Andrew Lewman commited on 2008-05-18 03:38:11
Zeige 4 geänderte Dateien mit 14 Einfügungen und 124 Löschungen.
| ... | ... |
@@ -110,15 +110,6 @@ the <a href="https://www.torproject.org/download#Dev">downloads page</a>.</li> |
| 110 | 110 |
href="https://blog.torproject.org/blog/tor-project-google-summer-code-2008!">Tor |
| 111 | 111 |
Project is in Google Summer of Code 2008!</a></li> |
| 112 | 112 |
|
| 113 |
-<li>Feb 2008: The <a href="https://www.torproject.org/people#Board">Board |
|
| 114 |
-of Directors</a> welcomes <a |
|
| 115 |
-href="https://blog.torproject.org/blog/isaac-mao-elected-one-our-new-directors">Isaac |
|
| 116 |
-Mao</a> to the board. We thank Rebecca McKinnon for her support and |
|
| 117 |
-contributions to the project.</li> |
|
| 118 |
- |
|
| 119 |
-<li>Feb 2008: Tor is happy to |
|
| 120 |
-announce the <a href="https://blog.torproject.org">official Tor blog</a>.</li> |
|
| 121 |
- |
|
| 122 | 113 |
<li>Jan 2008: <a href="<page download>">Tor 0.1.2.19</a> (the latest |
| 123 | 114 |
stable release) fixes a huge memory leak on exit relays, makes the |
| 124 | 115 |
default exit policy a little bit more conservative so it's safer to run an exit |
| ... | ... |
@@ -1,115 +0,0 @@ |
| 1 |
-## translation metadata |
|
| 2 |
-# Revision: $Revision: 11474 $ |
|
| 3 |
- |
|
| 4 |
-#include "head.wmi" TITLE="Tor: anonymity online" |
|
| 5 |
- |
|
| 6 |
-# Note to translators: this file is still under construction, and |
|
| 7 |
-# will probably change a whole lot before we link to it. So it's |
|
| 8 |
-# probably best to not translate it yet. |
|
| 9 |
- |
|
| 10 |
-<!-- SIDEBAR (OPTIONAL) --> |
|
| 11 |
-<div class="sidebar"> |
|
| 12 |
-<a href="<page download>"><img src="$(IMGROOT)/download_tor.png" alt="Download Tor" /></a> |
|
| 13 |
- |
|
| 14 |
-<br /> |
|
| 15 |
- |
|
| 16 |
-<a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a> |
|
| 17 |
-<div class="donatebutton"> |
|
| 18 |
-<a href="<page donate>">Support Tor: donate!</a> |
|
| 19 |
-</div> |
|
| 20 |
- |
|
| 21 |
-</div> |
|
| 22 |
-<!-- END SIDEBAR --> |
|
| 23 |
- |
|
| 24 |
-<div class="main-column"> |
|
| 25 |
- |
|
| 26 |
-<!-- PUT CONTENT AFTER THIS TAG --> |
|
| 27 |
- |
|
| 28 |
-<h2>Tor: anonymity online</h2> |
|
| 29 |
-<hr /> |
|
| 30 |
- |
|
| 31 |
-<p> |
|
| 32 |
-Tor helps keep you anonymous on the Internet. It transfers your |
|
| 33 |
-communications around a worldwide set of servers. This masks your |
|
| 34 |
-destination and source locations. This provides some protections from a |
|
| 35 |
-variety of attacks from a variety of people and organizations on the |
|
| 36 |
-Internet. There are many reasons to use Tor. For example: |
|
| 37 |
-</p> |
|
| 38 |
-<ul> |
|
| 39 |
-<li>You live in a country that restricts access to certain sites or services. |
|
| 40 |
-Tor hides where you go on the Internet from your ISP, |
|
| 41 |
-so you can access any Internet site.</li> |
|
| 42 |
-<li>You live in a repressive state that monitors the content of your communications. |
|
| 43 |
-Tor encrypts your data until it gets to an "exit node" that could be on another |
|
| 44 |
-continent, making it very difficult to monitor the content of Internet communications. |
|
| 45 |
-<li>You are an abuse victim who wishes to anonymously join a survivor discussion group. |
|
| 46 |
-Tor ensures that your chats and emails are not traceable to your computer.</li> |
|
| 47 |
-<li>You are a law enforcement officer or corporate user who needs to use email, |
|
| 48 |
-websites, or chat |
|
| 49 |
-without the recipients or server owners knowing who you are affiliated with. |
|
| 50 |
-Tor masks where you are coming from, making it very difficult |
|
| 51 |
-to figure out where you are coming from or who you are.</li> |
|
| 52 |
-<li>You simply want some privacy concerning where you go, what you view, and what you do |
|
| 53 |
-on the Internet. Tor hides your Internet use from your ISP, the servers and transit nodes, |
|
| 54 |
-and prevents monitoring by anyone trying to see who is doing what on the Internet.</li> |
|
| 55 |
-</ul> |
|
| 56 |
-We have a full page devoted to explaining exactly <a href="<page overview>"> |
|
| 57 |
-what Tor does, why it is important, and how it works</a>. |
|
| 58 |
- |
|
| 59 |
-<p> |
|
| 60 |
-To quickly start using Tor, we recommend the |
|
| 61 |
-<a href="<page download>">Vidalia bundle</a> |
|
| 62 |
-as the easiest to install and get working. |
|
| 63 |
-</p> |
|
| 64 |
- |
|
| 65 |
-<p> |
|
| 66 |
-There are three pieces of fine print you need to know about: |
|
| 67 |
-First, Tor does not protect you if you do not use it correctly. |
|
| 68 |
-Make sure to follow the |
|
| 69 |
-<a href="<page documentation>">instructions for your platform</a> |
|
| 70 |
-carefully. Second, even if you install, configure and use Tor correctly, |
|
| 71 |
-there are still |
|
| 72 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks"> |
|
| 73 |
-potential attacks that could compromise Tor's ability to protect you</a>. |
|
| 74 |
-Third, Tor is beta software, which means that it isn't done yet, and may |
|
| 75 |
-contain serious bugs or design flaws that render it ineffective. You should |
|
| 76 |
-not rely on Tor if you really need strong anonymity. |
|
| 77 |
-</p> |
|
| 78 |
- |
|
| 79 |
-<p> |
|
| 80 |
-Tor's security improves as its user base grows and |
|
| 81 |
-more people volunteer to |
|
| 82 |
-<a href="<page docs/tor-doc-server>">run a server</a>. It isn't |
|
| 83 |
-nearly as hard to set up as you might think, and can significantly |
|
| 84 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity"> |
|
| 85 |
-enhance your own personal security against some attacks</a>. |
|
| 86 |
-If you can't run a server for some reason, |
|
| 87 |
-we need funds to research attacks on the Tor network, improve performance, and develop |
|
| 88 |
-new features to make Tor more reliable, secure, and speedy. |
|
| 89 |
-<a href="<page donate>">Please donate.</a> |
|
| 90 |
-</p> |
|
| 91 |
- |
|
| 92 |
-<a id="News"></a> |
|
| 93 |
-<h2><a class="anchor" href="#News">News</a></h2> |
|
| 94 |
-<hr /> |
|
| 95 |
- |
|
| 96 |
-<ul> |
|
| 97 |
-<li>Sep 2007: If you have received email claiming to be Tor, it wasn't |
|
| 98 |
-from us. The <a href="<page download>">official Tor bundles</a> can be <a |
|
| 99 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/VerifyingSignatures">verified |
|
| 100 |
-as authentic</a>.</li> |
|
| 101 |
-<li>Aug 2007: <strong>Please update your Tor software!</strong> The |
|
| 102 |
-latest versions (stable: 0.1.2.17; development: 0.2.0.6-alpha) |
|
| 103 |
-patch a significant security vulnerability. See the <a |
|
| 104 |
-href="http://archives.seul.org/or/announce/Aug-2007/msg00000.html">release |
|
| 105 |
-announcement</a> for more information.</li> |
|
| 106 |
-<li><b>We are actively looking for new sponsors and funding.</b> |
|
| 107 |
-If your organization has an interest in keeping the Tor network usable |
|
| 108 |
-and fast, please <a href="<page contact>">contact us</a>. Sponsors of Tor |
|
| 109 |
-also get personal attention, better support, publicity (if they want it), |
|
| 110 |
-and get to influence the direction of our research and development.</li> |
|
| 111 |
-</ul> |
|
| 112 |
- |
|
| 113 |
- </div><!-- #main --> |
|
| 114 |
- |
|
| 115 |
-#include <foot.wmi> |
| ... | ... |
@@ -12,6 +12,10 @@ |
| 12 | 12 |
<hr /> |
| 13 | 13 |
|
| 14 | 14 |
<ul> |
| 15 |
+<li>Mar 2008: <a |
|
| 16 |
+href="https://blog.torproject.org/blog/tor-project-google-summer-code-2008!">Tor |
|
| 17 |
+Project is in Google Summer of Code 2008!</a></li> |
|
| 18 |
+ |
|
| 15 | 19 |
<li>Feb 2008: The <a href="https://www.torproject.org/people#Board">Board |
| 16 | 20 |
of Directors</a> welcomes <a |
| 17 | 21 |
href="https://blog.torproject.org/blog/isaac-mao-elected-one-our-new-directors">Isaac |
| ... | ... |
@@ -106,6 +106,16 @@ Tor-related stories that have popped up. </p> |
| 106 | 106 |
</tr> |
| 107 | 107 |
</thead> |
| 108 | 108 |
|
| 109 |
+<tr style="background-color: #e5e5e5;"> |
|
| 110 |
+<td>2008 Mar 12</td> |
|
| 111 |
+<td>SearchSecurity.com</td> |
|
| 112 |
+<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html"> |
|
| 113 |
+Tor network 'bridges' help evade blockers</a>. |
|
| 114 |
+Covers new Tor features designed to overcome filtering and blocking that prevent access |
|
| 115 |
+to the Tor network. |
|
| 116 |
+</td> |
|
| 117 |
+</tr> |
|
| 118 |
+ |
|
| 109 | 119 |
<tr> |
| 110 | 120 |
<td>2008 Feb 14</td> |
| 111 | 121 |
<td>Wired: Compiler Blog</td> |
| 112 | 122 |