Nick Mathewson commited on 2007-10-24 19:16:06
              Zeige 3 geänderte Dateien mit 12 Einfügungen und 10 Löschungen.
            
| ... | ... | 
                      @@ -83,7 +83,9 @@ href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension.  | 
                  
| 83 | 83 | 
                         | 
                    
| 84 | 84 | 
                        <li>Browser plugins such as Java, Flash, ActiveX, RealPlayer,  | 
                    
| 85 | 85 | 
                        Quicktime, Adobe's PDF plugin, and others can be manipulated  | 
                    
| 86 | 
                        -into revealing your IP address. You should probably uninstall your plugins  | 
                    |
| 86 | 
                        +into revealing your IP address. You should probably  | 
                    |
| 87 | 
                        +<a href="http://plugindoc.mozdev.org/faqs/uninstall.html">uninstall your  | 
                    |
| 88 | 
                        +plugins</a>  | 
                    |
| 87 | 89 | 
                        (go to "about:plugins" to see what is installed), or investigate <a  | 
                    
| 88 | 90 | 
                        href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a  | 
                    
| 89 | 91 | 
                        href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and  | 
                    
| ... | ... | 
                      @@ -107,7 +109,7 @@ href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">i  | 
                  
| 107 | 109 | 
                        can't encrypt your traffic between the Tor network and its final  | 
                    
| 108 | 110 | 
                        destination.</a>  | 
                    
| 109 | 111 | 
                        If you are communicating sensitive information, you should use as much  | 
                    
| 110 | 
                        -care as you would on the normal scary Internet — use SSL or other  | 
                    |
| 112 | 
                        +care as you would on the normal scary Internet — use HTTPS or other  | 
                    |
| 111 | 113 | 
                        end-to-end encryption and authentication.  | 
                    
| 112 | 114 | 
                        </li>  | 
                    
| 113 | 115 | 
                         | 
                    
| ... | ... | 
                      @@ -49,7 +49,7 @@ users is important, and how Tor works.  | 
                  
| 49 | 49 | 
                        <p>  | 
                    
| 50 | 50 | 
                        (There are three pieces of fine print you need to know about.  | 
                    
| 51 | 51 | 
                        First, Tor does not protect you if you do not use it correctly.  | 
                    
| 52 | 
                        -Read <a href="<page download>#Warnings">our list of warnings</a> and  | 
                    |
| 52 | 
                        +Read <a href="<page download>#Warning">our list of warnings</a> and  | 
                    |
| 53 | 53 | 
                        make sure to follow the  | 
                    
| 54 | 54 | 
                        <a href="<page documentation>#RunningTor">instructions for your platform</a>  | 
                    
| 55 | 55 | 
                        carefully. Second, even if you configure and use Tor correctly,  | 
                    
| ... | ... | 
                      @@ -20,8 +20,8 @@ great for users, but not so good for us, since publishing success  | 
                  
| 20 | 20 | 
                        stories about how people or organizations are staying anonymous could be  | 
                    
| 21 | 21 | 
                        counterproductive.  | 
                    
| 22 | 22 | 
                        As an example, we talked  | 
                    
| 23 | 
                        -to an FBI officer who explained that he uses Tor every day for his work  | 
                    |
| 24 | 
                        -—but he quickly followed up  | 
                    |
| 23 | 
                        +to an FBI officer who explained that he uses Tor every day for his  | 
                    |
| 24 | 
                        +work — but he quickly followed up  | 
                    |
| 25 | 25 | 
                        with a request not to provide details or mention his name.  | 
                    
| 26 | 26 | 
                        </p>  | 
                    
| 27 | 27 | 
                         | 
                    
| ... | ... | 
                      @@ -92,8 +92,8 @@ jailed or harmed journalists all over the world.</p>  | 
                  
| 92 | 92 | 
                        <li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>  | 
                    
| 93 | 93 | 
                         | 
                    
| 94 | 94 | 
                        <p>The US <a href="http://www.ibb.gov/">International Broadcasting  | 
                    
| 95 | 
                        -Bureau</a> supports Tor development Internet users in countries  | 
                    |
| 96 | 
                        -that can't get  | 
                    |
| 95 | 
                        +Bureau</a> supports Tor development Internet to help users in countries  | 
                    |
| 96 | 
                        +where they can't get  | 
                    |
| 97 | 97 | 
                        safe access to free media. Tor not only protects freedom of expression,  | 
                    
| 98 | 98 | 
                        but preserves the ability of persons behind national firewalls or under  | 
                    
| 99 | 99 | 
                        the surveillance of repressive regimes to view information that gives  | 
                    
| ... | ... | 
                      @@ -170,7 +170,7 @@ web site.</a></p>  | 
                  
| 170 | 170 | 
                        Africa reports that his nonprofit must budget 10% to cover various  | 
                    
| 171 | 171 | 
                        sorts of corruption, mostly bribes and such. When that percentage  | 
                    
| 172 | 172 | 
                        rises steeply, not only can they not afford the money, but they can  | 
                    
| 173 | 
                        -not afford to complain -- this is the point at which open objection can  | 
                    |
| 173 | 
                        +not afford to complain — this is the point at which open objection can  | 
                    |
| 174 | 174 | 
                        become dangerous. So his nonprofit has been working to use  | 
                    
| 175 | 175 | 
                        Tor to safely whistleblow on governmental corruption in order to continue  | 
                    
| 176 | 176 | 
                        their work more effectively and safely.</p>  | 
                    
| ... | ... | 
                      @@ -256,8 +256,6 @@ of Command and Control servers.</p>  | 
                  
| 256 | 256 | 
                         | 
                    
| 257 | 257 | 
                        <li>Hidden services</li>  | 
                    
| 258 | 258 | 
                         | 
                    
| 259 | 
                        -</ul>  | 
                    |
| 260 | 
                        -  | 
                    |
| 261 | 259 | 
                        <p>When the Internet was designed by DARPA, its primary purpose was to  | 
                    
| 262 | 260 | 
                        be able to facilitate distributed, robust communications in case of  | 
                    
| 263 | 261 | 
                        local strikes. However, some functions must be centralized, such as  | 
                    
| ... | ... | 
                      @@ -266,6 +264,8 @@ reveal the geographic location of any server that is reachable online,  | 
                  
| 266 | 264 | 
                        however Tor's hidden services capacity allows military command and  | 
                    
| 267 | 265 | 
                        control to be physically secure from discovery and takedown.</p>  | 
                    
| 268 | 266 | 
                         | 
                    
| 267 | 
                        +</ul>  | 
                    |
| 268 | 
                        +  | 
                    |
| 269 | 269 | 
                        <h2>Law enforcement officers use Tor</h2>  | 
                    
| 270 | 270 | 
                         | 
                    
| 271 | 271 | 
                        <p>Undercover officers use Tor to conceal their IP address during  | 
                    
| 272 | 272 |