Andrew Lewman commited on 2008-05-18 03:38:11
              Zeige 4 geänderte Dateien mit 14 Einfügungen und 124 Löschungen.
            
| ... | ... | 
                      @@ -110,15 +110,6 @@ the <a href="https://www.torproject.org/download#Dev">downloads page</a>.</li>  | 
                  
| 110 | 110 | 
                        href="https://blog.torproject.org/blog/tor-project-google-summer-code-2008!">Tor  | 
                    
| 111 | 111 | 
                        Project is in Google Summer of Code 2008!</a></li>  | 
                    
| 112 | 112 | 
                         | 
                    
| 113 | 
                        -<li>Feb 2008: The <a href="https://www.torproject.org/people#Board">Board  | 
                    |
| 114 | 
                        -of Directors</a> welcomes <a  | 
                    |
| 115 | 
                        -href="https://blog.torproject.org/blog/isaac-mao-elected-one-our-new-directors">Isaac  | 
                    |
| 116 | 
                        -Mao</a> to the board. We thank Rebecca McKinnon for her support and  | 
                    |
| 117 | 
                        -contributions to the project.</li>  | 
                    |
| 118 | 
                        -  | 
                    |
| 119 | 
                        -<li>Feb 2008: Tor is happy to  | 
                    |
| 120 | 
                        -announce the <a href="https://blog.torproject.org">official Tor blog</a>.</li>  | 
                    |
| 121 | 
                        -  | 
                    |
| 122 | 113 | 
                        <li>Jan 2008: <a href="<page download>">Tor 0.1.2.19</a> (the latest  | 
                    
| 123 | 114 | 
                        stable release) fixes a huge memory leak on exit relays, makes the  | 
                    
| 124 | 115 | 
                        default exit policy a little bit more conservative so it's safer to run an exit  | 
                    
| ... | ... | 
                      @@ -1,115 +0,0 @@  | 
                  
| 1 | 
                        -## translation metadata  | 
                    |
| 2 | 
                        -# Revision: $Revision: 11474 $  | 
                    |
| 3 | 
                        -  | 
                    |
| 4 | 
                        -#include "head.wmi" TITLE="Tor: anonymity online"  | 
                    |
| 5 | 
                        -  | 
                    |
| 6 | 
                        -# Note to translators: this file is still under construction, and  | 
                    |
| 7 | 
                        -# will probably change a whole lot before we link to it. So it's  | 
                    |
| 8 | 
                        -# probably best to not translate it yet.  | 
                    |
| 9 | 
                        -  | 
                    |
| 10 | 
                        -<!-- SIDEBAR (OPTIONAL) -->  | 
                    |
| 11 | 
                        -<div class="sidebar">  | 
                    |
| 12 | 
                        -<a href="<page download>"><img src="$(IMGROOT)/download_tor.png" alt="Download Tor" /></a>  | 
                    |
| 13 | 
                        -  | 
                    |
| 14 | 
                        -<br />  | 
                    |
| 15 | 
                        -  | 
                    |
| 16 | 
                        -<a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a>  | 
                    |
| 17 | 
                        -<div class="donatebutton">  | 
                    |
| 18 | 
                        -<a href="<page donate>">Support Tor: donate!</a>  | 
                    |
| 19 | 
                        -</div>  | 
                    |
| 20 | 
                        -  | 
                    |
| 21 | 
                        -</div>  | 
                    |
| 22 | 
                        -<!-- END SIDEBAR -->  | 
                    |
| 23 | 
                        -  | 
                    |
| 24 | 
                        -<div class="main-column">  | 
                    |
| 25 | 
                        -  | 
                    |
| 26 | 
                        -<!-- PUT CONTENT AFTER THIS TAG -->  | 
                    |
| 27 | 
                        -  | 
                    |
| 28 | 
                        -<h2>Tor: anonymity online</h2>  | 
                    |
| 29 | 
                        -<hr />  | 
                    |
| 30 | 
                        -  | 
                    |
| 31 | 
                        -<p>  | 
                    |
| 32 | 
                        -Tor helps keep you anonymous on the Internet. It transfers your  | 
                    |
| 33 | 
                        -communications around a worldwide set of servers. This masks your  | 
                    |
| 34 | 
                        -destination and source locations. This provides some protections from a  | 
                    |
| 35 | 
                        -variety of attacks from a variety of people and organizations on the  | 
                    |
| 36 | 
                        -Internet. There are many reasons to use Tor. For example:  | 
                    |
| 37 | 
                        -</p>  | 
                    |
| 38 | 
                        -<ul>  | 
                    |
| 39 | 
                        -<li>You live in a country that restricts access to certain sites or services.  | 
                    |
| 40 | 
                        -Tor hides where you go on the Internet from your ISP,  | 
                    |
| 41 | 
                        -so you can access any Internet site.</li>  | 
                    |
| 42 | 
                        -<li>You live in a repressive state that monitors the content of your communications.  | 
                    |
| 43 | 
                        -Tor encrypts your data until it gets to an "exit node" that could be on another  | 
                    |
| 44 | 
                        -continent, making it very difficult to monitor the content of Internet communications.  | 
                    |
| 45 | 
                        -<li>You are an abuse victim who wishes to anonymously join a survivor discussion group.  | 
                    |
| 46 | 
                        -Tor ensures that your chats and emails are not traceable to your computer.</li>  | 
                    |
| 47 | 
                        -<li>You are a law enforcement officer or corporate user who needs to use email,  | 
                    |
| 48 | 
                        -websites, or chat  | 
                    |
| 49 | 
                        -without the recipients or server owners knowing who you are affiliated with.  | 
                    |
| 50 | 
                        -Tor masks where you are coming from, making it very difficult  | 
                    |
| 51 | 
                        -to figure out where you are coming from or who you are.</li>  | 
                    |
| 52 | 
                        -<li>You simply want some privacy concerning where you go, what you view, and what you do  | 
                    |
| 53 | 
                        -on the Internet. Tor hides your Internet use from your ISP, the servers and transit nodes,  | 
                    |
| 54 | 
                        -and prevents monitoring by anyone trying to see who is doing what on the Internet.</li>  | 
                    |
| 55 | 
                        -</ul>  | 
                    |
| 56 | 
                        -We have a full page devoted to explaining exactly <a href="<page overview>">  | 
                    |
| 57 | 
                        -what Tor does, why it is important, and how it works</a>.  | 
                    |
| 58 | 
                        -  | 
                    |
| 59 | 
                        -<p>  | 
                    |
| 60 | 
                        -To quickly start using Tor, we recommend the  | 
                    |
| 61 | 
                        -<a href="<page download>">Vidalia bundle</a>  | 
                    |
| 62 | 
                        -as the easiest to install and get working.  | 
                    |
| 63 | 
                        -</p>  | 
                    |
| 64 | 
                        -  | 
                    |
| 65 | 
                        -<p>  | 
                    |
| 66 | 
                        -There are three pieces of fine print you need to know about:  | 
                    |
| 67 | 
                        -First, Tor does not protect you if you do not use it correctly.  | 
                    |
| 68 | 
                        -Make sure to follow the  | 
                    |
| 69 | 
                        -<a href="<page documentation>">instructions for your platform</a>  | 
                    |
| 70 | 
                        -carefully. Second, even if you install, configure and use Tor correctly,  | 
                    |
| 71 | 
                        -there are still  | 
                    |
| 72 | 
                        -<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks">  | 
                    |
| 73 | 
                        -potential attacks that could compromise Tor's ability to protect you</a>.  | 
                    |
| 74 | 
                        -Third, Tor is beta software, which means that it isn't done yet, and may  | 
                    |
| 75 | 
                        -contain serious bugs or design flaws that render it ineffective. You should  | 
                    |
| 76 | 
                        -not rely on Tor if you really need strong anonymity.  | 
                    |
| 77 | 
                        -</p>  | 
                    |
| 78 | 
                        -  | 
                    |
| 79 | 
                        -<p>  | 
                    |
| 80 | 
                        -Tor's security improves as its user base grows and  | 
                    |
| 81 | 
                        -more people volunteer to  | 
                    |
| 82 | 
                        -<a href="<page docs/tor-doc-server>">run a server</a>. It isn't  | 
                    |
| 83 | 
                        -nearly as hard to set up as you might think, and can significantly  | 
                    |
| 84 | 
                        -<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">  | 
                    |
| 85 | 
                        -enhance your own personal security against some attacks</a>.  | 
                    |
| 86 | 
                        -If you can't run a server for some reason,  | 
                    |
| 87 | 
                        -we need funds to research attacks on the Tor network, improve performance, and develop  | 
                    |
| 88 | 
                        -new features to make Tor more reliable, secure, and speedy.  | 
                    |
| 89 | 
                        -<a href="<page donate>">Please donate.</a>  | 
                    |
| 90 | 
                        -</p>  | 
                    |
| 91 | 
                        -  | 
                    |
| 92 | 
                        -<a id="News"></a>  | 
                    |
| 93 | 
                        -<h2><a class="anchor" href="#News">News</a></h2>  | 
                    |
| 94 | 
                        -<hr />  | 
                    |
| 95 | 
                        -  | 
                    |
| 96 | 
                        -<ul>  | 
                    |
| 97 | 
                        -<li>Sep 2007: If you have received email claiming to be Tor, it wasn't  | 
                    |
| 98 | 
                        -from us. The <a href="<page download>">official Tor bundles</a> can be <a  | 
                    |
| 99 | 
                        -href="https://wiki.torproject.org/noreply/TheOnionRouter/VerifyingSignatures">verified  | 
                    |
| 100 | 
                        -as authentic</a>.</li>  | 
                    |
| 101 | 
                        -<li>Aug 2007: <strong>Please update your Tor software!</strong> The  | 
                    |
| 102 | 
                        -latest versions (stable: 0.1.2.17; development: 0.2.0.6-alpha)  | 
                    |
| 103 | 
                        -patch a significant security vulnerability. See the <a  | 
                    |
| 104 | 
                        -href="http://archives.seul.org/or/announce/Aug-2007/msg00000.html">release  | 
                    |
| 105 | 
                        -announcement</a> for more information.</li>  | 
                    |
| 106 | 
                        -<li><b>We are actively looking for new sponsors and funding.</b>  | 
                    |
| 107 | 
                        -If your organization has an interest in keeping the Tor network usable  | 
                    |
| 108 | 
                        -and fast, please <a href="<page contact>">contact us</a>. Sponsors of Tor  | 
                    |
| 109 | 
                        -also get personal attention, better support, publicity (if they want it),  | 
                    |
| 110 | 
                        -and get to influence the direction of our research and development.</li>  | 
                    |
| 111 | 
                        -</ul>  | 
                    |
| 112 | 
                        -  | 
                    |
| 113 | 
                        - </div><!-- #main -->  | 
                    |
| 114 | 
                        -  | 
                    |
| 115 | 
                        -#include <foot.wmi>  | 
                    
| ... | ... | 
                      @@ -12,6 +12,10 @@  | 
                  
| 12 | 12 | 
                        <hr />  | 
                    
| 13 | 13 | 
                         | 
                    
| 14 | 14 | 
                        <ul>  | 
                    
| 15 | 
                        +<li>Mar 2008: <a  | 
                    |
| 16 | 
                        +href="https://blog.torproject.org/blog/tor-project-google-summer-code-2008!">Tor  | 
                    |
| 17 | 
                        +Project is in Google Summer of Code 2008!</a></li>  | 
                    |
| 18 | 
                        +  | 
                    |
| 15 | 19 | 
                        <li>Feb 2008: The <a href="https://www.torproject.org/people#Board">Board  | 
                    
| 16 | 20 | 
                        of Directors</a> welcomes <a  | 
                    
| 17 | 21 | 
                        href="https://blog.torproject.org/blog/isaac-mao-elected-one-our-new-directors">Isaac  | 
                    
| ... | ... | 
                      @@ -106,6 +106,16 @@ Tor-related stories that have popped up. </p>  | 
                  
| 106 | 106 | 
                        </tr>  | 
                    
| 107 | 107 | 
                        </thead>  | 
                    
| 108 | 108 | 
                         | 
                    
| 109 | 
                        +<tr style="background-color: #e5e5e5;">  | 
                    |
| 110 | 
                        +<td>2008 Mar 12</td>  | 
                    |
| 111 | 
                        +<td>SearchSecurity.com</td>  | 
                    |
| 112 | 
                        +<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">  | 
                    |
| 113 | 
                        +Tor network 'bridges' help evade blockers</a>.  | 
                    |
| 114 | 
                        +Covers new Tor features designed to overcome filtering and blocking that prevent access  | 
                    |
| 115 | 
                        +to the Tor network.  | 
                    |
| 116 | 
                        +</td>  | 
                    |
| 117 | 
                        +</tr>  | 
                    |
| 118 | 
                        +  | 
                    |
| 109 | 119 | 
                        <tr>  | 
                    
| 110 | 120 | 
                        <td>2008 Feb 14</td>  | 
                    
| 111 | 121 | 
                        <td>Wired: Compiler Blog</td>  | 
                    
| 112 | 122 |