Roger Dingledine commited on 2007-10-21 11:13:47
              Zeige 1 geänderte Dateien mit 370 Einfügungen und 0 Löschungen.
            
| ... | ... | 
                      @@ -0,0 +1,370 @@  | 
                  
| 1 | 
                        +## translation metadata  | 
                    |
| 2 | 
                        +# Revision: $Revision$  | 
                    |
| 3 | 
                        +  | 
                    |
| 4 | 
                        +#include "head.wmi" TITLE="Who uses Tor?"  | 
                    |
| 5 | 
                        +  | 
                    |
| 6 | 
                        +<div class="main-column">  | 
                    |
| 7 | 
                        +  | 
                    |
| 8 | 
                        +<h1>Who uses Tor?</h1>  | 
                    |
| 9 | 
                        +<hr />  | 
                    |
| 10 | 
                        +  | 
                    |
| 11 | 
                        +<h2>People like you use Tor every day to...</h2>  | 
                    |
| 12 | 
                        +  | 
                    |
| 13 | 
                        +<ul>  | 
                    |
| 14 | 
                        +<li>...protect their privacy from marketers </li>  | 
                    |
| 15 | 
                        +  | 
                    |
| 16 | 
                        +<p>Anonymity helps defeat marketing that doesn't have your permissions.  | 
                    |
| 17 | 
                        +There are all kinds of unscrupulous marketing techniques that track your  | 
                    |
| 18 | 
                        +activity through cookies, web bugs, and malware by using your IP address  | 
                    |
| 19 | 
                        +to build marketing databases, often selling your private information  | 
                    |
| 20 | 
                        +without your permission. Tor helps defeat a number of these violations  | 
                    |
| 21 | 
                        +of your privacy.</p>  | 
                    |
| 22 | 
                        +  | 
                    |
| 23 | 
                        +<li>...preserve their kids' safety online</li>  | 
                    |
| 24 | 
                        +  | 
                    |
| 25 | 
                        +<p>“I'm proud my mom and dad let me stay alone at home now.”  | 
                    |
| 26 | 
                        +You've told your kids they shouldn't share personally identifying  | 
                    |
| 27 | 
                        +information online, but they may be sharing their location simply  | 
                    |
| 28 | 
                        +by not concealing their IP address from predators. Increasingly, IP  | 
                    |
| 29 | 
                        +numbers can be literally mapped to street locations, and in the US the  | 
                    |
| 30 | 
                        +government is pushing to get this mapping closer and closer to your  | 
                    |
| 31 | 
                        +street address. What if a predator heard your child was alone, and  | 
                    |
| 32 | 
                        +called up the satellite view of your address to find the best approach  | 
                    |
| 33 | 
                        +from the back of the property?</p>  | 
                    |
| 34 | 
                        +  | 
                    |
| 35 | 
                        +<li>...research sensitive topics</li>  | 
                    |
| 36 | 
                        +  | 
                    |
| 37 | 
                        +<p>There's a wealth of information available online. Perhaps, in your  | 
                    |
| 38 | 
                        +country, access to information on AIDS, birth control, Tibetan culture,  | 
                    |
| 39 | 
                        +or world religions may be restricted inside a national firewall.  | 
                    |
| 40 | 
                        +Or perhaps are you afraid that if you research a particular set of  | 
                    |
| 41 | 
                        +symptoms, at some later date an insurance company could establish that  | 
                    |
| 42 | 
                        +you had suspicions of a pre-existing condition? Want to research airline  | 
                    |
| 43 | 
                        +security statistics or animal rights without the risk that your national  | 
                    |
| 44 | 
                        +security authorities are going to think you are a terrorist? </p>  | 
                    |
| 45 | 
                        +  | 
                    |
| 46 | 
                        +<li>...find out how other folks live</li>  | 
                    |
| 47 | 
                        +  | 
                    |
| 48 | 
                        +<p>Tor, in combination with Blossom, allows you to see the World Wide  | 
                    |
| 49 | 
                        +Web from a specific perspective. Want to see Google come up in Polish?  | 
                    |
| 50 | 
                        +If you ask to leave the Tor cloud at a Polish Tor server, you'll see what  | 
                    |
| 51 | 
                        +Poland sees online. Want to check the differential pricing offered by  | 
                    |
| 52 | 
                        +an online retailer or wholesaler to folks in another country, compared  | 
                    |
| 53 | 
                        +to the pricing offered to you or your company? Tor and Blossom can  | 
                    |
| 54 | 
                        +provide that window to the world, also.</p>  | 
                    |
| 55 | 
                        +  | 
                    |
| 56 | 
                        +</ul>  | 
                    |
| 57 | 
                        +  | 
                    |
| 58 | 
                        +<h2>Journalists use Tor</h2>  | 
                    |
| 59 | 
                        +  | 
                    |
| 60 | 
                        +<ul>  | 
                    |
| 61 | 
                        +  | 
                    |
| 62 | 
                        +<li>Reporters without Borders</li>  | 
                    |
| 63 | 
                        +  | 
                    |
| 64 | 
                        +<p><a href="www.rsf.org">Reporters without Borders </a> advises  | 
                    |
| 65 | 
                        +journalists, sources, bloggers, and dissidents online to use Tor to  | 
                    |
| 66 | 
                        +ensure their privacy. RSF tracks internet prisoners of conscience and  | 
                    |
| 67 | 
                        +jailed or harmed journalists all over the world.</p>  | 
                    |
| 68 | 
                        +  | 
                    |
| 69 | 
                        +<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>  | 
                    |
| 70 | 
                        +  | 
                    |
| 71 | 
                        +<p>IBB recommends Tor for Internet users in countries that can not get  | 
                    |
| 72 | 
                        +safe access to free media. Tor not only protects freedom of expression,  | 
                    |
| 73 | 
                        +but preserves the ability of persons behind national firewalls or under  | 
                    |
| 74 | 
                        +the surveillance of repressive regimes to view information that gives  | 
                    |
| 75 | 
                        +a global perspective on democracy, economics, religion, and other vital  | 
                    |
| 76 | 
                        +topics to a full global perspective on culture.</p>  | 
                    |
| 77 | 
                        +  | 
                    |
| 78 | 
                        +<li>MediaGiraffe</li>  | 
                    |
| 79 | 
                        +  | 
                    |
| 80 | 
                        +<p>A conference for people in the media “willing to  | 
                    |
| 81 | 
                        +stick their necks out” recently asked Tor executive  | 
                    |
| 82 | 
                        +director, Shava Nerad, to lead a discussion of identity  | 
                    |
| 83 | 
                        +and anonymity for journalists online, and profiled <a  | 
                    |
| 84 | 
                        +href="http://www.mediagiraffe.org/wiki/index.php/Shava_Nerad">here.</a></p>  | 
                    |
| 85 | 
                        +  | 
                    |
| 86 | 
                        +<li>Reporters in sensitive locations</li>  | 
                    |
| 87 | 
                        +  | 
                    |
| 88 | 
                        +<p>Reporters in sensitive environments can use Tor to be more secure in  | 
                    |
| 89 | 
                        +filing their stories.</p>  | 
                    |
| 90 | 
                        +  | 
                    |
| 91 | 
                        +<li>sources</li>  | 
                    |
| 92 | 
                        +  | 
                    |
| 93 | 
                        +<p>Journalists' sources often use Tor to report sensitive information,  | 
                    |
| 94 | 
                        +or to discuss items with journalists from sensitive locations.</p>  | 
                    |
| 95 | 
                        +  | 
                    |
| 96 | 
                        +<li>whistleblowers</li>  | 
                    |
| 97 | 
                        +  | 
                    |
| 98 | 
                        +<p>Likewise, whistleblowers use Tor to safely leave tips on governmental  | 
                    |
| 99 | 
                        +and corporate malfeasance.  | 
                    |
| 100 | 
                        +  | 
                    |
| 101 | 
                        +<li>citizen journalism</li>  | 
                    |
| 102 | 
                        +  | 
                    |
| 103 | 
                        +<p>Citizen journalists in China and “other Internet black  | 
                    |
| 104 | 
                        +holes” use Tor to write about local events and to encourage social  | 
                    |
| 105 | 
                        +change and political reform, more secure that there will not be a knock  | 
                    |
| 106 | 
                        +on their door at midnight.</p>  | 
                    |
| 107 | 
                        +  | 
                    |
| 108 | 
                        +</ul>  | 
                    |
| 109 | 
                        +  | 
                    |
| 110 | 
                        +<h2>Human rights workers use Tor</h2>  | 
                    |
| 111 | 
                        +  | 
                    |
| 112 | 
                        +<p>Reporting human rights violations from within their country of origin  | 
                    |
| 113 | 
                        +is a task for peaceful warriors. It takes courage and a good eye to risk  | 
                    |
| 114 | 
                        +mitigation. Human rights activists use Tor to anonymously report from  | 
                    |
| 115 | 
                        +danger zones. Internationally, labor rights workers use Tor and other  | 
                    |
| 116 | 
                        +forms of online and offline anonymity to organize workers in accordance  | 
                    |
| 117 | 
                        +with the Universal Declaration of Human Rights. Are they within the law?  | 
                    |
| 118 | 
                        +But, does that mean they are safe?</p>  | 
                    |
| 119 | 
                        +  | 
                    |
| 120 | 
                        +<ul>  | 
                    |
| 121 | 
                        +  | 
                    |
| 122 | 
                        +<li>Human Rights Watch</li>  | 
                    |
| 123 | 
                        +  | 
                    |
| 124 | 
                        +<p>In their report “Race to the Bottom: Corporate  | 
                    |
| 125 | 
                        +Complicity in Chinese Internet Censorship,” a study  | 
                    |
| 126 | 
                        +co-author interviewed Roger Dingledine, Tor principal developer,  | 
                    |
| 127 | 
                        +on Tor use. They cover Tor in the section on how to breach the <a  | 
                    |
| 128 | 
                        +href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great  | 
                    |
| 129 | 
                        +Firewall of China ”</a></p>  | 
                    |
| 130 | 
                        +  | 
                    |
| 131 | 
                        +<a href="http://hrw.org/doc/?t=internet">web site</a>  | 
                    |
| 132 | 
                        +  | 
                    |
| 133 | 
                        +<p>Human Rights Watch recommends Tor for human rights workers throughout  | 
                    |
| 134 | 
                        +the globe for “secure browsing and communications.”</p>  | 
                    |
| 135 | 
                        +  | 
                    |
| 136 | 
                        +<p>Tor has been invited to create a training for HRW field agents to be  | 
                    |
| 137 | 
                        +delivered this fall in NYC.</p>  | 
                    |
| 138 | 
                        +  | 
                    |
| 139 | 
                        +<li>Amnesty International</li>  | 
                    |
| 140 | 
                        +  | 
                    |
| 141 | 
                        +<p>Tor has consulted and volunteered help to Amnesty International's  | 
                    |
| 142 | 
                        +recent corporate responsibility campaign, http://irrepressible.info/,  | 
                    |
| 143 | 
                        +see also their full report on China Internet issues at  | 
                    |
| 144 | 
                        +http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf</p>  | 
                    |
| 145 | 
                        +  | 
                    |
| 146 | 
                        +<li>Global Voices</li>  | 
                    |
| 147 | 
                        +  | 
                    |
| 148 | 
                        +<p>Global Voices can't stop recommending Tor throughout their <a  | 
                    |
| 149 | 
                        +href="http://www.google.com/search?hl=en&lr=&rls=DVFC,DVFC:1970--2,DVFC:en&q=+site:www.globalvoicesonline.org+global+voices+tor">  | 
                    |
| 150 | 
                        +web site.</a></p>  | 
                    |
| 151 | 
                        +  | 
                    |
| 152 | 
                        +<li>10% for corruption</li>  | 
                    |
| 153 | 
                        +  | 
                    |
| 154 | 
                        +<p>A contact of ours who works with a public health nonprofit in  | 
                    |
| 155 | 
                        +Africa reports that his nonprofit must budget 10% to cover various  | 
                    |
| 156 | 
                        +sorts of corruption, mostly bribes and such. When that percentage  | 
                    |
| 157 | 
                        +rises steeply, not only can they not afford the money, but they can  | 
                    |
| 158 | 
                        +not afford to complain -- this is the point at which open objection can  | 
                    |
| 159 | 
                        +become dangerous. So his nonprofit is trying to figure out how to use  | 
                    |
| 160 | 
                        +Tor to safely whistleblow on governmental corruption in order to continue  | 
                    |
| 161 | 
                        +their work more effectively and safely.</p>  | 
                    |
| 162 | 
                        +  | 
                    |
| 163 | 
                        +<li>Labor organizers in the US and overseas</li>  | 
                    |
| 164 | 
                        +  | 
                    |
| 165 | 
                        +<p>At a recent conference a Tor staffer ran into a woman who came from  | 
                    |
| 166 | 
                        +a “company town ” in a mountainous area of the  | 
                    |
| 167 | 
                        +eastern United States. She was attempting to blog anonymously to rally  | 
                    |
| 168 | 
                        +local residents to urge reform on the company that dominated the towns  | 
                    |
| 169 | 
                        +economic and governmental affairs, fully cognizant that the kind of  | 
                    |
| 170 | 
                        +organizing she was doing could lead to harm or “fatal  | 
                    |
| 171 | 
                        +accidents.”</p>  | 
                    |
| 172 | 
                        +  | 
                    |
| 173 | 
                        +<p>In east Asia, some labor organizers use anonymity to reveal information  | 
                    |
| 174 | 
                        +regarding sweatshops that produce goods for western countries and to  | 
                    |
| 175 | 
                        +organize local labor.</p>  | 
                    |
| 176 | 
                        +  | 
                    |
| 177 | 
                        +</ul>  | 
                    |
| 178 | 
                        +  | 
                    |
| 179 | 
                        +<h2>People with high profile community roles use Tor</h2>  | 
                    |
| 180 | 
                        +  | 
                    |
| 181 | 
                        +<p>Does being in the public spotlight shut you off from having a private  | 
                    |
| 182 | 
                        +life, forever, online? A rural lawyer in a small New England state keeps  | 
                    |
| 183 | 
                        +an anonymous blog because, with the diverse clientele at his prestigious  | 
                    |
| 184 | 
                        +law firm, his political beliefs are bound to offend someone. Yet, he  | 
                    |
| 185 | 
                        +doesn't want to remain silent on issues he cares about. Tor helps him  | 
                    |
| 186 | 
                        +feel secure that he can express his opinion without consequences to his  | 
                    |
| 187 | 
                        +public role.</p>  | 
                    |
| 188 | 
                        +  | 
                    |
| 189 | 
                        +<h2>Poor people use Tor</h2>  | 
                    |
| 190 | 
                        +  | 
                    |
| 191 | 
                        +<p>People living in poverty often don't participate fully in civil society  | 
                    |
| 192 | 
                        +-- not out of ignorance or apathy, but out of fear. If something you  | 
                    |
| 193 | 
                        +write were to get back to your boss, would you lose your job? If your  | 
                    |
| 194 | 
                        +social worker read about your opinion of the system, would she treat  | 
                    |
| 195 | 
                        +you differently? Anonymity gives a voice to the voiceless.</p>  | 
                    |
| 196 | 
                        +  | 
                    |
| 197 | 
                        +<ul>  | 
                    |
| 198 | 
                        +  | 
                    |
| 199 | 
                        +<li>VISTA grant</li>  | 
                    |
| 200 | 
                        +  | 
                    |
| 201 | 
                        +<p>Tor has an open Americorps/VISTA position. This  | 
                    |
| 202 | 
                        +government grant will cover a full time stipend for a volunteer to create  | 
                    |
| 203 | 
                        +curricula to show low-income populations how to use anonymity online for  | 
                    |
| 204 | 
                        +safer civic engagement. Although it's often said that the poor do not use  | 
                    |
| 205 | 
                        +online access for civic engagment, failing to act in their self-interests,  | 
                    |
| 206 | 
                        +it is our hypothesis (based on personal conversations and anecdotal  | 
                    |
| 207 | 
                        +information) that it is precisely the “permanent record ”  | 
                    |
| 208 | 
                        +left online that keeps many of the poor from speaking out on the Internet.  | 
                    |
| 209 | 
                        +Where speaking out on social programs or job related issues might seem  | 
                    |
| 210 | 
                        +in their enlightened self interest, they see things closer to home.  | 
                    |
| 211 | 
                        +The boss or social worker or educational advisor virtually looking over  | 
                    |
| 212 | 
                        +their shoulder could put a fragile situation into a tailspin.</p>  | 
                    |
| 213 | 
                        +  | 
                    |
| 214 | 
                        +<p>We hope to show people how to more safely engage online, and then at  | 
                    |
| 215 | 
                        +the end of the year, evaluate how online and offline civic engagement has  | 
                    |
| 216 | 
                        +changed, and how the population sees this continuing in clear channels  | 
                    |
| 217 | 
                        +and anonymously into the future.</p>  | 
                    |
| 218 | 
                        +  | 
                    |
| 219 | 
                        +</ul>  | 
                    |
| 220 | 
                        +  | 
                    |
| 221 | 
                        +<h2>People who care about privacy, in general, increasingly use Tor</h2>  | 
                    |
| 222 | 
                        +  | 
                    |
| 223 | 
                        +<p>In the section below on recent media mentions of Tor, it becomes  | 
                    |
| 224 | 
                        +clear that the recent revelation of users' browsing patterns by AOL has  | 
                    |
| 225 | 
                        +piqued the conscience of the everyday Internet surfer in more privacy.  | 
                    |
| 226 | 
                        +All over the net, Tor is being recommended to people newly concerned  | 
                    |
| 227 | 
                        +about their privacy in the face of increasing breaches and betrayals of  | 
                    |
| 228 | 
                        +private data.</p>  | 
                    |
| 229 | 
                        +  | 
                    |
| 230 | 
                        +<h2>Soldiers in the field use Tor</h2>  | 
                    |
| 231 | 
                        +  | 
                    |
| 232 | 
                        +<ul>  | 
                    |
| 233 | 
                        +  | 
                    |
| 234 | 
                        +<li>Field agents</li>  | 
                    |
| 235 | 
                        +  | 
                    |
| 236 | 
                        +<p>How much, do you imagine, would the Iraqi insurgency pay to find out  | 
                    |
| 237 | 
                        +the location of every computer in Baghdad that logged into a military  | 
                    |
| 238 | 
                        +server in Maryland to read email? Tor can protect military personnel in  | 
                    |
| 239 | 
                        +the field by hiding their location, and even by concealing the location  | 
                    |
| 240 | 
                        +of Command and Control servers.</p>  | 
                    |
| 241 | 
                        +  | 
                    |
| 242 | 
                        +<li>Hidden services</li>  | 
                    |
| 243 | 
                        +  | 
                    |
| 244 | 
                        +</ul>  | 
                    |
| 245 | 
                        +  | 
                    |
| 246 | 
                        +<p>When the Internet was designed by DARPA, its primary purpose was to  | 
                    |
| 247 | 
                        +be able to facilitate distributed, robust communications in case of  | 
                    |
| 248 | 
                        +local strikes. However, some functions must be centralized, such as  | 
                    |
| 249 | 
                        +command and control sites. It's the nature of the Internet protocols to  | 
                    |
| 250 | 
                        +reveal the geographic location of any server that is reachable online,  | 
                    |
| 251 | 
                        +however Tor's hidden services capacity allows military command and  | 
                    |
| 252 | 
                        +control to be physically secure from discovery and takedown.</p>  | 
                    |
| 253 | 
                        +  | 
                    |
| 254 | 
                        +<h2>Law enforcement officers use Tor</h2>  | 
                    |
| 255 | 
                        +  | 
                    |
| 256 | 
                        +<p>Undercover officers use Tor to conceal their IP of origin during  | 
                    |
| 257 | 
                        +sting operations. “Anonymous tip lines” may still  | 
                    |
| 258 | 
                        +preserve a log of IP origins, if the informant isn't using Tor.</p>  | 
                    |
| 259 | 
                        +  | 
                    |
| 260 | 
                        +<ul>  | 
                    |
| 261 | 
                        +  | 
                    |
| 262 | 
                        +<li>online surveillance</li>  | 
                    |
| 263 | 
                        +  | 
                    |
| 264 | 
                        +<p>Tor allows officials to surf questionable web sites and services  | 
                    |
| 265 | 
                        +without leaving tell-tale tracks. If the system administrator of an  | 
                    |
| 266 | 
                        +illegal gambling site, for example, were to see multiple connections from  | 
                    |
| 267 | 
                        +governmental or law enforcement computers in usage logs, investigations  | 
                    |
| 268 | 
                        +would be hampered.</p>  | 
                    |
| 269 | 
                        +  | 
                    |
| 270 | 
                        +<li>sting operations</li>  | 
                    |
| 271 | 
                        +  | 
                    |
| 272 | 
                        +<p>Similarly, anonymity allows law officers to engage in online  | 
                    |
| 273 | 
                        +“undercover ” operations. Regardless of how good an  | 
                    |
| 274 | 
                        +undercover officer's “street cred” may be, if his or her  | 
                    |
| 275 | 
                        +email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p>  | 
                    |
| 276 | 
                        +  | 
                    |
| 277 | 
                        +<li>truly anonymous tip lines</li>  | 
                    |
| 278 | 
                        +  | 
                    |
| 279 | 
                        +</ul>  | 
                    |
| 280 | 
                        +  | 
                    |
| 281 | 
                        +<p>While online anonymous tip lines are popular, without anonymity  | 
                    |
| 282 | 
                        +software, they are far less useful. Sophisticated sources understand that  | 
                    |
| 283 | 
                        +although a name or email address is not attached to information, server  | 
                    |
| 284 | 
                        +logs can identify them very quickly. As a result, tip line web sites that  | 
                    |
| 285 | 
                        +do not encourage anonymity are limiting the sources of their tips.</p>  | 
                    |
| 286 | 
                        +  | 
                    |
| 287 | 
                        +<h2>Whistleblowers use Tor</h2>  | 
                    |
| 288 | 
                        +  | 
                    |
| 289 | 
                        +<p>In the US, the Supreme Court recently stripped legal protections from  | 
                    |
| 290 | 
                        +government whistleblowers. But whistleblowers working for governmental  | 
                    |
| 291 | 
                        +transparency or corporate accountability can use Tor to seek justice  | 
                    |
| 292 | 
                        +without personal repercussions.</p>  | 
                    |
| 293 | 
                        +  | 
                    |
| 294 | 
                        +<h2>Bloggers use Tor</h2>  | 
                    |
| 295 | 
                        +  | 
                    |
| 296 | 
                        +<p>Every day we hear about bloggers who are sued or fired for saying  | 
                    |
| 297 | 
                        +perfectly legal things online, in their blog. In addition to following  | 
                    |
| 298 | 
                        +the guidelines of EFF's Guide and RSF's guide, we recommend using Tor.</p>  | 
                    |
| 299 | 
                        +  | 
                    |
| 300 | 
                        +<h2>Citizens of repressive regimes use Tor</h2>  | 
                    |
| 301 | 
                        +  | 
                    |
| 302 | 
                        +<p>Whether to read information on censored topics (such as AIDS, Tibet,  | 
                    |
| 303 | 
                        +or democracy), or to write about controversial topics, people inside  | 
                    |
| 304 | 
                        +oppressive regimes can risk life and livelihood. Tor helps cover the  | 
                    |
| 305 | 
                        +tracks of dissidents, foreign nationals, or even just people who want  | 
                    |
| 306 | 
                        +free accesss to information most of us take for granted.</p>  | 
                    |
| 307 | 
                        +  | 
                    |
| 308 | 
                        +<h2>People organizing for change use Tor</h2>  | 
                    |
| 309 | 
                        +  | 
                    |
| 310 | 
                        +<ul>  | 
                    |
| 311 | 
                        +<li>union organizers/labor activists</li>  | 
                    |
| 312 | 
                        +  | 
                    |
| 313 | 
                        +See mentions above  | 
                    |
| 314 | 
                        +  | 
                    |
| 315 | 
                        +<li>democracy activists/dissidents</li>  | 
                    |
| 316 | 
                        +  | 
                    |
| 317 | 
                        +See mentions above  | 
                    |
| 318 | 
                        +  | 
                    |
| 319 | 
                        +<li>peace/green activists</li>  | 
                    |
| 320 | 
                        +  | 
                    |
| 321 | 
                        +<p>When groups such as the Friends Service Committee and environmental  | 
                    |
| 322 | 
                        +groups are increasingly falling under surveillance in the United States  | 
                    |
| 323 | 
                        +under laws meant to protect against terrorism, many peaceful agents of  | 
                    |
| 324 | 
                        +change rely on Tor for basic privacy for legitimate activities.</p>  | 
                    |
| 325 | 
                        +  | 
                    |
| 326 | 
                        +</ul>  | 
                    |
| 327 | 
                        +  | 
                    |
| 328 | 
                        +<h2>Business executives use Tor</h2>  | 
                    |
| 329 | 
                        +<ul>  | 
                    |
| 330 | 
                        +  | 
                    |
| 331 | 
                        +<li>security breach information clearinghouses</li>  | 
                    |
| 332 | 
                        +  | 
                    |
| 333 | 
                        +<p>Say a financial institution participates in a security clearinghouse  | 
                    |
| 334 | 
                        +of information on Internet attacks. Such a repository requires members  | 
                    |
| 335 | 
                        +to report breaches to a central group, who correlates attacks to detect  | 
                    |
| 336 | 
                        +coordinated patterns and send out alerts. But if a specific bank in  | 
                    |
| 337 | 
                        +St. Louis is breached, they don't want an attacker watching the incoming  | 
                    |
| 338 | 
                        +traffic to such a repository to be able to track where information is  | 
                    |
| 339 | 
                        +coming from. Even though every packet were encrypted, the Internet  | 
                    |
| 340 | 
                        +address would betray the location of a compromised system. Tor allows  | 
                    |
| 341 | 
                        +such repositories of sensitive information to resist compromises.</p>  | 
                    |
| 342 | 
                        +  | 
                    |
| 343 | 
                        +<li>seeing your competition as your market does</li>  | 
                    |
| 344 | 
                        +  | 
                    |
| 345 | 
                        +<p>If you try to check out a competitor's pricing, you may find no  | 
                    |
| 346 | 
                        +information or misleading information on their web site. This is because  | 
                    |
| 347 | 
                        +their web server may be keyed to detect connections from competitors,  | 
                    |
| 348 | 
                        +and block or spread disinformation to your staff. Tor allows a business  | 
                    |
| 349 | 
                        +to view their sector as the general public would view it.</p>  | 
                    |
| 350 | 
                        +  | 
                    |
| 351 | 
                        +<li>keeping strategies confidential</li>  | 
                    |
| 352 | 
                        +  | 
                    |
| 353 | 
                        +<p>An investment bank, for example, might not want industry snoopers to be  | 
                    |
| 354 | 
                        +able to track what web sites their analysts are watching. The strategic  | 
                    |
| 355 | 
                        +importance of traffic patterns, and the vulnerability of the surveillance  | 
                    |
| 356 | 
                        +of such data, is starting to be more widely recognized in several areas  | 
                    |
| 357 | 
                        +of the business world.</p>  | 
                    |
| 358 | 
                        +  | 
                    |
| 359 | 
                        +<li>accountability  | 
                    |
| 360 | 
                        +  | 
                    |
| 361 | 
                        +</ul>  | 
                    |
| 362 | 
                        +  | 
                    |
| 363 | 
                        +<p>In an age when irresponsible and unreported corporate activity has  | 
                    |
| 364 | 
                        +undermined multi-billion dollar businesses, an executive exercising true  | 
                    |
| 365 | 
                        +stewardship wants the whole staff to feel free to disclose internal  | 
                    |
| 366 | 
                        +malfeasance. Tor facilitates internal accountability before it turns  | 
                    |
| 367 | 
                        +into whistleblowing.</p>  | 
                    |
| 368 | 
                        +  | 
                    |
| 369 | 
                        +#include <foot.wmi>  | 
                    |
| 370 | 
                        +  | 
                    |
| 0 | 371 |