Andrew Lewman commited on 2008-05-18 03:38:11
Zeige 4 geänderte Dateien mit 14 Einfügungen und 124 Löschungen.
... | ... |
@@ -110,15 +110,6 @@ the <a href="https://www.torproject.org/download#Dev">downloads page</a>.</li> |
110 | 110 |
href="https://blog.torproject.org/blog/tor-project-google-summer-code-2008!">Tor |
111 | 111 |
Project is in Google Summer of Code 2008!</a></li> |
112 | 112 |
|
113 |
-<li>Feb 2008: The <a href="https://www.torproject.org/people#Board">Board |
|
114 |
-of Directors</a> welcomes <a |
|
115 |
-href="https://blog.torproject.org/blog/isaac-mao-elected-one-our-new-directors">Isaac |
|
116 |
-Mao</a> to the board. We thank Rebecca McKinnon for her support and |
|
117 |
-contributions to the project.</li> |
|
118 |
- |
|
119 |
-<li>Feb 2008: Tor is happy to |
|
120 |
-announce the <a href="https://blog.torproject.org">official Tor blog</a>.</li> |
|
121 |
- |
|
122 | 113 |
<li>Jan 2008: <a href="<page download>">Tor 0.1.2.19</a> (the latest |
123 | 114 |
stable release) fixes a huge memory leak on exit relays, makes the |
124 | 115 |
default exit policy a little bit more conservative so it's safer to run an exit |
... | ... |
@@ -1,115 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision: 11474 $ |
|
3 |
- |
|
4 |
-#include "head.wmi" TITLE="Tor: anonymity online" |
|
5 |
- |
|
6 |
-# Note to translators: this file is still under construction, and |
|
7 |
-# will probably change a whole lot before we link to it. So it's |
|
8 |
-# probably best to not translate it yet. |
|
9 |
- |
|
10 |
-<!-- SIDEBAR (OPTIONAL) --> |
|
11 |
-<div class="sidebar"> |
|
12 |
-<a href="<page download>"><img src="$(IMGROOT)/download_tor.png" alt="Download Tor" /></a> |
|
13 |
- |
|
14 |
-<br /> |
|
15 |
- |
|
16 |
-<a href="<page overview>"><img src="$(IMGROOT)/how_tor_works_thumb.png" alt="How Tor Works" /></a> |
|
17 |
-<div class="donatebutton"> |
|
18 |
-<a href="<page donate>">Support Tor: donate!</a> |
|
19 |
-</div> |
|
20 |
- |
|
21 |
-</div> |
|
22 |
-<!-- END SIDEBAR --> |
|
23 |
- |
|
24 |
-<div class="main-column"> |
|
25 |
- |
|
26 |
-<!-- PUT CONTENT AFTER THIS TAG --> |
|
27 |
- |
|
28 |
-<h2>Tor: anonymity online</h2> |
|
29 |
-<hr /> |
|
30 |
- |
|
31 |
-<p> |
|
32 |
-Tor helps keep you anonymous on the Internet. It transfers your |
|
33 |
-communications around a worldwide set of servers. This masks your |
|
34 |
-destination and source locations. This provides some protections from a |
|
35 |
-variety of attacks from a variety of people and organizations on the |
|
36 |
-Internet. There are many reasons to use Tor. For example: |
|
37 |
-</p> |
|
38 |
-<ul> |
|
39 |
-<li>You live in a country that restricts access to certain sites or services. |
|
40 |
-Tor hides where you go on the Internet from your ISP, |
|
41 |
-so you can access any Internet site.</li> |
|
42 |
-<li>You live in a repressive state that monitors the content of your communications. |
|
43 |
-Tor encrypts your data until it gets to an "exit node" that could be on another |
|
44 |
-continent, making it very difficult to monitor the content of Internet communications. |
|
45 |
-<li>You are an abuse victim who wishes to anonymously join a survivor discussion group. |
|
46 |
-Tor ensures that your chats and emails are not traceable to your computer.</li> |
|
47 |
-<li>You are a law enforcement officer or corporate user who needs to use email, |
|
48 |
-websites, or chat |
|
49 |
-without the recipients or server owners knowing who you are affiliated with. |
|
50 |
-Tor masks where you are coming from, making it very difficult |
|
51 |
-to figure out where you are coming from or who you are.</li> |
|
52 |
-<li>You simply want some privacy concerning where you go, what you view, and what you do |
|
53 |
-on the Internet. Tor hides your Internet use from your ISP, the servers and transit nodes, |
|
54 |
-and prevents monitoring by anyone trying to see who is doing what on the Internet.</li> |
|
55 |
-</ul> |
|
56 |
-We have a full page devoted to explaining exactly <a href="<page overview>"> |
|
57 |
-what Tor does, why it is important, and how it works</a>. |
|
58 |
- |
|
59 |
-<p> |
|
60 |
-To quickly start using Tor, we recommend the |
|
61 |
-<a href="<page download>">Vidalia bundle</a> |
|
62 |
-as the easiest to install and get working. |
|
63 |
-</p> |
|
64 |
- |
|
65 |
-<p> |
|
66 |
-There are three pieces of fine print you need to know about: |
|
67 |
-First, Tor does not protect you if you do not use it correctly. |
|
68 |
-Make sure to follow the |
|
69 |
-<a href="<page documentation>">instructions for your platform</a> |
|
70 |
-carefully. Second, even if you install, configure and use Tor correctly, |
|
71 |
-there are still |
|
72 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks"> |
|
73 |
-potential attacks that could compromise Tor's ability to protect you</a>. |
|
74 |
-Third, Tor is beta software, which means that it isn't done yet, and may |
|
75 |
-contain serious bugs or design flaws that render it ineffective. You should |
|
76 |
-not rely on Tor if you really need strong anonymity. |
|
77 |
-</p> |
|
78 |
- |
|
79 |
-<p> |
|
80 |
-Tor's security improves as its user base grows and |
|
81 |
-more people volunteer to |
|
82 |
-<a href="<page docs/tor-doc-server>">run a server</a>. It isn't |
|
83 |
-nearly as hard to set up as you might think, and can significantly |
|
84 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity"> |
|
85 |
-enhance your own personal security against some attacks</a>. |
|
86 |
-If you can't run a server for some reason, |
|
87 |
-we need funds to research attacks on the Tor network, improve performance, and develop |
|
88 |
-new features to make Tor more reliable, secure, and speedy. |
|
89 |
-<a href="<page donate>">Please donate.</a> |
|
90 |
-</p> |
|
91 |
- |
|
92 |
-<a id="News"></a> |
|
93 |
-<h2><a class="anchor" href="#News">News</a></h2> |
|
94 |
-<hr /> |
|
95 |
- |
|
96 |
-<ul> |
|
97 |
-<li>Sep 2007: If you have received email claiming to be Tor, it wasn't |
|
98 |
-from us. The <a href="<page download>">official Tor bundles</a> can be <a |
|
99 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/VerifyingSignatures">verified |
|
100 |
-as authentic</a>.</li> |
|
101 |
-<li>Aug 2007: <strong>Please update your Tor software!</strong> The |
|
102 |
-latest versions (stable: 0.1.2.17; development: 0.2.0.6-alpha) |
|
103 |
-patch a significant security vulnerability. See the <a |
|
104 |
-href="http://archives.seul.org/or/announce/Aug-2007/msg00000.html">release |
|
105 |
-announcement</a> for more information.</li> |
|
106 |
-<li><b>We are actively looking for new sponsors and funding.</b> |
|
107 |
-If your organization has an interest in keeping the Tor network usable |
|
108 |
-and fast, please <a href="<page contact>">contact us</a>. Sponsors of Tor |
|
109 |
-also get personal attention, better support, publicity (if they want it), |
|
110 |
-and get to influence the direction of our research and development.</li> |
|
111 |
-</ul> |
|
112 |
- |
|
113 |
- </div><!-- #main --> |
|
114 |
- |
|
115 |
-#include <foot.wmi> |
... | ... |
@@ -12,6 +12,10 @@ |
12 | 12 |
<hr /> |
13 | 13 |
|
14 | 14 |
<ul> |
15 |
+<li>Mar 2008: <a |
|
16 |
+href="https://blog.torproject.org/blog/tor-project-google-summer-code-2008!">Tor |
|
17 |
+Project is in Google Summer of Code 2008!</a></li> |
|
18 |
+ |
|
15 | 19 |
<li>Feb 2008: The <a href="https://www.torproject.org/people#Board">Board |
16 | 20 |
of Directors</a> welcomes <a |
17 | 21 |
href="https://blog.torproject.org/blog/isaac-mao-elected-one-our-new-directors">Isaac |
... | ... |
@@ -106,6 +106,16 @@ Tor-related stories that have popped up. </p> |
106 | 106 |
</tr> |
107 | 107 |
</thead> |
108 | 108 |
|
109 |
+<tr style="background-color: #e5e5e5;"> |
|
110 |
+<td>2008 Mar 12</td> |
|
111 |
+<td>SearchSecurity.com</td> |
|
112 |
+<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html"> |
|
113 |
+Tor network 'bridges' help evade blockers</a>. |
|
114 |
+Covers new Tor features designed to overcome filtering and blocking that prevent access |
|
115 |
+to the Tor network. |
|
116 |
+</td> |
|
117 |
+</tr> |
|
118 |
+ |
|
109 | 119 |
<tr> |
110 | 120 |
<td>2008 Feb 14</td> |
111 | 121 |
<td>Wired: Compiler Blog</td> |
112 | 122 |