Browse code

Fix dead links and update content. (#22522)

Make dead news report links point to wayback machine versions.
Make dead adopton link point to Wikipedia.
Removed outdated IBB/BBG link and content.
Added SecureDrop to journalist section.

kat authored on02/12/2017 20:50:57
Showing1 changed files
... ...
@@ -57,7 +57,7 @@
57 57
     </li>
58 58
     <li><strong>They research sensitive topics.</strong>
59 59
     There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
60
-    <a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
60
+    <a href="https://web.archive.org/web/20120107130815/http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63 63
 <li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
... ...
@@ -74,12 +74,10 @@
74 74
     tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
75 75
     journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
76 76
     </li>
77
-    <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
78
-    (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
79
-    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
80
-    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
81
-    economics and religion.
82
-    </li>
77
+	<li>Tor is part of <strong><a href="https://securedrop.org/">SecureDrop</a></strong>, an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. <a href="https://securedrop.org/directory">Many news organizations</a> use SecureDrop, including the Associated Press, The Washington Post, The New York Times, The CBC, ProPublica, Dagbladet, and more.
78
+	</li>
79
+	<li>Tor preserves the ability of people behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion.
80
+	</li>
83 81
     <li><strong>Citizen journalists in China</strong> use Tor to write about
84 82
     local events to encourage social change and political reform.
85 83
     </li>
... ...
@@ -179,7 +177,7 @@
179 177
     <li>
180 178
     Tor can help activists avoid government or corporate censorship that hinders organization.
181 179
     In one such case, a
182
-    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
180
+    <a href="https://web.archive.org/web/20071015142759/http://www.cbc.ca:80/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
183 181
     to help organize a strike.
184 182
     </li>
185 183
     </ul>
... ...
@@ -256,7 +254,7 @@
256 254
     <hr>
257 255
     <ul>
258 256
     <li>Frequently we hear about bloggers who are
259
-    <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
257
+    <a href="https://web.archive.org/web/20060910122231/http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
260 258
     <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
261 259
     for saying perfectly legal things online, in their blog.</li>
262 260
     <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
... ...
@@ -317,8 +315,8 @@
317 315
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
318 316
     href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
319 317
     just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
320
-    <a href="https://www.crimeline.co.za/">police tip lines</a>,
321
-    <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
318
+    <a href="https://www.crimeline.co.za/">police tip lines</a>, 
319
+    <a href="https://en.wikipedia.org/wiki/Closed_adoption">some adoption services</a>,
322 320
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
323 321
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
324 322
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
Browse code

Remove deadlink in who uses Tor

hiromipaw authored on22/11/2017 18:21:25
Showing1 changed files
... ...
@@ -83,9 +83,8 @@
83 83
     <li><strong>Citizen journalists in China</strong> use Tor to write about
84 84
     local events to encourage social change and political reform.
85 85
     </li>
86
-    <li><strong>Citizens and journalists in <a
87
-    href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
88
-    holes</a></strong> use Tor to research state propaganda and opposing
86
+    <li><strong>Citizens and journalists in Internet black
87
+    holes</strong> use Tor to research state propaganda and opposing
89 88
     viewpoints, to file stories with non-State controlled media, and to
90 89
     avoid risking the personal consequences of intellectual curiosity.
91 90
     </li>
Browse code

Change hidden service to onion service. (See #24285)

kat authored on16/11/2017 19:08:34
Showing1 changed files
... ...
@@ -280,17 +280,17 @@
280 280
     operations, as well as protecting themselves from physical harm.
281 281
     </li>
282 282
 
283
-    <li><strong>Hidden services:</strong>
284
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
285
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
286
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
287
-    control to be physically secure from discovery and takedown.
288
-    </li>
289
-    <li><strong>Intelligence gathering:</strong>
290
-    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
291
-    to record a military address, thereby revealing the surveillance.
292
-    </li>
293
-    </ul>
283
+    <li><strong>Onion services:</strong>
284
+	When the Internet was designed by DARPA, its primary purpose was to be able
285
+	to facilitate distributed, robust communications in case of local strikes.
286
+	However, some functions must be centralized, such as command and control
287
+	sites.  It's the nature of the Internet protocols to reveal the geographic
288
+	location of any server that is reachable online.  Tor's onion services
289
+	capacity allows military command and control to be physically secure from
290
+	discovery and takedown.  </li> <li><strong>Intelligence gathering:</strong>
291
+	Military personnel need to use electronic resources run and monitored by
292
+	insurgents. They do not want the webserver logs on an insurgent website to
293
+	record a military address, thereby revealing the surveillance.  </li> </ul>
294 294
 
295 295
     <a name="itprofessionals"></a>
296 296
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
Browse code

Don't put all sections with pictures on top on torusers page

Sebastian Hahn authored on14/03/2015 13:36:45
Showing1 changed files
... ...
@@ -29,7 +29,7 @@
29 29
     href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
30 30
     Tor stories</a>! What do you use Tor for? Why do you need it? What
31 31
     has Tor done for you? We need your stories.</p>
32
-    
32
+
33 33
     <a name="normalusers"></a>
34 34
     <img src="$(IMGROOT)/family.jpg" alt="Normal People">
35 35
     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
... ...
@@ -64,35 +64,7 @@
64 64
 </li>
65 65
 <li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
66 66
     </ul>
67
-    
68
-    <a name="military"></a>
69
-    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
70
-    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
71
-    <hr>
72
-    <ul>
73
-    
74
-    <li>
75
-    <strong>Field agents:</strong>
76
-    It is not difficult for insurgents to monitor Internet traffic and
77
-    discover all the hotels and other locations from which people are
78
-    connecting to known military servers.
79
-    Military field agents deployed away from home use Tor to
80
-    mask the sites they are visiting, protecting military interests and
81
-    operations, as well as protecting themselves from physical harm.
82
-    </li>
83
-    
84
-    <li><strong>Hidden services:</strong>
85
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
86
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
87
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
88
-    control to be physically secure from discovery and takedown.
89
-    </li>
90
-    <li><strong>Intelligence gathering:</strong>
91
-    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
92
-    to record a military address, thereby revealing the surveillance.
93
-    </li>
94
-    </ul>
95
-    
67
+
96 68
     <a name="journalist"></a>
97 69
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
98 70
     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
... ...
@@ -118,7 +90,7 @@
118 90
     avoid risking the personal consequences of intellectual curiosity.
119 91
     </li>
120 92
     </ul>
121
-    
93
+
122 94
     <a name="lawenforcement"></a>
123 95
     <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
124 96
     <hr>
... ...
@@ -144,7 +116,7 @@
144 116
     do not encourage anonymity are limiting the sources of their tips.
145 117
     </li>
146 118
     </ul>
147
-    
119
+
148 120
     <a name="activists"></a>
149 121
     <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers">
150 122
     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
... ...
@@ -212,7 +184,7 @@
212 184
     to help organize a strike.
213 185
     </li>
214 186
     </ul>
215
-    
187
+
216 188
     <a name="spotlight"></a>
217 189
     <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
218 190
     <hr>
... ...
@@ -241,7 +213,7 @@
241 213
     this continuing into the future.
242 214
     </li>
243 215
     </ul>
244
-    
216
+
245 217
     <a name="executives"></a>
246 218
     <img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
247 219
     <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
... ...
@@ -279,7 +251,7 @@
279 251
     into whistleblowing.
280 252
     </li>
281 253
     </ul>
282
-    
254
+
283 255
     <a name="bloggers"></a>
284 256
     <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
285 257
     <hr>
... ...
@@ -291,7 +263,35 @@
291 263
     <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
292 264
     <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
293 265
     </ul>
294
-    
266
+
267
+    <a name="military"></a>
268
+    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
269
+    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
270
+    <hr>
271
+    <ul>
272
+
273
+    <li>
274
+    <strong>Field agents:</strong>
275
+    It is not difficult for insurgents to monitor Internet traffic and
276
+    discover all the hotels and other locations from which people are
277
+    connecting to known military servers.
278
+    Military field agents deployed away from home use Tor to
279
+    mask the sites they are visiting, protecting military interests and
280
+    operations, as well as protecting themselves from physical harm.
281
+    </li>
282
+
283
+    <li><strong>Hidden services:</strong>
284
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
285
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
286
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
287
+    control to be physically secure from discovery and takedown.
288
+    </li>
289
+    <li><strong>Intelligence gathering:</strong>
290
+    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
291
+    to record a military address, thereby revealing the surveillance.
292
+    </li>
293
+    </ul>
294
+
295 295
     <a name="itprofessionals"></a>
296 296
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
297 297
     <hr>
... ...
@@ -302,7 +302,7 @@
302 302
     <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
303 303
     <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
304 304
     </ul>
305
-    
305
+
306 306
     <p>
307 307
     Please do send us your success stories. They are very important because
308 308
     Tor provides anonymity. While it is thrilling to speculate about <a
... ...
@@ -312,7 +312,7 @@
312 312
     counterproductive.  For example, we talked to an FBI officer who
313 313
     explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
314 314
     details or mention his name.</p>
315
-    
315
+
316 316
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
317 317
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
318 318
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
Browse code

Replaced a dead link as reported in #10768

Matt Pagan authored on29/01/2014 20:27:56
Showing1 changed files
... ...
@@ -57,7 +57,7 @@
57 57
     </li>
58 58
     <li><strong>They research sensitive topics.</strong>
59 59
     There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
60
-    <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
60
+    <a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63 63
 <li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
Browse code

Removed links to news stories lots of people have already read.

Matt Pagan authored on30/10/2013 19:43:53
Showing1 changed files
... ...
@@ -60,8 +60,9 @@
60 60
     <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63
-<li><strong>They skirt surveillance.</strong> Even using the web for harmless tasks can sometimes <a href="http://www.theatlanticwire.com/national/2013/08/government-knocking-doors-because-google-searches/67864/">raise red flags</a> for suspicious observers. When the 2013 <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">disclosures of mass surveillance</a> became public, internal NSA documents revealed Tor to be <a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">an effective surveillance circumvention tool</a>.</li>
64
-<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="http://techcrunch.com/2013/06/01/as-anti-government-protests-erupt-in-istanbul-facebook-and-twitter-appear-suddenly-throttled/">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
63
+<li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
64
+</li>
65
+<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
65 66
     </ul>
66 67
     
67 68
     <a name="military"></a>
Matt Pagan authored on29/10/2013 08:48:36
Showing1 changed files
... ...
@@ -60,6 +60,8 @@
60 60
     <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63
+<li><strong>They skirt surveillance.</strong> Even using the web for harmless tasks can sometimes <a href="http://www.theatlanticwire.com/national/2013/08/government-knocking-doors-because-google-searches/67864/">raise red flags</a> for suspicious observers. When the 2013 <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">disclosures of mass surveillance</a> became public, internal NSA documents revealed Tor to be <a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">an effective surveillance circumvention tool</a>.</li>
64
+<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="http://techcrunch.com/2013/06/01/as-anti-government-protests-erupt-in-istanbul-facebook-and-twitter-appear-suddenly-throttled/">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
63 65
     </ul>
64 66
     
65 67
     <a name="military"></a>
Browse code

remove dead page reference, fixes #6629.

Andrew Lewman authored on20/09/2012 20:12:00
Showing1 changed files
... ...
@@ -315,7 +315,7 @@
315 315
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
316 316
     href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
317 317
     just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
318
-    <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
318
+    <a href="https://www.crimeline.co.za/">police tip lines</a>,
319 319
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
320 320
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
321 321
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
Browse code

fix another dead link.

Andrew Lewman authored on25/01/2012 04:32:36
Showing1 changed files
... ...
@@ -155,7 +155,7 @@
155 155
     avoid persecution while still raising a voice.
156 156
     </li>
157 157
     <li>When groups such as the <strong>Friends Service Committee and environmental
158
-    groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
158
+    groups are increasingly <a href="http://www.afsc.org/story/iowans-rally-defense-civil-liberties">falling under surveillance</a>
159 159
     in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of
160 160
     change rely on Tor for basic privacy during legitimate activities.
161 161
     </li>
Browse code

fix the links to amnesty's old irrepressible campaign.

Andrew Lewman authored on25/01/2012 04:26:43
Showing1 changed files
... ...
@@ -170,8 +170,8 @@
170 170
     the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
171 171
     </li>
172 172
     <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
173
-    recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
174
-    See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
173
+    past <a href="http://web.archive.org/web/20090323052228/http://irrepressible.info/">corporate responsibility campaign</a></strong>.
174
+    See also their 2006 <a href="http://web.archive.org/web/20090530164605/http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
175 175
     report</a> on China Internet issues.
176 176
     </li>
177 177
     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
Browse code

fix typo reported on tor-assistants

Roger Dingledine authored on01/12/2011 05:51:48
Showing1 changed files
... ...
@@ -297,7 +297,7 @@
297 297
     <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
298 298
     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
299 299
     <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
300
-    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
300
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
301 301
     </ul>
302 302
     
303 303
     <p>
Browse code

remove the VISTA text from the tor users page, as that app was pending, and never granted.

Andrew Lewman authored on21/10/2011 19:41:02
Showing1 changed files
... ...
@@ -227,17 +227,15 @@
227 227
     write were to get back to your boss, would you lose your job?  If your
228 228
     social worker read about your opinion of the system, would she treat
229 229
     you differently?  Anonymity gives a voice to the voiceless.
230
-    To support this, <strong>Tor currently has an open Americorps/VISTA position</strong> pending.  This
231
-    government grant will cover a full time stipend for a volunteer to create
232
-    curricula to <strong>show low-income populations how to use anonymity online for
233
-    safer civic engagement</strong>.  Although it's often said that the poor do not use
234
-    online access for civic engagement, failing to act in their self-interests,
235
-    it is our hypothesis (based on personal conversations and anecdotal
236
-    information) that it is precisely the &ldquo;permanent record &rdquo;
237
-    left online that keeps many of the poor from speaking out on the Internet.
238
-    We hope to show people how to engage more safely online, and then at
239
-    the end of the year, evaluate how online and offline civic engagement has
240
-    changed, and how the population sees this continuing into the future.
230
+    Although it's often said that the poor do not use online access
231
+    for civic engagement, failing to act in their self-interests, it
232
+    is our hypothesis (based on personal conversations and anecdotal
233
+    information) that it is precisely the &ldquo;permanent record
234
+    &rdquo; left online that keeps many of the poor from speaking out
235
+    on the Internet.  We hope to show people how to engage more safely
236
+    online, and then at the end of the year, evaluate how online and
237
+    offline civic engagement has changed, and how the population sees
238
+    this continuing into the future.
241 239
     </li>
242 240
     </ul>
243 241
     
Browse code

add request for more tor stories on the user page.

Andrew Lewman authored on30/08/2011 06:17:53
Showing1 changed files
... ...
@@ -24,6 +24,11 @@
24 24
     enforcement officers, activists, and many others. Here are some of
25 25
     the specific uses we've seen or recommend.
26 26
     </p>
27
+
28
+    <p>We need your <a
29
+    href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
30
+    Tor stories</a>! What do you use Tor for? Why do you need it? What
31
+    has Tor done for you? We need your stories.</p>
27 32
     
28 33
     <a name="normalusers"></a>
29 34
     <img src="$(IMGROOT)/family.jpg" alt="Normal People">
Browse code

looks like we never set the keywords either

Roger Dingledine authored on27/10/2010 12:31:57
Showing1 changed files
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Revision: $Revision: 22261 $
2
+# Revision: $Revision$
3 3
 # Translation-Priority: 2-medium
4 4
 
5 5
 #include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8"
Browse code

selectively apply a patch from rransom to torusers

Andrew Lewman authored on11/10/2010 02:11:28
Showing1 changed files
... ...
@@ -18,7 +18,7 @@
18 18
     Tor was originally designed, implemented, and deployed as a
19 19
     third-generation <a href="http://www.onion-router.net/">onion routing
20 20
     project of the Naval Research Laboratory</a>.  It was originally
21
-    developed with the U.S. Navy in mind, primarily for the purpose of
21
+    developed with the U.S. Navy in mind, for the primary purpose of
22 22
     protecting government communications.  Today, it is used every day
23 23
     for a wide variety of purposes by the military, journalists, law
24 24
     enforcement officers, activists, and many others. Here are some of
... ...
@@ -31,15 +31,15 @@
31 31
     <hr>
32 32
     <ul>
33 33
     <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
34
-    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">sell
35
-    your Internet browsing records</a> to marketers and anyone else
34
+    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
35
+    sell your Internet browsing records</a> to marketers or anyone else
36 36
     willing to pay for it. ISPs typically say that
37 37
     they anonymize the data by not providing personally identifiable information, but
38 38
     <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
39 39
     has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially
40 40
     userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
41 41
     </li>
42
-    <li><strong>They protect their communications from irresponsible corporations.</strong>
42
+    <li><strong> They protect their communications from irresponsible corporations.</strong>
43 43
     All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
44 44
     private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
45 45
     <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&amp;en=f6f61949c6da4d38&amp;ei=5090">giving away the data to researchers</a>,
... ...
@@ -47,7 +47,7 @@
47 47
     </li>
48 48
     <li><strong>They protect their children online.</strong>
49 49
     You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
50
-    by not concealing their IP address. Increasingly, IP addresses can literally be <a href="http://whatismyipaddress.com/">mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
50
+    by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
51 51
     In the United States, the government is pushing to make this mapping increasingly precise.
52 52
     </li>
53 53
     <li><strong>They research sensitive topics.</strong>
... ...
@@ -74,20 +74,20 @@
74 74
     </li>
75 75
     
76 76
     <li><strong>Hidden services:</strong>
77
-    When the Internet was designed by DARPA, its primary purpose was to facilitate distributed, robust communications in case of
78
-    local strikes.  However, some functions must be centralized, such as command and control sites.  By their nature, Internet protocols
79
-    reveal the geographic location of any server that is reachable online.  Tor's <a href="<page docs/hidden-services>">hidden service capability</a> allows military command and
77
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
78
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
79
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
80 80
     control to be physically secure from discovery and takedown.
81 81
     </li>
82 82
     <li><strong>Intelligence gathering:</strong>
83 83
     Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
84
-    to record a military address, thereby revealing that the site is under surveillance.
84
+    to record a military address, thereby revealing the surveillance.
85 85
     </li>
86 86
     </ul>
87 87
     
88 88
     <a name="journalist"></a>
89 89
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
90
-    <h2><a class="anchor" href="#journalist">Journalists and their audiences use Tor</a></h2>
90
+    <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
91 91
     <hr>
92 92
     <ul>
93 93
     <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
... ...
@@ -96,8 +96,8 @@
96 96
     </li>
97 97
     <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
98 98
     (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
99
-    safe access to free media.  Tor preserves the ability of persons behind national firewalls, or under
100
-    the surveillance of repressive regimes, to obtain a global perspective on controversial topics including democracy,
99
+    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
100
+    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
101 101
     economics and religion.
102 102
     </li>
103 103
     <li><strong>Citizen journalists in China</strong> use Tor to write about
... ...
@@ -124,14 +124,14 @@
124 124
     </li>
125 125
     <li><strong>Sting operations:</strong>
126 126
     Similarly, anonymity allows law officers to engage in online
127
-    &ldquo;undercover&rdquo; operations.  Regardless of how good an
128
-    undercover officer's &ldquo;street cred&rdquo; may be, if his
129
-    communications come from IP addresses allocated to the police, his cover is blown.
127
+    &ldquo;undercover &rdquo; operations.  Regardless of how good an
128
+    undercover officer's &ldquo;street cred&rdquo; may be, if the
129
+    communications include IP ranges from police addresses, the cover is blown.
130 130
     </li>
131 131
     <li><strong>Truly anonymous tip lines:</strong>
132 132
     While online anonymous tip lines are popular, without anonymity
133 133
     software, they are far less useful.  Sophisticated sources understand that
134
-    although a name or e-mail address is not attached to information, server
134
+    although a name or email address is not attached to information, server
135 135
     logs can identify them very quickly.  As a result, tip line web sites that
136 136
     do not encourage anonymity are limiting the sources of their tips.
137 137
     </li>
... ...
@@ -145,7 +145,7 @@
145 145
     <li><strong>Human rights activists use Tor to anonymously report abuses from
146 146
     danger zones.</strong>  Internationally, labor rights workers use Tor and other
147 147
     forms of online and offline anonymity to organize workers in accordance
148
-    with the Universal Declaration of Human Rights. Even though their actions are within
148
+    with the Universal Declaration of Human Rights. Even though they are within
149 149
     the law, it does not mean they are safe. Tor provides the ability to
150 150
     avoid persecution while still raising a voice.
151 151
     </li>
... ...
@@ -155,16 +155,16 @@
155 155
     change rely on Tor for basic privacy during legitimate activities.
156 156
     </li>
157 157
     <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
158
-    recommends Tor in their report,
159
-    &ldquo;<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
158
+    recommends Tor in their report, &ldquo;
159
+    <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
160 160
     Complicity in Chinese Internet Censorship</a>.&rdquo; The study
161 161
     co-author interviewed Roger Dingledine, Tor project leader,
162
-    regarding Tor use.  They cover Tor in the section on how to breach the <a
162
+    on Tor use.  They cover Tor in the section on how to breach the <a
163 163
     href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
164
-    Firewall of China&rdquo;</a>, and recommend that human rights workers throughout
165
-    the globe use Tor for &ldquo;secure browsing and communications&rdquo;.
164
+    Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
165
+    the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
166 166
     </li>
167
-    <li>Tor has consulted with and volunteered help to <strong>Amnesty International's
167
+    <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
168 168
     recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
169 169
     See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
170 170
     report</a> on China Internet issues.
... ...
@@ -172,7 +172,7 @@
172 172
     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
173 173
     recommends Tor, especially for <strong>anonymous blogging</strong>,
174 174
     throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
175
-    web site</a>.
175
+    web site.</a>
176 176
     </li>
177 177
     <li>In the US, the Supreme Court recently stripped legal protections from
178 178
     government whistleblowers.  But whistleblowers working for governmental
... ...
@@ -181,8 +181,8 @@
181 181
     </li>
182 182
     <li>A contact of ours who works with a public health nonprofit in
183 183
     Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
184
-    mostly bribes and such.  When that percentage rises steeply, not only are they unable to afford the money, but they
185
-    cannot afford to complain &mdash; this is the point at which open objection can
184
+    mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
185
+    not afford to complain &mdash; this is the point at which open objection can
186 186
     become dangerous.  So his nonprofit has been working to
187 187
     <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
188 188
     </li>
... ...
@@ -191,17 +191,17 @@
191 191
     local residents to <strong>urge reform in the company</strong> that dominated the town's
192 192
     economic and government affairs. She is fully cognizant that the kind of
193 193
     organizing she was doing <strong>could lead to harm or &ldquo;fatal
194
-    accidents&rdquo;</strong>.
194
+    accidents.&rdquo;</strong>
195 195
     </li>
196 196
     <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
197
-    regarding sweatshops</strong> that produce goods for western countries, and to
197
+    regarding sweatshops</strong> that produce goods for western countries and to
198 198
     organize local labor.
199 199
     </li>
200 200
     <li>
201 201
     Tor can help activists avoid government or corporate censorship that hinders organization.
202
-    In one such case,
203
-    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">a Canadian ISP blocked access to a union website</a>
204
-    used by its own employees to help organize a strike.
202
+    In one such case, a
203
+    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
204
+    to help organize a strike.
205 205
     </li>
206 206
     </ul>
207 207
     
... ...
@@ -228,7 +228,7 @@
228 228
     safer civic engagement</strong>.  Although it's often said that the poor do not use
229 229
     online access for civic engagement, failing to act in their self-interests,
230 230
     it is our hypothesis (based on personal conversations and anecdotal
231
-    information) that it is precisely the &ldquo;permanent record&rdquo;
231
+    information) that it is precisely the &ldquo;permanent record &rdquo;
232 232
     left online that keeps many of the poor from speaking out on the Internet.
233 233
     We hope to show people how to engage more safely online, and then at
234 234
     the end of the year, evaluate how online and offline civic engagement has
... ...
@@ -246,23 +246,23 @@
246 246
     of information on Internet attacks.  Such a repository requires members
247 247
     to report breaches to a central group, who correlates attacks to detect
248 248
     coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
249
-    traffic to such a repository to where the report is
250
-    sent from.  Even if every packet were encrypted, the IP
249
+    traffic to such a repository to be able to track where information is
250
+    coming from.  Even though every packet were encrypted, the IP
251 251
     address would betray the location of a compromised system.  Tor allows
252
-    such repositories of sensitive information to resist eavesdropping.
252
+    such repositories of sensitive information to resist compromises.
253 253
     </li>
254 254
     <li><strong>Seeing your competition as your market does:</strong>
255
-    If you try to check out your competitor's pricing, you may find no
255
+    If you try to check out a competitor's pricing, you may find no
256 256
     information or misleading information on their web site.  This is because
257 257
     their web server may be keyed to detect connections from competitors,
258
-    and block your staff or spread disinformation to them.  Tor allows a business
259
-    to view its sector as the general public would view it.
258
+    and block or spread disinformation to your staff.  Tor allows a business
259
+    to view their sector as the general public would view it.
260 260
     </li>
261 261
     <li><strong>Keeping strategies confidential:</strong>
262 262
     An investment bank, for example, might not want industry snoopers to be
263 263
     able to track what web sites their analysts are watching.  The strategic
264
-    importance of traffic patterns, and the vulnerability of such data
265
-    to surveillance, is starting to be more widely recognized in several areas
264
+    importance of traffic patterns, and the vulnerability of the surveillance
265
+    of such data, is starting to be more widely recognized in several areas
266 266
     of the business world.
267 267
     </li>
268 268
     <li><strong>Accountability:</strong>
... ...
@@ -290,11 +290,11 @@
290 290
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
291 291
     <hr>
292 292
     <ul>
293
-    <li>To verify IP-address-based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges to access a site. Tor can be used to verify those configurations by using an IP number outside the company's alloted IP block.</li>
294
-    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. When a log review reveals a possible violation, Tor can be used to verify the information without putting an exception into corporate security systems.</li>
293
+    <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
294
+    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
295 295
     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
296
-    <li>To access Internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the Internet while leaving standard security policies in place.</li>
297
-    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make Internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations.</li>
296
+    <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
297
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
298 298
     </ul>
299 299
     
300 300
     <p>
... ...
@@ -310,15 +310,15 @@
310 310
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
311 311
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
312 312
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
313
-    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor Project is based on the belief that anonymity is not
314
-    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The EFF maintains <a href="http://www.eff.org/issues/anonymity">a good overview of how anonymity was crucial to the founding of the United States</a>.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
313
+    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
314
+    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
315 315
     <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
316 316
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
317 317
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
318 318
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
319 319
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
320 320
     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
321
-    purposes (e.g., the majority of Tor relays do not support SMTP, in order to prevent anonymous e-mail spamming), or if you're one of the
321
+    purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
322 322
     <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
323 323
     you have better options than Tor. While not dismissing the potential abuses of Tor,
324 324
     this page shows a few of the many important ways anonymity is used online today.</p>
Browse code

Small language fixups from rransom.

arma will probably want to double-check these :-)

Sebastian Hahn authored on10/10/2010 12:56:05
Showing1 changed files
... ...
@@ -18,7 +18,7 @@
18 18
     Tor was originally designed, implemented, and deployed as a
19 19
     third-generation <a href="http://www.onion-router.net/">onion routing
20 20
     project of the Naval Research Laboratory</a>.  It was originally
21
-    developed with the U.S. Navy in mind, for the primary purpose of
21
+    developed with the U.S. Navy in mind, primarily for the purpose of
22 22
     protecting government communications.  Today, it is used every day
23 23
     for a wide variety of purposes by the military, journalists, law
24 24
     enforcement officers, activists, and many others. Here are some of
... ...
@@ -31,15 +31,15 @@
31 31
     <hr>
32 32
     <ul>
33 33
     <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
34
-    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
35
-    sell your Internet browsing records</a> to marketers or anyone else
34
+    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">sell
35
+    your Internet browsing records</a> to marketers and anyone else
36 36
     willing to pay for it. ISPs typically say that
37 37
     they anonymize the data by not providing personally identifiable information, but
38 38
     <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
39 39
     has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially
40 40
     userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
41 41
     </li>
42
-    <li><strong> They protect their communications from irresponsible corporations.</strong>
42
+    <li><strong>They protect their communications from irresponsible corporations.</strong>
43 43
     All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
44 44
     private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
45 45
     <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&amp;en=f6f61949c6da4d38&amp;ei=5090">giving away the data to researchers</a>,
... ...
@@ -47,7 +47,7 @@
47 47
     </li>
48 48
     <li><strong>They protect their children online.</strong>
49 49
     You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
50
-    by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
50
+    by not concealing their IP address. Increasingly, IP addresses can literally be <a href="http://whatismyipaddress.com/">mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
51 51
     In the United States, the government is pushing to make this mapping increasingly precise.
52 52
     </li>
53 53
     <li><strong>They research sensitive topics.</strong>
... ...
@@ -64,7 +64,7 @@
64 64
     <ul>
65 65
     
66 66
     <li>
67
-    <strong>Field Agents:</strong>
67
+    <strong>Field agents:</strong>
68 68
     It is not difficult for insurgents to monitor Internet traffic and
69 69
     discover all the hotels and other locations from which people are
70 70
     connecting to known military servers.
... ...
@@ -74,20 +74,20 @@
74 74
     </li>
75 75
     
76 76
     <li><strong>Hidden services:</strong>
77
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
78
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
79
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
77
+    When the Internet was designed by DARPA, its primary purpose was to facilitate distributed, robust communications in case of
78
+    local strikes.  However, some functions must be centralized, such as command and control sites.  By their nature, Internet protocols
79
+    reveal the geographic location of any server that is reachable online.  Tor's <a href="<page docs/hidden-services>">hidden service capability</a> allows military command and
80 80
     control to be physically secure from discovery and takedown.
81 81
     </li>
82 82
     <li><strong>Intelligence gathering:</strong>
83 83
     Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
84
-    to record a military address, thereby revealing the surveillance.
84
+    to record a military address, thereby revealing that the site is under surveillance.
85 85
     </li>
86 86
     </ul>
87 87
     
88 88
     <a name="journalist"></a>
89 89
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
90
-    <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
90
+    <h2><a class="anchor" href="#journalist">Journalists and their audiences use Tor</a></h2>
91 91
     <hr>
92 92
     <ul>
93 93
     <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
... ...
@@ -96,8 +96,8 @@
96 96
     </li>
97 97
     <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
98 98
     (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
99
-    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
100
-    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
99
+    safe access to free media.  Tor preserves the ability of persons behind national firewalls, or under
100
+    the surveillance of repressive regimes, to obtain a global perspective on controversial topics including democracy,
101 101
     economics and religion.
102 102
     </li>
103 103
     <li><strong>Citizen journalists in China</strong> use Tor to write about
... ...
@@ -124,14 +124,14 @@
124 124
     </li>
125 125
     <li><strong>Sting operations:</strong>
126 126
     Similarly, anonymity allows law officers to engage in online
127
-    &ldquo;undercover &rdquo; operations.  Regardless of how good an
128
-    undercover officer's &ldquo;street cred&rdquo; may be, if the
129
-    communications include IP ranges from police addresses, the cover is blown.
127
+    &ldquo;undercover&rdquo; operations.  Regardless of how good an
128
+    undercover officer's &ldquo;street cred&rdquo; may be, if his
129
+    communications come from IP addresses allocated to the police, his cover is blown.
130 130
     </li>
131 131
     <li><strong>Truly anonymous tip lines:</strong>
132 132
     While online anonymous tip lines are popular, without anonymity
133 133
     software, they are far less useful.  Sophisticated sources understand that
134
-    although a name or email address is not attached to information, server
134
+    although a name or e-mail address is not attached to information, server
135 135
     logs can identify them very quickly.  As a result, tip line web sites that
136 136
     do not encourage anonymity are limiting the sources of their tips.
137 137
     </li>
... ...
@@ -145,7 +145,7 @@
145 145
     <li><strong>Human rights activists use Tor to anonymously report abuses from
146 146
     danger zones.</strong>  Internationally, labor rights workers use Tor and other
147 147
     forms of online and offline anonymity to organize workers in accordance
148
-    with the Universal Declaration of Human Rights. Even though they are within
148
+    with the Universal Declaration of Human Rights. Even though their actions are within
149 149
     the law, it does not mean they are safe. Tor provides the ability to
150 150
     avoid persecution while still raising a voice.
151 151
     </li>
... ...
@@ -155,16 +155,16 @@
155 155
     change rely on Tor for basic privacy during legitimate activities.
156 156
     </li>
157 157
     <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
158
-    recommends Tor in their report, &ldquo;
159
-    <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
158
+    recommends Tor in their report,
159
+    &ldquo;<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
160 160
     Complicity in Chinese Internet Censorship</a>.&rdquo; The study
161 161
     co-author interviewed Roger Dingledine, Tor project leader,
162
-    on Tor use.  They cover Tor in the section on how to breach the <a
162
+    regarding Tor use.  They cover Tor in the section on how to breach the <a
163 163
     href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
164
-    Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
165
-    the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
164
+    Firewall of China&rdquo;</a>, and recommend that human rights workers throughout
165
+    the globe use Tor for &ldquo;secure browsing and communications&rdquo;.
166 166
     </li>
167
-    <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
167
+    <li>Tor has consulted with and volunteered help to <strong>Amnesty International's
168 168
     recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
169 169
     See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
170 170
     report</a> on China Internet issues.
... ...
@@ -172,7 +172,7 @@
172 172
     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
173 173
     recommends Tor, especially for <strong>anonymous blogging</strong>,
174 174
     throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
175
-    web site.</a>
175
+    web site</a>.
176 176
     </li>
177 177
     <li>In the US, the Supreme Court recently stripped legal protections from
178 178
     government whistleblowers.  But whistleblowers working for governmental
... ...
@@ -181,8 +181,8 @@
181 181
     </li>
182 182
     <li>A contact of ours who works with a public health nonprofit in
183 183
     Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
184
-    mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
185
-    not afford to complain &mdash; this is the point at which open objection can
184
+    mostly bribes and such.  When that percentage rises steeply, not only are they unable to afford the money, but they
185
+    cannot afford to complain &mdash; this is the point at which open objection can
186 186
     become dangerous.  So his nonprofit has been working to
187 187
     <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
188 188
     </li>
... ...
@@ -191,17 +191,17 @@
191 191
     local residents to <strong>urge reform in the company</strong> that dominated the town's
192 192
     economic and government affairs. She is fully cognizant that the kind of
193 193
     organizing she was doing <strong>could lead to harm or &ldquo;fatal
194
-    accidents.&rdquo;</strong>
194
+    accidents&rdquo;</strong>.
195 195
     </li>
196 196
     <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
197
-    regarding sweatshops</strong> that produce goods for western countries and to
197
+    regarding sweatshops</strong> that produce goods for western countries, and to
198 198
     organize local labor.
199 199
     </li>
200 200
     <li>
201 201
     Tor can help activists avoid government or corporate censorship that hinders organization.
202
-    In one such case, a
203
-    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
204
-    to help organize a strike.
202
+    In one such case,
203
+    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">a Canadian ISP blocked access to a union website</a>
204
+    used by its own employees to help organize a strike.
205 205
     </li>
206 206
     </ul>
207 207
     
... ...
@@ -228,7 +228,7 @@
228 228
     safer civic engagement</strong>.  Although it's often said that the poor do not use
229 229
     online access for civic engagement, failing to act in their self-interests,
230 230
     it is our hypothesis (based on personal conversations and anecdotal
231
-    information) that it is precisely the &ldquo;permanent record &rdquo;
231
+    information) that it is precisely the &ldquo;permanent record&rdquo;
232 232
     left online that keeps many of the poor from speaking out on the Internet.
233 233
     We hope to show people how to engage more safely online, and then at
234 234
     the end of the year, evaluate how online and offline civic engagement has
... ...
@@ -246,23 +246,23 @@
246 246
     of information on Internet attacks.  Such a repository requires members
247 247
     to report breaches to a central group, who correlates attacks to detect
248 248
     coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
249
-    traffic to such a repository to be able to track where information is
250
-    coming from.  Even though every packet were encrypted, the IP
249
+    traffic to such a repository to where the report is
250
+    sent from.  Even if every packet were encrypted, the IP
251 251
     address would betray the location of a compromised system.  Tor allows
252
-    such repositories of sensitive information to resist compromises.
252
+    such repositories of sensitive information to resist eavesdropping.
253 253
     </li>
254 254
     <li><strong>Seeing your competition as your market does:</strong>
255
-    If you try to check out a competitor's pricing, you may find no
255
+    If you try to check out your competitor's pricing, you may find no
256 256
     information or misleading information on their web site.  This is because
257 257
     their web server may be keyed to detect connections from competitors,
258
-    and block or spread disinformation to your staff.  Tor allows a business
259
-    to view their sector as the general public would view it.
258
+    and block your staff or spread disinformation to them.  Tor allows a business
259
+    to view its sector as the general public would view it.
260 260
     </li>
261 261
     <li><strong>Keeping strategies confidential:</strong>
262 262
     An investment bank, for example, might not want industry snoopers to be
263 263
     able to track what web sites their analysts are watching.  The strategic
264
-    importance of traffic patterns, and the vulnerability of the surveillance
265
-    of such data, is starting to be more widely recognized in several areas
264
+    importance of traffic patterns, and the vulnerability of such data
265
+    to surveillance, is starting to be more widely recognized in several areas
266 266
     of the business world.
267 267
     </li>
268 268
     <li><strong>Accountability:</strong>
... ...
@@ -290,11 +290,11 @@
290 290
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
291 291
     <hr>
292 292
     <ul>
293
-    <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
294
-    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
293
+    <li>To verify IP-address-based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges to access a site. Tor can be used to verify those configurations by using an IP number outside the company's alloted IP block.</li>
294
+    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. When a log review reveals a possible violation, Tor can be used to verify the information without putting an exception into corporate security systems.</li>
295 295
     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
296
-    <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
297
-    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
296
+    <li>To access Internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the Internet while leaving standard security policies in place.</li>
297
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make Internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations.</li>
298 298
     </ul>
299 299
     
300 300
     <p>
... ...
@@ -310,15 +310,15 @@
310 310
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
311 311
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
312 312
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
313
-    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
314
-    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
313
+    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor Project is based on the belief that anonymity is not
314
+    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The EFF maintains <a href="http://www.eff.org/issues/anonymity">a good overview of how anonymity was crucial to the founding of the United States</a>.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
315 315
     <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
316 316
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
317 317
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
318 318
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
319 319
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
320 320
     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
321
-    purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
321
+    purposes (e.g., the majority of Tor relays do not support SMTP, in order to prevent anonymous e-mail spamming), or if you're one of the
322 322
     <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
323 323
     you have better options than Tor. While not dismissing the potential abuses of Tor,
324 324
     this page shows a few of the many important ways anonymity is used online today.</p>
Browse code

We decided to go with HTML in favor of XHTML.

Sebastian Hahn authored on10/10/2010 03:34:47
Showing1 changed files
... ...
@@ -13,7 +13,7 @@
13 13
   <div id="maincol">
14 14
 
15 15
     <h1>Inception</h1>
16
-    <hr />
16
+    <hr>
17 17
     <p>
18 18
     Tor was originally designed, implemented, and deployed as a
19 19
     third-generation <a href="http://www.onion-router.net/">onion routing
... ...
@@ -26,9 +26,9 @@
26 26
     </p>
27 27
     
28 28
     <a name="normalusers"></a>
29
-    <img src="$(IMGROOT)/family.jpg" alt="Normal People" />
29
+    <img src="$(IMGROOT)/family.jpg" alt="Normal People">
30 30
     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
31
-    <hr />
31
+    <hr>
32 32
     <ul>
33 33
     <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
34 34
     Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
... ...
@@ -58,9 +58,9 @@
58 58
     </ul>
59 59
     
60 60
     <a name="military"></a>
61
-    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement" />
61
+    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
62 62
     <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
63
-    <hr />
63
+    <hr>
64 64
     <ul>
65 65
     
66 66
     <li>
... ...
@@ -86,9 +86,9 @@
86 86
     </ul>
87 87
     
88 88
     <a name="journalist"></a>
89
-    <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media" />
89
+    <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
90 90
     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
91
-    <hr />
91
+    <hr>
92 92
     <ul>
93 93
     <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
94 94
     tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
... ...
@@ -113,7 +113,7 @@
113 113
     
114 114
     <a name="lawenforcement"></a>
115 115
     <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
116
-    <hr />
116
+    <hr>
117 117
     <ul>
118 118
     <li><strong>Online surveillance:</strong>
119 119
     Tor allows officials to surf questionable web sites and services
... ...
@@ -138,9 +138,9 @@
138 138
     </ul>
139 139
     
140 140
     <a name="activists"></a>
141
-    <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers" />
141
+    <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers">
142 142
     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
143
-    <hr />
143
+    <hr>
144 144
     <ul>
145 145
     <li><strong>Human rights activists use Tor to anonymously report abuses from
146 146
     danger zones.</strong>  Internationally, labor rights workers use Tor and other
... ...
@@ -207,7 +207,7 @@
207 207
     
208 208
     <a name="spotlight"></a>
209 209
     <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
210
-    <hr />
210
+    <hr>
211 211
     <ul>
212 212
     <li>Does being in the public spotlight shut you off from having a private
213 213
     life, forever, online?  A rural lawyer in a New England state keeps
... ...
@@ -237,9 +237,9 @@
237 237
     </ul>
238 238
     
239 239
     <a name="executives"></a>
240
-    <img src="$(IMGROOT)/consumers.jpg" alt="Businesses" />
240
+    <img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
241 241
     <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
242
-    <hr />
242
+    <hr>
243 243
     <ul>
244 244
     <li><strong>Security breach information clearinghouses:</strong>
245 245
     Say a financial institution participates in a security clearinghouse
... ...
@@ -276,7 +276,7 @@
276 276
     
277 277
     <a name="bloggers"></a>
278 278
     <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
279
-    <hr />
279
+    <hr>
280 280
     <ul>
281 281
     <li>Frequently we hear about bloggers who are
282 282
     <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
... ...
@@ -288,7 +288,7 @@
288 288
     
289 289
     <a name="itprofessionals"></a>
290 290
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
291
-    <hr />
291
+    <hr>
292 292
     <ul>
293 293
     <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
294 294
     <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
Browse code

change - to mdash

Roger Dingledine authored on10/10/2010 02:25:46
Showing1 changed files
... ...
@@ -311,11 +311,11 @@
311 311
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
312 312
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
313 313
     href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
314
-    just a good idea some of the time - it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
314
+    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
315 315
     <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
316 316
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
317 317
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
318
-    and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
318
+    and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
319 319
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
320 320
     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
321 321
     purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
Browse code

fix missing ; after &amp

Andrew Lewman authored on10/10/2010 00:33:19
Showing1 changed files
... ...
@@ -138,7 +138,7 @@
138 138
     </ul>
139 139
     
140 140
     <a name="activists"></a>
141
-    <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp Whistleblowers" />
141
+    <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers" />
142 142
     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
143 143
     <hr />
144 144
     <ul>
Browse code

update path to images with IMGROOT

Andrew Lewman authored on09/10/2010 22:27:08
Showing1 changed files
... ...
@@ -13,33 +13,20 @@
13 13
   <div id="maincol">
14 14
 
15 15
     <h1>Inception</h1>
16
-    
17
-    #<!-- BEGIN SIDEBAR -->
18
-    #<div class="sidebar-left">
19
-    #<h3>Who uses Tor?</h3>
20
-    #<ul>
21
-    #<li><a href="<page about/torusers>#normalusers">Normal people use Tor</a></li>
22
-    #<li><a href="<page about/torusers>#military">Militaries use Tor</a></li>
23
-    #<li><a href="<page about/torusers>#journalist">Journalists and their audience use Tor</a></li>
24
-    #<li><a href="<page about/torusers>#lawenforcement">Law enforcement officers use Tor</a></li>
25
-    #<li><a href="<page about/torusers>#activists">Activists &amp; Whistleblowers use Tor</a></li>
26
-    #<li><a href="<page about/torusers>#spotlight">High &amp; low profile people use Tor</a></li>
27
-    #<li><a href="<page about/torusers>#executives">Business executives use Tor</a></li>
28
-    #<li><a href="<page about/torusers>#bloggers">Bloggers use Tor</a></li>
29
-    #<li><a href="<page about/torusers>#itprofessionals">IT Professionals use Tor</a></li>
30
-    #</ul>
31
-    #</div>
32
-    #<!-- END SIDEBAR -->
33
-    
34 16
     <hr />
35 17
     <p>
36
-    Tor was originally designed, implemented, and deployed as a third-generation
37
-    <a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>.
38
-    It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications.
39
-    Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend.
18
+    Tor was originally designed, implemented, and deployed as a
19
+    third-generation <a href="http://www.onion-router.net/">onion routing
20
+    project of the Naval Research Laboratory</a>.  It was originally
21
+    developed with the U.S. Navy in mind, for the primary purpose of
22
+    protecting government communications.  Today, it is used every day
23
+    for a wide variety of purposes by the military, journalists, law
24
+    enforcement officers, activists, and many others. Here are some of
25
+    the specific uses we've seen or recommend.
40 26
     </p>
41 27
     
42 28
     <a name="normalusers"></a>
29
+    <img src="$(IMGROOT)/family.jpg" alt="Normal People" />
43 30
     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
44 31
     <hr />
45 32
     <ul>
... ...
@@ -71,6 +58,7 @@
71 58
     </ul>
72 59
     
73 60
     <a name="military"></a>
61
+    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement" />
74 62
     <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
75 63
     <hr />
76 64
     <ul>
... ...
@@ -98,6 +86,7 @@
98 86
     </ul>
99 87
     
100 88
     <a name="journalist"></a>
89
+    <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media" />
101 90
     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
102 91
     <hr />
103 92
     <ul>
... ...
@@ -149,6 +138,7 @@
149 138
     </ul>
150 139
     
151 140
     <a name="activists"></a>
141
+    <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp Whistleblowers" />
152 142
     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
153 143
     <hr />
154 144
     <ul>
... ...
@@ -247,6 +237,7 @@
247 237
     </ul>
248 238
     
249 239
     <a name="executives"></a>
240
+    <img src="$(IMGROOT)/consumers.jpg" alt="Businesses" />
250 241
     <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
251 242
     <hr />
252 243
     <ul>
Browse code

increase max img width, link to about/overview rather than about/about.

Andrew Lewman authored on27/09/2010 21:27:00
Showing1 changed files
... ...
@@ -7,7 +7,7 @@
7 7
 <div id="content" class="clearfix">
8 8
   <div id="breadcrumbs">
9 9
     <a href="<page index>">Home &raquo; </a>
10
-    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/overview>">About &raquo; </a>
11 11
     <a href="<page about/torusers>">Who Uses Tor</a>
12 12
   </div>
13 13
   <div id="maincol">
Browse code

change all of the breadcrumbs from page home to page index.

Andrew Lewman authored on12/08/2010 17:17:47
Showing1 changed files
... ...
@@ -6,7 +6,7 @@
6 6
 
7 7
 <div id="content" class="clearfix">
8 8
   <div id="breadcrumbs">
9
-    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page index>">Home &raquo; </a>
10 10
     <a href="<page about/about>">About &raquo; </a>
11 11
     <a href="<page about/torusers>">Who Uses Tor</a>
12 12
   </div>
Browse code

first cut of the new, shiny tor website as wml.

Andrew Lewman authored on09/07/2010 03:55:22
Showing1 changed files
1 1
new file mode 100644
... ...
@@ -0,0 +1,343 @@
1
+## translation metadata
2
+# Revision: $Revision: 22261 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8"
6
+
7
+<div id="content" class="clearfix">
8
+  <div id="breadcrumbs">
9
+    <a href="<page home>">Home &raquo; </a>
10
+    <a href="<page about/about>">About &raquo; </a>
11
+    <a href="<page about/torusers>">Who Uses Tor</a>
12
+  </div>
13
+  <div id="maincol">
14
+
15
+    <h1>Inception</h1>
16
+    
17
+    #<!-- BEGIN SIDEBAR -->
18
+    #<div class="sidebar-left">
19
+    #<h3>Who uses Tor?</h3>
20
+    #<ul>
21
+    #<li><a href="<page about/torusers>#normalusers">Normal people use Tor</a></li>
22
+    #<li><a href="<page about/torusers>#military">Militaries use Tor</a></li>
23
+    #<li><a href="<page about/torusers>#journalist">Journalists and their audience use Tor</a></li>
24
+    #<li><a href="<page about/torusers>#lawenforcement">Law enforcement officers use Tor</a></li>
25
+    #<li><a href="<page about/torusers>#activists">Activists &amp; Whistleblowers use Tor</a></li>
26
+    #<li><a href="<page about/torusers>#spotlight">High &amp; low profile people use Tor</a></li>
27
+    #<li><a href="<page about/torusers>#executives">Business executives use Tor</a></li>
28
+    #<li><a href="<page about/torusers>#bloggers">Bloggers use Tor</a></li>
29
+    #<li><a href="<page about/torusers>#itprofessionals">IT Professionals use Tor</a></li>
30
+    #</ul>
31
+    #</div>
32
+    #<!-- END SIDEBAR -->
33
+    
34
+    <hr />
35
+    <p>
36
+    Tor was originally designed, implemented, and deployed as a third-generation
37
+    <a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>.
38
+    It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications.
39
+    Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend.
40
+    </p>
41
+    
42
+    <a name="normalusers"></a>
43
+    <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
44
+    <hr />
45
+    <ul>
46
+    <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
47
+    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
48
+    sell your Internet browsing records</a> to marketers or anyone else
49
+    willing to pay for it. ISPs typically say that
50
+    they anonymize the data by not providing personally identifiable information, but
51
+    <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
52
+    has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially
53
+    userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
54
+    </li>
55
+    <li><strong> They protect their communications from irresponsible corporations.</strong>
56
+    All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
57
+    private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
58
+    <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&amp;en=f6f61949c6da4d38&amp;ei=5090">giving away the data to researchers</a>,
59
+    your data is often not well protected by those you are supposed to trust to keep it safe.
60
+    </li>
61
+    <li><strong>They protect their children online.</strong>
62
+    You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
63
+    by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
64
+    In the United States, the government is pushing to make this mapping increasingly precise.
65
+    </li>
66
+    <li><strong>They research sensitive topics.</strong>
67
+    There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
68
+    <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
69
+    or world religions is behind a national firewall.
70
+    </li>
71
+    </ul>
72
+    
73
+    <a name="military"></a>
74
+    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
75
+    <hr />
76
+    <ul>
77
+    
78
+    <li>
79
+    <strong>Field Agents:</strong>
80
+    It is not difficult for insurgents to monitor Internet traffic and
81
+    discover all the hotels and other locations from which people are
82
+    connecting to known military servers.
83
+    Military field agents deployed away from home use Tor to
84
+    mask the sites they are visiting, protecting military interests and
85
+    operations, as well as protecting themselves from physical harm.
86
+    </li>
87
+    
88
+    <li><strong>Hidden services:</strong>
89
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
90
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
91
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
92
+    control to be physically secure from discovery and takedown.
93
+    </li>
94
+    <li><strong>Intelligence gathering:</strong>
95
+    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
96
+    to record a military address, thereby revealing the surveillance.
97
+    </li>
98
+    </ul>
99
+    
100
+    <a name="journalist"></a>
101
+    <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
102
+    <hr />
103
+    <ul>
104
+    <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
105
+    tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
106
+    journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
107
+    </li>
108
+    <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
109
+    (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
110
+    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
111
+    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
112
+    economics and religion.
113
+    </li>
114
+    <li><strong>Citizen journalists in China</strong> use Tor to write about
115
+    local events to encourage social change and political reform.
116
+    </li>
117
+    <li><strong>Citizens and journalists in <a
118
+    href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
119
+    holes</a></strong> use Tor to research state propaganda and opposing
120
+    viewpoints, to file stories with non-State controlled media, and to
121
+    avoid risking the personal consequences of intellectual curiosity.
122
+    </li>
123
+    </ul>
124
+    
125
+    <a name="lawenforcement"></a>
126
+    <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
127
+    <hr />
128
+    <ul>
129
+    <li><strong>Online surveillance:</strong>
130
+    Tor allows officials to surf questionable web sites and services
131
+    without leaving tell-tale tracks.  If the system administrator of an
132
+    illegal gambling site, for example, were to see multiple connections from
133
+    government or law enforcement IP addresses in usage logs, investigations
134
+    may be hampered.
135
+    </li>
136
+    <li><strong>Sting operations:</strong>
137
+    Similarly, anonymity allows law officers to engage in online
138
+    &ldquo;undercover &rdquo; operations.  Regardless of how good an
139
+    undercover officer's &ldquo;street cred&rdquo; may be, if the
140
+    communications include IP ranges from police addresses, the cover is blown.
141
+    </li>
142
+    <li><strong>Truly anonymous tip lines:</strong>
143
+    While online anonymous tip lines are popular, without anonymity
144
+    software, they are far less useful.  Sophisticated sources understand that
145
+    although a name or email address is not attached to information, server
146
+    logs can identify them very quickly.  As a result, tip line web sites that
147
+    do not encourage anonymity are limiting the sources of their tips.
148
+    </li>
149
+    </ul>
150
+    
151
+    <a name="activists"></a>
152
+    <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
153
+    <hr />
154
+    <ul>
155
+    <li><strong>Human rights activists use Tor to anonymously report abuses from
156
+    danger zones.</strong>  Internationally, labor rights workers use Tor and other
157
+    forms of online and offline anonymity to organize workers in accordance
158
+    with the Universal Declaration of Human Rights. Even though they are within
159
+    the law, it does not mean they are safe. Tor provides the ability to
160
+    avoid persecution while still raising a voice.
161
+    </li>
162
+    <li>When groups such as the <strong>Friends Service Committee and environmental
163
+    groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
164
+    in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of
165
+    change rely on Tor for basic privacy during legitimate activities.
166
+    </li>
167
+    <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
168
+    recommends Tor in their report, &ldquo;
169
+    <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
170
+    Complicity in Chinese Internet Censorship</a>.&rdquo; The study
171
+    co-author interviewed Roger Dingledine, Tor project leader,
172
+    on Tor use.  They cover Tor in the section on how to breach the <a
173
+    href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
174
+    Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
175
+    the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
176
+    </li>
177
+    <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
178
+    recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
179
+    See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
180
+    report</a> on China Internet issues.
181
+    </li>
182
+    <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
183
+    recommends Tor, especially for <strong>anonymous blogging</strong>,
184
+    throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
185
+    web site.</a>
186
+    </li>
187
+    <li>In the US, the Supreme Court recently stripped legal protections from
188
+    government whistleblowers.  But whistleblowers working for governmental
189
+    transparency or corporate accountability can use Tor to seek justice
190
+    without personal repercussions.
191
+    </li>
192
+    <li>A contact of ours who works with a public health nonprofit in
193
+    Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
194
+    mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
195
+    not afford to complain &mdash; this is the point at which open objection can
196
+    become dangerous.  So his nonprofit has been working to
197
+    <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
198
+    </li>
199
+    <li>At a recent conference, a Tor staffer ran into a woman who came from
200
+    a &ldquo;company town&rdquo; in the eastern United States. She was attempting to blog anonymously to rally
201
+    local residents to <strong>urge reform in the company</strong> that dominated the town's
202
+    economic and government affairs. She is fully cognizant that the kind of
203
+    organizing she was doing <strong>could lead to harm or &ldquo;fatal
204
+    accidents.&rdquo;</strong>
205
+    </li>
206
+    <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
207
+    regarding sweatshops</strong> that produce goods for western countries and to
208
+    organize local labor.
209
+    </li>
210
+    <li>
211
+    Tor can help activists avoid government or corporate censorship that hinders organization.
212
+    In one such case, a
213
+    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
214
+    to help organize a strike.
215
+    </li>
216
+    </ul>
217
+    
218
+    <a name="spotlight"></a>
219
+    <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
220
+    <hr />
221
+    <ul>
222
+    <li>Does being in the public spotlight shut you off from having a private
223
+    life, forever, online?  A rural lawyer in a New England state keeps
224
+    an anonymous blog because, with the diverse clientele at his prestigious
225
+    law firm, <strong>his political beliefs are bound to offend someone</strong>.  Yet, he
226
+    doesn't want to remain silent on issues he cares about.  Tor helps him
227
+    feel secure that he can express his opinion without consequences to his
228
+    public role.
229
+    </li>
230
+    <li>People living in poverty often don't participate fully in civil society
231
+    -- not out of ignorance or apathy, but out of fear.  If something you
232
+    write were to get back to your boss, would you lose your job?  If your
233
+    social worker read about your opinion of the system, would she treat
234
+    you differently?  Anonymity gives a voice to the voiceless.
235
+    To support this, <strong>Tor currently has an open Americorps/VISTA position</strong> pending.  This
236
+    government grant will cover a full time stipend for a volunteer to create
237
+    curricula to <strong>show low-income populations how to use anonymity online for
238
+    safer civic engagement</strong>.  Although it's often said that the poor do not use
239
+    online access for civic engagement, failing to act in their self-interests,
240
+    it is our hypothesis (based on personal conversations and anecdotal
241
+    information) that it is precisely the &ldquo;permanent record &rdquo;
242
+    left online that keeps many of the poor from speaking out on the Internet.
243
+    We hope to show people how to engage more safely online, and then at
244
+    the end of the year, evaluate how online and offline civic engagement has
245
+    changed, and how the population sees this continuing into the future.
246
+    </li>
247
+    </ul>
248
+    
249
+    <a name="executives"></a>