity |
|
282 |
+software, they are far less useful. Sophisticated sources understand that |
|
283 |
+although a name or email address is not attached to information, server |
|
284 |
+logs can identify them very quickly. As a result, tip line web sites that |
|
285 |
+do not encourage anonymity are limiting the sources of their tips.</p> |
|
286 |
+ |
|
287 |
+<h2>Whistleblowers use Tor</h2> |
|
288 |
+ |
|
289 |
+<p>In the US, the Supreme Court recently stripped legal protections from |
|
290 |
+government whistleblowers. But whistleblowers working for governmental |
|
291 |
+transparency or corporate accountability can use Tor to seek justice |
|
292 |
+without personal repercussions.</p> |
|
293 |
+ |
|
294 |
+<h2>Bloggers use Tor</h2> |
|
295 |
+ |
|
296 |
+<p>Every day we hear about bloggers who are sued or fired for saying |
|
297 |
+perfectly legal things online, in their blog. In addition to following |
|
298 |
+the guidelines of EFF's Guide and RSF's guide, we recommend using Tor.</p> |
|
299 |
+ |
|
300 |
+<h2>Citizens of repressive regimes use Tor</h2> |
|
301 |
+ |
|
302 |
+<p>Whether to read information on censored topics (such as AIDS, Tibet, |
|
303 |
+or democracy), or to write about controversial topics, people inside |
|
304 |
+oppressive regimes can risk life and livelihood. Tor helps cover the |
|
305 |
+tracks of dissidents, foreign nationals, or even just people who want |
|
306 |
+free accesss to information most of us take for granted.</p> |
|
307 |
+ |
|
308 |
+<h2>People organizing for change use Tor</h2> |
|
309 |
+ |
|
310 |
+<ul> |
|
311 |
+<li>union organizers/labor activists</li> |
|
312 |
+ |
|
313 |
+See mentions above |
|
314 |
+ |
|
315 |
+<li>democracy activists/dissidents</li> |
|
316 |
+ |
|
317 |
+See mentions above |
|
318 |
+ |
|
319 |
+<li>peace/green activists</li> |
|
320 |
+ |
|
321 |
+<p>When groups such as the Friends Service Committee and environmental |
|
322 |
+groups are increasingly falling under surveillance in the United States |
|
323 |
+under laws meant to protect against terrorism, many peaceful agents of |
|
324 |
+change rely on Tor for basic privacy for legitimate activities.</p> |
|
325 |
+ |
|
326 |
+</ul> |
|
327 |
+ |
|
328 |
+<h2>Business executives use Tor</h2> |
|
329 |
+<ul> |
|
330 |
+ |
|
331 |
+<li>security breach information clearinghouses</li> |
|
332 |
+ |
|
333 |
+<p>Say a financial institution participates in a security clearinghouse |
|
334 |
+of information on Internet attacks. Such a repository requires members |
|
335 |
+to report breaches to a central group, who correlates attacks to detect |
|
336 |
+coordinated patterns and send out alerts. But if a specific bank in |
|
337 |
+St. Louis is breached, they don't want an attacker watching the incoming |
|
338 |
+traffic to such a repository to be able to track where information is |
|
339 |
+coming from. Even though every packet were encrypted, the Internet |
|
340 |
+address would betray the location of a compromised system. Tor allows |
|
341 |
+such repositories of sensitive information to resist compromises.</p> |
|
342 |
+ |
|
343 |
+<li>seeing your competition as your market does</li> |
|
344 |
+ |
|
345 |
+<p>If you try to check out a competitor's pricing, you may find no |
|
346 |
+information or misleading information on their web site. This is because |
|
347 |
+their web server may be keyed to detect connections from competitors, |
|
348 |
+and block or spread disinformation to your staff. Tor allows a business |
|
349 |
+to view their sector as the general public would view it.</p> |
|
350 |
+ |
|
351 |
+<li>keeping strategies confidential</li> |
|
352 |
+ |
|
353 |
+<p>An investment bank, for example, might not want industry snoopers to be |
|
354 |
+able to track what web sites their analysts are watching. The strategic |
|
355 |
+importance of traffic patterns, and the vulnerability of the surveillance |
|
356 |
+of such data, is starting to be more widely recognized in several areas |
|
357 |
+of the business world.</p> |
|
358 |
+ |
|
359 |
+<li>accountability |
|
360 |
+ |
|
361 |
+</ul> |
|
362 |
+ |
|
363 |
+<p>In an age when irresponsible and unreported corporate activity has |
|
364 |
+undermined multi-billion dollar businesses, an executive exercising true |
|
365 |
+stewardship wants the whole staff to feel free to disclose internal |
|
366 |
+malfeasance. Tor facilitates internal accountability before it turns |
|
367 |
+into whistleblowing.</p> |
|
368 |
+ |
|
369 |
+#include <foot.wmi> |
|
370 |
+ |
|
0 | 371 |