Nick Mathewson commited on 2007-10-24 19:16:06
Zeige 3 geänderte Dateien mit 12 Einfügungen und 10 Löschungen.
... | ... |
@@ -83,7 +83,9 @@ href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension. |
83 | 83 |
|
84 | 84 |
<li>Browser plugins such as Java, Flash, ActiveX, RealPlayer, |
85 | 85 |
Quicktime, Adobe's PDF plugin, and others can be manipulated |
86 |
-into revealing your IP address. You should probably uninstall your plugins |
|
86 |
+into revealing your IP address. You should probably |
|
87 |
+<a href="http://plugindoc.mozdev.org/faqs/uninstall.html">uninstall your |
|
88 |
+plugins</a> |
|
87 | 89 |
(go to "about:plugins" to see what is installed), or investigate <a |
88 | 90 |
href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a |
89 | 91 |
href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and |
... | ... |
@@ -107,7 +109,7 @@ href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">i |
107 | 109 |
can't encrypt your traffic between the Tor network and its final |
108 | 110 |
destination.</a> |
109 | 111 |
If you are communicating sensitive information, you should use as much |
110 |
-care as you would on the normal scary Internet — use SSL or other |
|
112 |
+care as you would on the normal scary Internet — use HTTPS or other |
|
111 | 113 |
end-to-end encryption and authentication. |
112 | 114 |
</li> |
113 | 115 |
|
... | ... |
@@ -49,7 +49,7 @@ users is important, and how Tor works. |
49 | 49 |
<p> |
50 | 50 |
(There are three pieces of fine print you need to know about. |
51 | 51 |
First, Tor does not protect you if you do not use it correctly. |
52 |
-Read <a href="<page download>#Warnings">our list of warnings</a> and |
|
52 |
+Read <a href="<page download>#Warning">our list of warnings</a> and |
|
53 | 53 |
make sure to follow the |
54 | 54 |
<a href="<page documentation>#RunningTor">instructions for your platform</a> |
55 | 55 |
carefully. Second, even if you configure and use Tor correctly, |
... | ... |
@@ -20,8 +20,8 @@ great for users, but not so good for us, since publishing success |
20 | 20 |
stories about how people or organizations are staying anonymous could be |
21 | 21 |
counterproductive. |
22 | 22 |
As an example, we talked |
23 |
-to an FBI officer who explained that he uses Tor every day for his work |
|
24 |
-—but he quickly followed up |
|
23 |
+to an FBI officer who explained that he uses Tor every day for his |
|
24 |
+work — but he quickly followed up |
|
25 | 25 |
with a request not to provide details or mention his name. |
26 | 26 |
</p> |
27 | 27 |
|
... | ... |
@@ -92,8 +92,8 @@ jailed or harmed journalists all over the world.</p> |
92 | 92 |
<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li> |
93 | 93 |
|
94 | 94 |
<p>The US <a href="http://www.ibb.gov/">International Broadcasting |
95 |
-Bureau</a> supports Tor development Internet users in countries |
|
96 |
-that can't get |
|
95 |
+Bureau</a> supports Tor development Internet to help users in countries |
|
96 |
+where they can't get |
|
97 | 97 |
safe access to free media. Tor not only protects freedom of expression, |
98 | 98 |
but preserves the ability of persons behind national firewalls or under |
99 | 99 |
the surveillance of repressive regimes to view information that gives |
... | ... |
@@ -170,7 +170,7 @@ web site.</a></p> |
170 | 170 |
Africa reports that his nonprofit must budget 10% to cover various |
171 | 171 |
sorts of corruption, mostly bribes and such. When that percentage |
172 | 172 |
rises steeply, not only can they not afford the money, but they can |
173 |
-not afford to complain -- this is the point at which open objection can |
|
173 |
+not afford to complain — this is the point at which open objection can |
|
174 | 174 |
become dangerous. So his nonprofit has been working to use |
175 | 175 |
Tor to safely whistleblow on governmental corruption in order to continue |
176 | 176 |
their work more effectively and safely.</p> |
... | ... |
@@ -256,8 +256,6 @@ of Command and Control servers.</p> |
256 | 256 |
|
257 | 257 |
<li>Hidden services</li> |
258 | 258 |
|
259 |
-</ul> |
|
260 |
- |
|
261 | 259 |
<p>When the Internet was designed by DARPA, its primary purpose was to |
262 | 260 |
be able to facilitate distributed, robust communications in case of |
263 | 261 |
local strikes. However, some functions must be centralized, such as |
... | ... |
@@ -266,6 +264,8 @@ reveal the geographic location of any server that is reachable online, |
266 | 264 |
however Tor's hidden services capacity allows military command and |
267 | 265 |
control to be physically secure from discovery and takedown.</p> |
268 | 266 |
|
267 |
+</ul> |
|
268 |
+ |
|
269 | 269 |
<h2>Law enforcement officers use Tor</h2> |
270 | 270 |
|
271 | 271 |
<p>Undercover officers use Tor to conceal their IP address during |
272 | 272 |