Renamed files, made new files with old names for redirects, updated
links to use new URLs.
... | ... |
@@ -46,7 +46,7 @@ |
46 | 46 |
Individuals use Tor to keep websites from tracking them and their family |
47 | 47 |
members, or to connect to news sites, instant messaging services, or the |
48 | 48 |
like when these are blocked by their local Internet providers. Tor's <a |
49 |
- href="<page docs/hidden-services>">onion services</a> |
|
49 |
+ href="<page docs/onion-services>">onion services</a> |
|
50 | 50 |
let users publish web sites and other services without needing to reveal |
51 | 51 |
the location of the site. Individuals also use Tor for socially sensitive |
52 | 52 |
communication: chat rooms and web forums for rape and abuse survivors, |
... | ... |
@@ -46,7 +46,7 @@ |
46 | 46 |
Individuals use Tor to keep websites from tracking them and their family |
47 | 47 |
members, or to connect to news sites, instant messaging services, or the |
48 | 48 |
like when these are blocked by their local Internet providers. Tor's <a |
49 |
- href="<page docs/hidden-services>">hidden services</a> |
|
49 |
+ href="<page docs/hidden-services>">onion services</a> |
|
50 | 50 |
let users publish web sites and other services without needing to reveal |
51 | 51 |
the location of the site. Individuals also use Tor for socially sensitive |
52 | 52 |
communication: chat rooms and web forums for rape and abuse survivors, |
... | ... |
@@ -29,13 +29,17 @@ |
29 | 29 |
<h3><a class="anchor" href="#overview">Overview</a></h3> |
30 | 30 |
|
31 | 31 |
<p> |
32 |
- Tor is a network of virtual tunnels that allows people and groups to |
|
33 |
- improve their privacy and security on the Internet. It also enables |
|
34 |
- software developers to create new communication tools |
|
35 |
- with built-in privacy features. Tor provides the foundation for |
|
36 |
- a range of applications that allow organizations and individuals |
|
37 |
- to share information over public networks without compromising their |
|
38 |
- privacy. |
|
32 |
+ The Tor network is a group of <a href="<page |
|
33 |
+ getinvolved/volunteer>">volunteer</a>-operated servers that allows people |
|
34 |
+ to improve their privacy and security on the Internet. Tor's users employ |
|
35 |
+ this network by connecting through a series of virtual tunnels rather than |
|
36 |
+ making a direct connection, thus allowing both organizations and |
|
37 |
+ individuals to share information over public networks without compromising |
|
38 |
+ their privacy. Along the same line, Tor is an effective censorship |
|
39 |
+ circumvention tool, allowing its users to reach otherwise blocked |
|
40 |
+ destinations or content. Tor can also be used as a building block for |
|
41 |
+ software developers to create new communication tools with built-in privacy |
|
42 |
+ features. |
|
39 | 43 |
</p> |
40 | 44 |
|
41 | 45 |
<p> |
we already have that content on the hidden service page, and we link to
it from this page already
... | ... |
@@ -17,7 +17,6 @@ |
17 | 17 |
<li><a href="<page about/overview>#overview">Overview</a></li> |
18 | 18 |
<li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li> |
19 | 19 |
<li><a href="<page about/overview>#thesolution">The Solution</a></li> |
20 |
- <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li> |
|
21 | 20 |
<li><a href="<page about/overview>#stayinganonymous">Staying anonymous</a></li> |
22 | 21 |
<li><a href="<page about/overview>#thefutureoftor">The future of Tor</a></li> |
23 | 22 |
</ul> |
... | ... |
@@ -182,24 +181,6 @@ |
182 | 181 |
|
183 | 182 |
<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p> |
184 | 183 |
|
185 |
- |
|
186 |
- <a name="hiddenservices"></a> |
|
187 |
- <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3> |
|
188 |
- |
|
189 |
- <p> |
|
190 |
- Tor also makes it possible for users to hide their locations while |
|
191 |
- offering various kinds of services, such as web publishing or an instant |
|
192 |
- messaging server. Using Tor "rendezvous points," other Tor users can |
|
193 |
- connect to these hidden services, each without knowing the other's |
|
194 |
- network identity. This hidden service functionality could allow Tor |
|
195 |
- users to set up a website where people publish material without worrying |
|
196 |
- about censorship. Nobody would be able to determine who was offering |
|
197 |
- the site, and nobody who offered the site would know who was posting to it. |
|
198 |
- Learn more about <a href="<page docs/tor-hidden-service>">configuring |
|
199 |
- hidden services</a> and how the <a href="<page docs/hidden-services>">hidden |
|
200 |
- service protocol</a> works. |
|
201 |
- </p> |
|
202 |
- |
|
203 | 184 |
<a name="stayinganonymous"></a> |
204 | 185 |
<h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3> |
205 | 186 |
|
... | ... |
@@ -14,7 +14,6 @@ |
14 | 14 |
<div class="sidebar-left"> |
15 | 15 |
<h3>Topics</h3> |
16 | 16 |
<ul> |
17 |
- <li><a href="<page about/overview>#inception">Inception</a></li> |
|
18 | 17 |
<li><a href="<page about/overview>#overview">Overview</a></li> |
19 | 18 |
<li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li> |
20 | 19 |
<li><a href="<page about/overview>#thesolution">The Solution</a></li> |
... | ... |
@@ -27,19 +26,6 @@ |
27 | 26 |
|
28 | 27 |
<hr> |
29 | 28 |
|
30 |
- <a name="inception"></a> |
|
31 |
- <h3><a class="anchor" href="#inception">Inception</a></h3> |
|
32 |
- |
|
33 |
- <p> |
|
34 |
- Tor was originally designed, implemented, and deployed as a |
|
35 |
- third-generation <a href="http://www.onion-router.net/">onion routing |
|
36 |
- project of the U.S. Naval Research Laboratory</a>. It was originally |
|
37 |
- developed with the U.S. Navy in mind, for the primary purpose of |
|
38 |
- protecting government communications. Today, it is used every day |
|
39 |
- for a wide variety of purposes by normal people, the military, |
|
40 |
- journalists, law enforcement officers, activists, and many |
|
41 |
- others. </p> |
|
42 |
- |
|
43 | 29 |
<a name="overview"></a> |
44 | 30 |
<h3><a class="anchor" href="#overview">Overview</a></h3> |
45 | 31 |
|
... | ... |
@@ -221,8 +221,8 @@ |
221 | 221 |
Tor can't solve all anonymity problems. It focuses only on |
222 | 222 |
protecting the transport of data. You need to use protocol-specific |
223 | 223 |
support software if you don't want the sites you visit to see your |
224 |
- identifying information. For example, you can use the <a href="<page |
|
225 |
- projects/torbrowser>">Tor Browser Bundle</a> |
|
224 |
+ identifying information. For example, you can use <a href="<page |
|
225 |
+ projects/torbrowser>">Tor Browser</a> |
|
226 | 226 |
while browsing the web to withhold some information about your computer's |
227 | 227 |
configuration. |
228 | 228 |
</p> |
... | ... |
@@ -221,7 +221,8 @@ |
221 | 221 |
Tor can't solve all anonymity problems. It focuses only on |
222 | 222 |
protecting the transport of data. You need to use protocol-specific |
223 | 223 |
support software if you don't want the sites you visit to see your |
224 |
- identifying information. For example, you can use Tor Browser Bundle |
|
224 |
+ identifying information. For example, you can use the <a href="<page |
|
225 |
+ projects/torbrowser>">Tor Browser Bundle</a> |
|
225 | 226 |
while browsing the web to withhold some information about your computer's |
226 | 227 |
configuration. |
227 | 228 |
</p> |
... | ... |
@@ -221,7 +221,7 @@ |
221 | 221 |
Tor can't solve all anonymity problems. It focuses only on |
222 | 222 |
protecting the transport of data. You need to use protocol-specific |
223 | 223 |
support software if you don't want the sites you visit to see your |
224 |
- identifying information. For example, you can use Torbutton |
|
224 |
+ identifying information. For example, you can use Tor Browser Bundle |
|
225 | 225 |
while browsing the web to withhold some information about your computer's |
226 | 226 |
configuration. |
227 | 227 |
</p> |
... | ... |
@@ -24,7 +24,7 @@ |
24 | 24 |
</ul> |
25 | 25 |
</div> |
26 | 26 |
<!-- END SIDEBAR --> |
27 |
- |
|
27 |
+ |
|
28 | 28 |
<hr> |
29 | 29 |
|
30 | 30 |
<a name="inception"></a> |
... | ... |
@@ -39,7 +39,7 @@ |
39 | 39 |
for a wide variety of purposes by normal people, the military, |
40 | 40 |
journalists, law enforcement officers, activists, and many |
41 | 41 |
others. </p> |
42 |
- |
|
42 |
+ |
|
43 | 43 |
<a name="overview"></a> |
44 | 44 |
<h3><a class="anchor" href="#overview">Overview</a></h3> |
45 | 45 |
|
... | ... |
@@ -52,7 +52,7 @@ |
52 | 52 |
to share information over public networks without compromising their |
53 | 53 |
privacy. |
54 | 54 |
</p> |
55 |
- |
|
55 |
+ |
|
56 | 56 |
<p> |
57 | 57 |
Individuals use Tor to keep websites from tracking them and their family |
58 | 58 |
members, or to connect to news sites, instant messaging services, or the |
... | ... |
@@ -63,7 +63,7 @@ |
63 | 63 |
communication: chat rooms and web forums for rape and abuse survivors, |
64 | 64 |
or people with illnesses. |
65 | 65 |
</p> |
66 |
- |
|
66 |
+ |
|
67 | 67 |
<p> |
68 | 68 |
Journalists use Tor to communicate more safely with whistleblowers and |
69 | 69 |
dissidents. Non-governmental organizations (NGOs) use Tor to allow their |
... | ... |
@@ -71,7 +71,7 @@ |
71 | 71 |
country, without notifying everybody nearby that they're working with |
72 | 72 |
that organization. |
73 | 73 |
</p> |
74 |
- |
|
74 |
+ |
|
75 | 75 |
<p> |
76 | 76 |
Groups such as Indymedia recommend Tor for safeguarding their members' |
77 | 77 |
online privacy and security. Activist groups like the Electronic Frontier |
... | ... |
@@ -84,7 +84,7 @@ |
84 | 84 |
consulting job-hunting websites? Which research divisions are communicating |
85 | 85 |
with the company's patent lawyers? |
86 | 86 |
</p> |
87 |
- |
|
87 |
+ |
|
88 | 88 |
<p> |
89 | 89 |
A branch of the U.S. Navy uses Tor for open source intelligence |
90 | 90 |
gathering, and one of its teams used Tor while deployed in the Middle |
... | ... |
@@ -92,7 +92,7 @@ |
92 | 92 |
web sites without leaving government IP addresses in their web logs, |
93 | 93 |
and for security during sting operations. |
94 | 94 |
</p> |
95 |
- |
|
95 |
+ |
|
96 | 96 |
<p> |
97 | 97 |
The variety of people who use Tor is actually <a |
98 | 98 |
href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes |
... | ... |
@@ -101,10 +101,10 @@ |
101 | 101 |
so the more populous and diverse the user base for Tor is, the more your |
102 | 102 |
anonymity will be protected. |
103 | 103 |
</p> |
104 |
- |
|
104 |
+ |
|
105 | 105 |
<a name="whyweneedtor"></a> |
106 | 106 |
<h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3> |
107 |
- |
|
107 |
+ |
|
108 | 108 |
<p> |
109 | 109 |
Using Tor protects you against a common form of Internet surveillance |
110 | 110 |
known as "traffic analysis." Traffic analysis can be used to infer |
... | ... |
@@ -119,7 +119,7 @@ |
119 | 119 |
affiliation to anyone observing the network, even if the connection |
120 | 120 |
is encrypted. |
121 | 121 |
</p> |
122 |
- |
|
122 |
+ |
|
123 | 123 |
<p> |
124 | 124 |
How does traffic analysis work? Internet data packets have two parts: |
125 | 125 |
a data payload and a header used for routing. The data payload is |
... | ... |
@@ -129,7 +129,7 @@ |
129 | 129 |
possibly, what you're saying. That's because it focuses on the header, |
130 | 130 |
which discloses source, destination, size, timing, and so on. |
131 | 131 |
</p> |
132 |
- |
|
132 |
+ |
|
133 | 133 |
<p> |
134 | 134 |
A basic problem for the privacy minded is that the recipient of your |
135 | 135 |
communications can see that you sent it by looking at headers. So can |
... | ... |
@@ -138,7 +138,7 @@ |
138 | 138 |
analysis might involve sitting somewhere between sender and recipient on |
139 | 139 |
the network, looking at headers. |
140 | 140 |
</p> |
141 |
- |
|
141 |
+ |
|
142 | 142 |
<p> |
143 | 143 |
But there are also more powerful kinds of traffic analysis. Some |
144 | 144 |
attackers spy on multiple parts of the Internet and use sophisticated |
... | ... |
@@ -147,11 +147,11 @@ |
147 | 147 |
these attackers, since it only hides the content of Internet traffic, not |
148 | 148 |
the headers. |
149 | 149 |
</p> |
150 |
- |
|
150 |
+ |
|
151 | 151 |
<a name="thesolution"></a> |
152 | 152 |
<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> |
153 | 153 |
<img src="$(IMGROOT)/htw1.png" alt="How Tor works"> |
154 |
- |
|
154 |
+ |
|
155 | 155 |
<p> |
156 | 156 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
157 | 157 |
analysis by distributing your transactions over several places on the |
... | ... |
@@ -163,7 +163,7 @@ |
163 | 163 |
through several relays that cover your tracks so no observer at any |
164 | 164 |
single point can tell where the data came from or where it's going. |
165 | 165 |
</p> |
166 |
- |
|
166 |
+ |
|
167 | 167 |
<p> |
168 | 168 |
To create a private network pathway with Tor, the user's software or |
169 | 169 |
client incrementally builds a circuit of encrypted connections through |
... | ... |
@@ -174,9 +174,9 @@ |
174 | 174 |
separate set of encryption keys for each hop along the circuit to ensure |
175 | 175 |
that each hop can't trace these connections as they pass through. |
176 | 176 |
</p> |
177 |
- |
|
177 |
+ |
|
178 | 178 |
<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png"></p> |
179 |
- |
|
179 |
+ |
|
180 | 180 |
<p> |
181 | 181 |
Once a circuit has been established, many kinds of data can be exchanged |
182 | 182 |
and several different sorts of software applications can be deployed |
... | ... |
@@ -186,20 +186,20 @@ |
186 | 186 |
only works for TCP streams and can be used by any application with SOCKS |
187 | 187 |
support. |
188 | 188 |
</p> |
189 |
- |
|
189 |
+ |
|
190 | 190 |
<p> |
191 | 191 |
For efficiency, the Tor software uses the same circuit for connections |
192 | 192 |
that happen within the same ten minutes or so. Later requests are given a |
193 | 193 |
new circuit, to keep people from linking your earlier actions to the new |
194 | 194 |
ones. |
195 | 195 |
</p> |
196 |
- |
|
196 |
+ |
|
197 | 197 |
<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p> |
198 |
- |
|
199 |
- |
|
198 |
+ |
|
199 |
+ |
|
200 | 200 |
<a name="hiddenservices"></a> |
201 | 201 |
<h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3> |
202 |
- |
|
202 |
+ |
|
203 | 203 |
<p> |
204 | 204 |
Tor also makes it possible for users to hide their locations while |
205 | 205 |
offering various kinds of services, such as web publishing or an instant |
... | ... |
@@ -213,10 +213,10 @@ |
213 | 213 |
hidden services</a> and how the <a href="<page docs/hidden-services>">hidden |
214 | 214 |
service protocol</a> works. |
215 | 215 |
</p> |
216 |
- |
|
216 |
+ |
|
217 | 217 |
<a name="stayinganonymous"></a> |
218 | 218 |
<h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3> |
219 |
- |
|
219 |
+ |
|
220 | 220 |
<p> |
221 | 221 |
Tor can't solve all anonymity problems. It focuses only on |
222 | 222 |
protecting the transport of data. You need to use protocol-specific |
... | ... |
@@ -225,7 +225,7 @@ |
225 | 225 |
while browsing the web to withhold some information about your computer's |
226 | 226 |
configuration. |
227 | 227 |
</p> |
228 |
- |
|
228 |
+ |
|
229 | 229 |
<p> |
230 | 230 |
Also, to protect your anonymity, be smart. Don't provide your name |
231 | 231 |
or other revealing information in web forms. Be aware that, like all |
... | ... |
@@ -235,10 +235,10 @@ |
235 | 235 |
arriving at your chosen destination, he can use statistical analysis to |
236 | 236 |
discover that they are part of the same circuit. |
237 | 237 |
</p> |
238 |
- |
|
238 |
+ |
|
239 | 239 |
<a name="thefutureoftor"></a> |
240 | 240 |
<h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3> |
241 |
- |
|
241 |
+ |
|
242 | 242 |
<p> |
243 | 243 |
Providing a usable anonymizing network on the Internet today is an |
244 | 244 |
ongoing challenge. We want software that meets users' needs. We also |
... | ... |
@@ -252,7 +252,7 @@ |
252 | 252 |
or <a href="<page getinvolved/volunteer>">volunteering</a> as a |
253 | 253 |
<a href="<page docs/documentation>#Developers">developer</a>. |
254 | 254 |
</p> |
255 |
- |
|
255 |
+ |
|
256 | 256 |
<p> |
257 | 257 |
Ongoing trends in law, policy, and technology threaten anonymity as never |
258 | 258 |
before, undermining our ability to speak and read freely online. These |
... | ... |
@@ -262,7 +262,7 @@ |
262 | 262 |
provides additional diversity, enhancing Tor's ability to put control |
263 | 263 |
over your security and privacy back into your hands. |
264 | 264 |
</p> |
265 |
- |
|
265 |
+ |
|
266 | 266 |
</div> |
267 | 267 |
<!-- END MAINCOL --> |
268 | 268 |
<div id = "sidecol"> |
... | ... |
@@ -272,4 +272,4 @@ |
272 | 272 |
<!-- END SIDECOL --> |
273 | 273 |
</div> |
274 | 274 |
<!-- END CONTENT --> |
275 |
-#include <foot.wmi> |
|
275 |
+#include <foot.wmi> |
... | ... |
@@ -221,9 +221,9 @@ |
221 | 221 |
Tor can't solve all anonymity problems. It focuses only on |
222 | 222 |
protecting the transport of data. You need to use protocol-specific |
223 | 223 |
support software if you don't want the sites you visit to see your |
224 |
- identifying information. For example, you can use web proxies such as |
|
225 |
- Privoxy while web browsing to block cookies and withhold information |
|
226 |
- about your browser type. |
|
224 |
+ identifying information. For example, you can use Torbutton |
|
225 |
+ while browsing the web to withhold some information about your computer's |
|
226 |
+ configuration. |
|
227 | 227 |
</p> |
228 | 228 |
|
229 | 229 |
<p> |
... | ... |
@@ -41,7 +41,7 @@ |
41 | 41 |
others. </p> |
42 | 42 |
|
43 | 43 |
<a name="overview"></a> |
44 |
- <h3><a class="anchor" href="#overview">Tor: Overview</a></h3> |
|
44 |
+ <h3><a class="anchor" href="#overview">Overview</a></h3> |
|
45 | 45 |
|
46 | 46 |
<p> |
47 | 47 |
Tor is a network of virtual tunnels that allows people and groups to |
... | ... |
@@ -9,14 +9,13 @@ |
9 | 9 |
<a href="<page about/overview>">About » </a> |
10 | 10 |
</div> |
11 | 11 |
<div id="maincol"> |
12 |
- <a name="overview"></a> |
|
13 |
- <h2><a class="anchor" href="#overview">Tor: Overview</a></h2> |
|
12 |
+ <h2>Tor: Overview</h2> |
|
14 | 13 |
<!-- BEGIN SIDEBAR --> |
15 | 14 |
<div class="sidebar-left"> |
16 | 15 |
<h3>Topics</h3> |
17 | 16 |
<ul> |
18 |
- <li><a href="<page about/overview>#overview">Overview</a></li> |
|
19 | 17 |
<li><a href="<page about/overview>#inception">Inception</a></li> |
18 |
+ <li><a href="<page about/overview>#overview">Overview</a></li> |
|
20 | 19 |
<li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li> |
21 | 20 |
<li><a href="<page about/overview>#thesolution">The Solution</a></li> |
22 | 21 |
<li><a href="<page about/overview>#hiddenservices">Hidden services</a></li> |
... | ... |
@@ -41,6 +40,9 @@ |
41 | 40 |
journalists, law enforcement officers, activists, and many |
42 | 41 |
others. </p> |
43 | 42 |
|
43 |
+ <a name="overview"></a> |
|
44 |
+ <h3><a class="anchor" href="#overview">Tor: Overview</a></h3> |
|
45 |
+ |
|
44 | 46 |
<p> |
45 | 47 |
Tor is a network of virtual tunnels that allows people and groups to |
46 | 48 |
improve their privacy and security on the Internet. It also enables |
... | ... |
@@ -16,6 +16,7 @@ |
16 | 16 |
<h3>Topics</h3> |
17 | 17 |
<ul> |
18 | 18 |
<li><a href="<page about/overview>#overview">Overview</a></li> |
19 |
+ <li><a href="<page about/overview>#inception">Inception</a></li> |
|
19 | 20 |
<li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li> |
20 | 21 |
<li><a href="<page about/overview>#thesolution">The Solution</a></li> |
21 | 22 |
<li><a href="<page about/overview>#hiddenservices">Hidden services</a></li> |
... | ... |
@@ -26,6 +27,19 @@ |
26 | 27 |
<!-- END SIDEBAR --> |
27 | 28 |
|
28 | 29 |
<hr> |
30 |
+ |
|
31 |
+ <a name="inception"></a> |
|
32 |
+ <h3><a class="anchor" href="#inception">Inception</a></h3> |
|
33 |
+ |
|
34 |
+ <p> |
|
35 |
+ Tor was originally designed, implemented, and deployed as a |
|
36 |
+ third-generation <a href="http://www.onion-router.net/">onion routing |
|
37 |
+ project of the U.S. Naval Research Laboratory</a>. It was originally |
|
38 |
+ developed with the U.S. Navy in mind, for the primary purpose of |
|
39 |
+ protecting government communications. Today, it is used every day |
|
40 |
+ for a wide variety of purposes by normal people, the military, |
|
41 |
+ journalists, law enforcement officers, activists, and many |
|
42 |
+ others. </p> |
|
29 | 43 |
|
30 | 44 |
<p> |
31 | 45 |
Tor is a network of virtual tunnels that allows people and groups to |
... | ... |
@@ -148,8 +148,6 @@ |
148 | 148 |
single point can tell where the data came from or where it's going. |
149 | 149 |
</p> |
150 | 150 |
|
151 |
- <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png"></p> |
|
152 |
- |
|
153 | 151 |
<p> |
154 | 152 |
To create a private network pathway with Tor, the user's software or |
155 | 153 |
client incrementally builds a circuit of encrypted connections through |
... | ... |
@@ -25,7 +25,7 @@ |
25 | 25 |
</div> |
26 | 26 |
<!-- END SIDEBAR --> |
27 | 27 |
|
28 |
- <hr /> |
|
28 |
+ <hr> |
|
29 | 29 |
|
30 | 30 |
<p> |
31 | 31 |
Tor is a network of virtual tunnels that allows people and groups to |
... | ... |
@@ -134,7 +134,7 @@ |
134 | 134 |
|
135 | 135 |
<a name="thesolution"></a> |
136 | 136 |
<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> |
137 |
- <img src="$(IMGROOT)/htw1.png" alt="How Tor works" /> |
|
137 |
+ <img src="$(IMGROOT)/htw1.png" alt="How Tor works"> |
|
138 | 138 |
|
139 | 139 |
<p> |
140 | 140 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
... | ... |
@@ -148,7 +148,7 @@ |
148 | 148 |
single point can tell where the data came from or where it's going. |
149 | 149 |
</p> |
150 | 150 |
|
151 |
- <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p> |
|
151 |
+ <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png"></p> |
|
152 | 152 |
|
153 | 153 |
<p> |
154 | 154 |
To create a private network pathway with Tor, the user's software or |
... | ... |
@@ -161,7 +161,7 @@ |
161 | 161 |
that each hop can't trace these connections as they pass through. |
162 | 162 |
</p> |
163 | 163 |
|
164 |
- <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p> |
|
164 |
+ <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png"></p> |
|
165 | 165 |
|
166 | 166 |
<p> |
167 | 167 |
Once a circuit has been established, many kinds of data can be exchanged |
... | ... |
@@ -180,7 +180,7 @@ |
180 | 180 |
ones. |
181 | 181 |
</p> |
182 | 182 |
|
183 |
- <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p> |
|
183 |
+ <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p> |
|
184 | 184 |
|
185 | 185 |
|
186 | 186 |
<a name="hiddenservices"></a> |
... | ... |
@@ -134,7 +134,7 @@ |
134 | 134 |
|
135 | 135 |
<a name="thesolution"></a> |
136 | 136 |
<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> |
137 |
- <img src="$(IMGROOT)/htw-1.png" alt="How Tor works" /> |
|
137 |
+ <img src="$(IMGROOT)/htw1.png" alt="How Tor works" /> |
|
138 | 138 |
|
139 | 139 |
<p> |
140 | 140 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
... | ... |
@@ -134,7 +134,7 @@ |
134 | 134 |
|
135 | 135 |
<a name="thesolution"></a> |
136 | 136 |
<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> |
137 |
- <img src="images/htw-1.png" alt="How Tor works" /> |
|
137 |
+ <img src="$(IMGROOT)/htw-1.png" alt="How Tor works" /> |
|
138 | 138 |
|
139 | 139 |
<p> |
140 | 140 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
... | ... |
@@ -6,8 +6,7 @@ |
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
9 |
- <a href="<page about/about>">About » </a> |
|
10 |
- <a href="<page about/about>">Overview</a> |
|
9 |
+ <a href="<page about/overview>">About » </a> |
|
11 | 10 |
</div> |
12 | 11 |
<div id="maincol"> |
13 | 12 |
<a name="overview"></a> |
... | ... |
@@ -162,7 +161,7 @@ |
162 | 161 |
that each hop can't trace these connections as they pass through. |
163 | 162 |
</p> |
164 | 163 |
|
165 |
- <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p> |
|
164 |
+ <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p> |
|
166 | 165 |
|
167 | 166 |
<p> |
168 | 167 |
Once a circuit has been established, many kinds of data can be exchanged |
... | ... |
@@ -135,6 +135,7 @@ |
135 | 135 |
|
136 | 136 |
<a name="thesolution"></a> |
137 | 137 |
<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> |
138 |
+ <img src="images/htw-1.png" alt="How Tor works" /> |
|
138 | 139 |
|
139 | 140 |
<p> |
140 | 141 |
Tor helps to reduce the risks of both simple and sophisticated traffic |
... | ... |
@@ -5,7 +5,7 @@ |
5 | 5 |
#include "head.wmi" TITLE="Tor Project: Overview" CHARSET="UTF-8" |
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 |
- <a href="<page home>">Home » </a> |
|
8 |
+ <a href="<page index>">Home » </a> |
|
9 | 9 |
<a href="<page about/about>">About » </a> |
10 | 10 |
<a href="<page about/about>">Overview</a> |
11 | 11 |
</div> |
1 | 1 |
new file mode 100644 |
... | ... |
@@ -0,0 +1,261 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision: 22308 $ |
|
3 |
+# Translation-Priority: 2-medium |
|
4 |
+ |
|
5 |
+#include "head.wmi" TITLE="Tor Project: Overview" CHARSET="UTF-8" |
|
6 |
+<div id="content" class="clearfix"> |
|
7 |
+ <div id="breadcrumbs"> |
|
8 |
+ <a href="<page home>">Home » </a> |
|
9 |
+ <a href="<page about/about>">About » </a> |
|
10 |
+ <a href="<page about/about>">Overview</a> |
|
11 |
+ </div> |
|
12 |
+ <div id="maincol"> |
|
13 |
+ <a name="overview"></a> |
|
14 |
+ <h2><a class="anchor" href="#overview">Tor: Overview</a></h2> |
|
15 |
+ <!-- BEGIN SIDEBAR --> |
|
16 |
+ <div class="sidebar-left"> |
|
17 |
+ <h3>Topics</h3> |
|
18 |
+ <ul> |
|
19 |
+ <li><a href="<page about/overview>#overview">Overview</a></li> |
|
20 |
+ <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li> |
|
21 |
+ <li><a href="<page about/overview>#thesolution">The Solution</a></li> |
|
22 |
+ <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li> |
|
23 |
+ <li><a href="<page about/overview>#stayinganonymous">Staying anonymous</a></li> |
|
24 |
+ <li><a href="<page about/overview>#thefutureoftor">The future of Tor</a></li> |
|
25 |
+ </ul> |
|
26 |
+ </div> |
|
27 |
+ <!-- END SIDEBAR --> |
|
28 |
+ |
|
29 |
+ <hr /> |
|
30 |
+ |
|
31 |
+ <p> |
|
32 |
+ Tor is a network of virtual tunnels that allows people and groups to |
|
33 |
+ improve their privacy and security on the Internet. It also enables |
|
34 |
+ software developers to create new communication tools |
|
35 |
+ with built-in privacy features. Tor provides the foundation for |
|
36 |
+ a range of applications that allow organizations and individuals |
|
37 |
+ to share information over public networks without compromising their |
|
38 |
+ privacy. |
|
39 |
+ </p> |
|
40 |
+ |
|
41 |
+ <p> |
|
42 |
+ Individuals use Tor to keep websites from tracking them and their family |
|
43 |
+ members, or to connect to news sites, instant messaging services, or the |
|
44 |
+ like when these are blocked by their local Internet providers. Tor's <a |
|
45 |
+ href="<page docs/hidden-services>">hidden services</a> |
|
46 |
+ let users publish web sites and other services without needing to reveal |
|
47 |
+ the location of the site. Individuals also use Tor for socially sensitive |
|
48 |
+ communication: chat rooms and web forums for rape and abuse survivors, |
|
49 |
+ or people with illnesses. |
|
50 |
+ </p> |
|
51 |
+ |
|
52 |
+ <p> |
|
53 |
+ Journalists use Tor to communicate more safely with whistleblowers and |
|
54 |
+ dissidents. Non-governmental organizations (NGOs) use Tor to allow their |
|
55 |
+ workers to connect to their home website while they're in a foreign |
|
56 |
+ country, without notifying everybody nearby that they're working with |
|
57 |
+ that organization. |
|
58 |
+ </p> |
|
59 |
+ |
|
60 |
+ <p> |
|
61 |
+ Groups such as Indymedia recommend Tor for safeguarding their members' |
|
62 |
+ online privacy and security. Activist groups like the Electronic Frontier |
|
63 |
+ Foundation (EFF) recommend Tor as a mechanism for |
|
64 |
+ maintaining civil liberties online. Corporations use Tor as a safe way |
|
65 |
+ to conduct competitive analysis, and to protect sensitive procurement |
|
66 |
+ patterns from eavesdroppers. They also use it to replace traditional |
|
67 |
+ VPNs, which reveal the exact amount and timing of communication. Which |
|
68 |
+ locations have employees working late? Which locations have employees |
|
69 |
+ consulting job-hunting websites? Which research divisions are communicating |
|
70 |
+ with the company's patent lawyers? |
|
71 |
+ </p> |
|
72 |
+ |
|
73 |
+ <p> |
|
74 |
+ A branch of the U.S. Navy uses Tor for open source intelligence |
|
75 |
+ gathering, and one of its teams used Tor while deployed in the Middle |
|
76 |
+ East recently. Law enforcement uses Tor for visiting or surveilling |
|
77 |
+ web sites without leaving government IP addresses in their web logs, |
|
78 |
+ and for security during sting operations. |
|
79 |
+ </p> |
|
80 |
+ |
|
81 |
+ <p> |
|
82 |
+ The variety of people who use Tor is actually <a |
|
83 |
+ href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes |
|
84 |
+ it so secure</a>. Tor hides you among <a href="<page about/torusers>">the |
|
85 |
+ other users on the network</a>, |
|
86 |
+ so the more populous and diverse the user base for Tor is, the more your |
|
87 |
+ anonymity will be protected. |
|
88 |
+ </p> |
|
89 |
+ |
|
90 |
+ <a name="whyweneedtor"></a> |
|
91 |
+ <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3> |
|
92 |
+ |
|
93 |
+ <p> |
|
94 |
+ Using Tor protects you against a common form of Internet surveillance |
|
95 |
+ known as "traffic analysis." Traffic analysis can be used to infer |
|
96 |
+ who is talking to whom over a public network. Knowing the source |
|
97 |
+ and destination of your Internet traffic allows others to track your |
|
98 |
+ behavior and interests. This can impact your checkbook if, for example, |
|
99 |
+ an e-commerce site uses price discrimination based on your country or |
|
100 |
+ institution of origin. It can even threaten your job and physical safety |
|
101 |
+ by revealing who and where you are. For example, if you're travelling |
|
102 |
+ abroad and you connect to your employer's computers to check or send mail, |
|
103 |
+ you can inadvertently reveal your national origin and professional |
|
104 |
+ affiliation to anyone observing the network, even if the connection |
|
105 |
+ is encrypted. |
|
106 |
+ </p> |
|
107 |
+ |
|
108 |
+ <p> |
|
109 |
+ How does traffic analysis work? Internet data packets have two parts: |
|
110 |
+ a data payload and a header used for routing. The data payload is |
|
111 |
+ whatever is being sent, whether that's an email message, a web page, or an |
|
112 |
+ audio file. Even if you encrypt the data payload of your communications, |
|
113 |
+ traffic analysis still reveals a great deal about what you're doing and, |
|
114 |
+ possibly, what you're saying. That's because it focuses on the header, |
|
115 |
+ which discloses source, destination, size, timing, and so on. |
|
116 |
+ </p> |
|
117 |
+ |
|
118 |
+ <p> |
|
119 |
+ A basic problem for the privacy minded is that the recipient of your |
|
120 |
+ communications can see that you sent it by looking at headers. So can |
|
121 |
+ authorized intermediaries like Internet service providers, and sometimes |
|
122 |
+ unauthorized intermediaries as well. A very simple form of traffic |
|
123 |
+ analysis might involve sitting somewhere between sender and recipient on |
|
124 |
+ the network, looking at headers. |
|
125 |
+ </p> |
|
126 |
+ |
|
127 |
+ <p> |
|
128 |
+ But there are also more powerful kinds of traffic analysis. Some |
|
129 |
+ attackers spy on multiple parts of the Internet and use sophisticated |
|
130 |
+ statistical techniques to track the communications patterns of many |
|
131 |
+ different organizations and individuals. Encryption does not help against |
|
132 |
+ these attackers, since it only hides the content of Internet traffic, not |
|
133 |
+ the headers. |
|
134 |
+ </p> |
|
135 |
+ |
|
136 |
+ <a name="thesolution"></a> |
|
137 |
+ <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> |
|
138 |
+ |
|
139 |
+ <p> |
|
140 |
+ Tor helps to reduce the risks of both simple and sophisticated traffic |
|
141 |
+ analysis by distributing your transactions over several places on the |
|
142 |
+ Internet, so no single point can link you to your destination. The idea |
|
143 |
+ is similar to using a twisty, hard-to-follow route in order to throw off |
|
144 |
+ somebody who is tailing you — and then periodically erasing your |
|
145 |
+ footprints. Instead of taking a direct route from source to |
|
146 |
+ destination, data packets on the Tor network take a random pathway |
|
147 |
+ through several relays that cover your tracks so no observer at any |
|
148 |
+ single point can tell where the data came from or where it's going. |
|
149 |
+ </p> |
|
150 |
+ |
|
151 |
+ <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p> |
|
152 |
+ |
|
153 |
+ <p> |
|
154 |
+ To create a private network pathway with Tor, the user's software or |
|
155 |
+ client incrementally builds a circuit of encrypted connections through |
|
156 |
+ relays on the network. The circuit is extended one hop at a time, and |
|
157 |
+ each relay along the way knows only which relay gave it data and which |
|
158 |
+ relay it is giving data to. No individual relay ever knows the |
|
159 |
+ complete path that a data packet has taken. The client negotiates a |
|
160 |
+ separate set of encryption keys for each hop along the circuit to ensure |
|
161 |
+ that each hop can't trace these connections as they pass through. |
|
162 |
+ </p> |
|
163 |
+ |
|
164 |
+ <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p> |
|
165 |
+ |
|
166 |
+ <p> |
|
167 |
+ Once a circuit has been established, many kinds of data can be exchanged |
|
168 |
+ and several different sorts of software applications can be deployed |
|
169 |
+ over the Tor network. Because each relay sees no more than one hop in |
|
170 |
+ the circuit, neither an eavesdropper nor a compromised relay can use |
|
171 |
+ traffic analysis to link the connection's source and destination. Tor |
|
172 |
+ only works for TCP streams and can be used by any application with SOCKS |
|
173 |
+ support. |
|
174 |
+ </p> |
|
175 |
+ |
|
176 |
+ <p> |
|
177 |
+ For efficiency, the Tor software uses the same circuit for connections |
|
178 |
+ that happen within the same ten minutes or so. Later requests are given a |
|
179 |
+ new circuit, to keep people from linking your earlier actions to the new |
|
180 |
+ ones. |
|
181 |
+ </p> |
|
182 |
+ |
|
183 |
+ <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p> |
|
184 |
+ |
|
185 |
+ |
|
186 |
+ <a name="hiddenservices"></a> |
|
187 |
+ <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3> |
|
188 |
+ |
|
189 |
+ <p> |
|
190 |
+ Tor also makes it possible for users to hide their locations while |
|
191 |
+ offering various kinds of services, such as web publishing or an instant |
|
192 |
+ messaging server. Using Tor "rendezvous points," other Tor users can |
|
193 |
+ connect to these hidden services, each without knowing the other's |
|
194 |
+ network identity. This hidden service functionality could allow Tor |
|
195 |
+ users to set up a website where people publish material without worrying |
|
196 |
+ about censorship. Nobody would be able to determine who was offering |
|
197 |
+ the site, and nobody who offered the site would know who was posting to it. |
|
198 |
+ Learn more about <a href="<page docs/tor-hidden-service>">configuring |
|
199 |
+ hidden services</a> and how the <a href="<page docs/hidden-services>">hidden |
|
200 |
+ service protocol</a> works. |
|
201 |
+ </p> |
|
202 |
+ |
|
203 |
+ <a name="stayinganonymous"></a> |
|
204 |
+ <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3> |
|
205 |
+ |
|
206 |
+ <p> |
|
207 |
+ Tor can't solve all anonymity problems. It focuses only on |
|
208 |
+ protecting the transport of data. You need to use protocol-specific |
|
209 |
+ support software if you don't want the sites you visit to see your |
|
210 |
+ identifying information. For example, you can use web proxies such as |
|
211 |
+ Privoxy while web browsing to block cookies and withhold information |
|
212 |
+ about your browser type. |
|
213 |
+ </p> |
|
214 |
+ |
|
215 |
+ <p> |
|
216 |
+ Also, to protect your anonymity, be smart. Don't provide your name |
|
217 |
+ or other revealing information in web forms. Be aware that, like all |
|
218 |
+ anonymizing networks that are fast enough for web browsing, Tor does not |
|
219 |
+ provide protection against end-to-end timing attacks: If your attacker |
|
220 |
+ can watch the traffic coming out of your computer, and also the traffic |
|
221 |
+ arriving at your chosen destination, he can use statistical analysis to |
|
222 |
+ discover that they are part of the same circuit. |
|
223 |
+ </p> |
|
224 |
+ |
|
225 |
+ <a name="thefutureoftor"></a> |
|
226 |
+ <h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3> |
|
227 |
+ |
|
228 |
+ <p> |
|
229 |
+ Providing a usable anonymizing network on the Internet today is an |
|
230 |
+ ongoing challenge. We want software that meets users' needs. We also |
|
231 |
+ want to keep the network up and running in a way that handles as many |
|
232 |
+ users as possible. Security and usability don't have to be at odds: |
|
233 |
+ As Tor's usability increases, it will attract more users, which will |
|
234 |
+ increase the possible sources and destinations of each communication, |
|
235 |
+ thus increasing security for everyone. |
|
236 |
+ We're making progress, but we need your help. Please consider |
|
237 |
+ <a href="<page docs/tor-doc-relay>">running a relay</a> |
|
238 |
+ or <a href="<page getinvolved/volunteer>">volunteering</a> as a |
|
239 |
+ <a href="<page docs/documentation>#Developers">developer</a>. |
|
240 |
+ </p> |
|
241 |
+ |
|
242 |
+ <p> |
|
243 |
+ Ongoing trends in law, policy, and technology threaten anonymity as never |
|
244 |
+ before, undermining our ability to speak and read freely online. These |
|
245 |
+ trends also undermine national security and critical infrastructure by |
|
246 |
+ making communication among individuals, organizations, corporations, |
|
247 |
+ and governments more vulnerable to analysis. Each new user and relay |
|
248 |
+ provides additional diversity, enhancing Tor's ability to put control |
|
249 |
+ over your security and privacy back into your hands. |
|
250 |
+ </p> |
|
251 |
+ |
|
252 |
+ </div> |
|
253 |
+ <!-- END MAINCOL --> |
|
254 |
+ <div id = "sidecol"> |
|
255 |
+#include "side.wmi" |
|
256 |
+#include "info.wmi" |
|
257 |
+ </div> |
|
258 |
+ <!-- END SIDECOL --> |
|
259 |
+</div> |
|
260 |
+<!-- END CONTENT --> |
|
261 |
+#include <foot.wmi> |