Browse code

Fix dead links and update content. (#22522)

Make dead news report links point to wayback machine versions.
Make dead adopton link point to Wikipedia.
Removed outdated IBB/BBG link and content.
Added SecureDrop to journalist section.

kat authored on 02/12/2017 20:50:57
Showing 1 changed files
... ...
@@ -57,7 +57,7 @@
57 57
     </li>
58 58
     <li><strong>They research sensitive topics.</strong>
59 59
     There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
60
-    <a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
60
+    <a href="https://web.archive.org/web/20120107130815/http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63 63
 <li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
... ...
@@ -74,12 +74,10 @@
74 74
     tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
75 75
     journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
76 76
     </li>
77
-    <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
78
-    (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
79
-    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
80
-    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
81
-    economics and religion.
82
-    </li>
77
+	<li>Tor is part of <strong><a href="https://securedrop.org/">SecureDrop</a></strong>, an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. <a href="https://securedrop.org/directory">Many news organizations</a> use SecureDrop, including the Associated Press, The Washington Post, The New York Times, The CBC, ProPublica, Dagbladet, and more.
78
+	</li>
79
+	<li>Tor preserves the ability of people behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion.
80
+	</li>
83 81
     <li><strong>Citizen journalists in China</strong> use Tor to write about
84 82
     local events to encourage social change and political reform.
85 83
     </li>
... ...
@@ -179,7 +177,7 @@
179 177
     <li>
180 178
     Tor can help activists avoid government or corporate censorship that hinders organization.
181 179
     In one such case, a
182
-    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
180
+    <a href="https://web.archive.org/web/20071015142759/http://www.cbc.ca:80/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
183 181
     to help organize a strike.
184 182
     </li>
185 183
     </ul>
... ...
@@ -256,7 +254,7 @@
256 254
     <hr>
257 255
     <ul>
258 256
     <li>Frequently we hear about bloggers who are
259
-    <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
257
+    <a href="https://web.archive.org/web/20060910122231/http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
260 258
     <a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
261 259
     for saying perfectly legal things online, in their blog.</li>
262 260
     <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
... ...
@@ -317,8 +315,8 @@
317 315
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
318 316
     href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
319 317
     just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
320
-    <a href="https://www.crimeline.co.za/">police tip lines</a>,
321
-    <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
318
+    <a href="https://www.crimeline.co.za/">police tip lines</a>, 
319
+    <a href="https://en.wikipedia.org/wiki/Closed_adoption">some adoption services</a>,
322 320
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
323 321
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
324 322
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
Browse code

Remove deadlink in who uses Tor

hiromipaw authored on 22/11/2017 18:21:25
Showing 1 changed files
... ...
@@ -83,9 +83,8 @@
83 83
     <li><strong>Citizen journalists in China</strong> use Tor to write about
84 84
     local events to encourage social change and political reform.
85 85
     </li>
86
-    <li><strong>Citizens and journalists in <a
87
-    href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
88
-    holes</a></strong> use Tor to research state propaganda and opposing
86
+    <li><strong>Citizens and journalists in Internet black
87
+    holes</strong> use Tor to research state propaganda and opposing
89 88
     viewpoints, to file stories with non-State controlled media, and to
90 89
     avoid risking the personal consequences of intellectual curiosity.
91 90
     </li>
Browse code

Change hidden service to onion service. (See #24285)

kat authored on 16/11/2017 19:08:34
Showing 1 changed files
... ...
@@ -280,17 +280,17 @@
280 280
     operations, as well as protecting themselves from physical harm.
281 281
     </li>
282 282
 
283
-    <li><strong>Hidden services:</strong>
284
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
285
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
286
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
287
-    control to be physically secure from discovery and takedown.
288
-    </li>
289
-    <li><strong>Intelligence gathering:</strong>
290
-    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
291
-    to record a military address, thereby revealing the surveillance.
292
-    </li>
293
-    </ul>
283
+    <li><strong>Onion services:</strong>
284
+	When the Internet was designed by DARPA, its primary purpose was to be able
285
+	to facilitate distributed, robust communications in case of local strikes.
286
+	However, some functions must be centralized, such as command and control
287
+	sites.  It's the nature of the Internet protocols to reveal the geographic
288
+	location of any server that is reachable online.  Tor's onion services
289
+	capacity allows military command and control to be physically secure from
290
+	discovery and takedown.  </li> <li><strong>Intelligence gathering:</strong>
291
+	Military personnel need to use electronic resources run and monitored by
292
+	insurgents. They do not want the webserver logs on an insurgent website to
293
+	record a military address, thereby revealing the surveillance.  </li> </ul>
294 294
 
295 295
     <a name="itprofessionals"></a>
296 296
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
Browse code

Don't put all sections with pictures on top on torusers page

Sebastian Hahn authored on 14/03/2015 13:36:45
Showing 1 changed files
... ...
@@ -29,7 +29,7 @@
29 29
     href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
30 30
     Tor stories</a>! What do you use Tor for? Why do you need it? What
31 31
     has Tor done for you? We need your stories.</p>
32
-    
32
+
33 33
     <a name="normalusers"></a>
34 34
     <img src="$(IMGROOT)/family.jpg" alt="Normal People">
35 35
     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>
... ...
@@ -64,35 +64,7 @@
64 64
 </li>
65 65
 <li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
66 66
     </ul>
67
-    
68
-    <a name="military"></a>
69
-    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
70
-    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
71
-    <hr>
72
-    <ul>
73
-    
74
-    <li>
75
-    <strong>Field agents:</strong>
76
-    It is not difficult for insurgents to monitor Internet traffic and
77
-    discover all the hotels and other locations from which people are
78
-    connecting to known military servers.
79
-    Military field agents deployed away from home use Tor to
80
-    mask the sites they are visiting, protecting military interests and
81
-    operations, as well as protecting themselves from physical harm.
82
-    </li>
83
-    
84
-    <li><strong>Hidden services:</strong>
85
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
86
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
87
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
88
-    control to be physically secure from discovery and takedown.
89
-    </li>
90
-    <li><strong>Intelligence gathering:</strong>
91
-    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
92
-    to record a military address, thereby revealing the surveillance.
93
-    </li>
94
-    </ul>
95
-    
67
+
96 68
     <a name="journalist"></a>
97 69
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
98 70
     <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
... ...
@@ -118,7 +90,7 @@
118 90
     avoid risking the personal consequences of intellectual curiosity.
119 91
     </li>
120 92
     </ul>
121
-    
93
+
122 94
     <a name="lawenforcement"></a>
123 95
     <h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
124 96
     <hr>
... ...
@@ -144,7 +116,7 @@
144 116
     do not encourage anonymity are limiting the sources of their tips.
145 117
     </li>
146 118
     </ul>
147
-    
119
+
148 120
     <a name="activists"></a>
149 121
     <img src="$(IMGROOT)/activists.jpg" alt="Activists &amp; Whistleblowers">
150 122
     <h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
... ...
@@ -212,7 +184,7 @@
212 184
     to help organize a strike.
213 185
     </li>
214 186
     </ul>
215
-    
187
+
216 188
     <a name="spotlight"></a>
217 189
     <h2><a class="anchor" href="#spotlight">High &amp; low profile people use Tor</a></h2>
218 190
     <hr>
... ...
@@ -241,7 +213,7 @@
241 213
     this continuing into the future.
242 214
     </li>
243 215
     </ul>
244
-    
216
+
245 217
     <a name="executives"></a>
246 218
     <img src="$(IMGROOT)/consumers.jpg" alt="Businesses">
247 219
     <h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
... ...
@@ -279,7 +251,7 @@
279 251
     into whistleblowing.
280 252
     </li>
281 253
     </ul>
282
-    
254
+
283 255
     <a name="bloggers"></a>
284 256
     <h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
285 257
     <hr>
... ...
@@ -291,7 +263,35 @@
291 263
     <li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
292 264
     <li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li>
293 265
     </ul>
294
-    
266
+
267
+    <a name="military"></a>
268
+    <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement">
269
+    <h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
270
+    <hr>
271
+    <ul>
272
+
273
+    <li>
274
+    <strong>Field agents:</strong>
275
+    It is not difficult for insurgents to monitor Internet traffic and
276
+    discover all the hotels and other locations from which people are
277
+    connecting to known military servers.
278
+    Military field agents deployed away from home use Tor to
279
+    mask the sites they are visiting, protecting military interests and
280
+    operations, as well as protecting themselves from physical harm.
281
+    </li>
282
+
283
+    <li><strong>Hidden services:</strong>
284
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
285
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
286
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
287
+    control to be physically secure from discovery and takedown.
288
+    </li>
289
+    <li><strong>Intelligence gathering:</strong>
290
+    Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
291
+    to record a military address, thereby revealing the surveillance.
292
+    </li>
293
+    </ul>
294
+
295 295
     <a name="itprofessionals"></a>
296 296
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
297 297
     <hr>
... ...
@@ -302,7 +302,7 @@
302 302
     <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
303 303
     <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
304 304
     </ul>
305
-    
305
+
306 306
     <p>
307 307
     Please do send us your success stories. They are very important because
308 308
     Tor provides anonymity. While it is thrilling to speculate about <a
... ...
@@ -312,7 +312,7 @@
312 312
     counterproductive.  For example, we talked to an FBI officer who
313 313
     explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
314 314
     details or mention his name.</p>
315
-    
315
+
316 316
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
317 317
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
318 318
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
Browse code

Replaced a dead link as reported in #10768

Matt Pagan authored on 29/01/2014 20:27:56
Showing 1 changed files
... ...
@@ -57,7 +57,7 @@
57 57
     </li>
58 58
     <li><strong>They research sensitive topics.</strong>
59 59
     There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
60
-    <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
60
+    <a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63 63
 <li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
Browse code

Removed links to news stories lots of people have already read.

Matt Pagan authored on 30/10/2013 19:43:53
Showing 1 changed files
... ...
@@ -60,8 +60,9 @@
60 60
     <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63
-<li><strong>They skirt surveillance.</strong> Even using the web for harmless tasks can sometimes <a href="http://www.theatlanticwire.com/national/2013/08/government-knocking-doors-because-google-searches/67864/">raise red flags</a> for suspicious observers. When the 2013 <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">disclosures of mass surveillance</a> became public, internal NSA documents revealed Tor to be <a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">an effective surveillance circumvention tool</a>.</li>
64
-<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="http://techcrunch.com/2013/06/01/as-anti-government-protests-erupt-in-istanbul-facebook-and-twitter-appear-suddenly-throttled/">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
63
+<li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
64
+</li>
65
+<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
65 66
     </ul>
66 67
     
67 68
     <a name="military"></a>
Matt Pagan authored on 29/10/2013 08:48:36
Showing 1 changed files
... ...
@@ -60,6 +60,8 @@
60 60
     <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
61 61
     or world religions is behind a national firewall.
62 62
     </li>
63
+<li><strong>They skirt surveillance.</strong> Even using the web for harmless tasks can sometimes <a href="http://www.theatlanticwire.com/national/2013/08/government-knocking-doors-because-google-searches/67864/">raise red flags</a> for suspicious observers. When the 2013 <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">disclosures of mass surveillance</a> became public, internal NSA documents revealed Tor to be <a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">an effective surveillance circumvention tool</a>.</li>
64
+<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="http://techcrunch.com/2013/06/01/as-anti-government-protests-erupt-in-istanbul-facebook-and-twitter-appear-suddenly-throttled/">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li>
63 65
     </ul>
64 66
     
65 67
     <a name="military"></a>
Browse code

remove dead page reference, fixes #6629.

Andrew Lewman authored on 20/09/2012 20:12:00
Showing 1 changed files
... ...
@@ -315,7 +315,7 @@
315 315
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
316 316
     href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
317 317
     just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
318
-    <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
318
+    <a href="https://www.crimeline.co.za/">police tip lines</a>,
319 319
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
320 320
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
321 321
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
Browse code

fix another dead link.

Andrew Lewman authored on 25/01/2012 04:32:36
Showing 1 changed files
... ...
@@ -155,7 +155,7 @@
155 155
     avoid persecution while still raising a voice.
156 156
     </li>
157 157
     <li>When groups such as the <strong>Friends Service Committee and environmental
158
-    groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
158
+    groups are increasingly <a href="http://www.afsc.org/story/iowans-rally-defense-civil-liberties">falling under surveillance</a>
159 159
     in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of
160 160
     change rely on Tor for basic privacy during legitimate activities.
161 161
     </li>
Browse code

fix the links to amnesty's old irrepressible campaign.

Andrew Lewman authored on 25/01/2012 04:26:43
Showing 1 changed files
... ...
@@ -170,8 +170,8 @@
170 170
     the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
171 171
     </li>
172 172
     <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
173
-    recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
174
-    See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
173
+    past <a href="http://web.archive.org/web/20090323052228/http://irrepressible.info/">corporate responsibility campaign</a></strong>.
174
+    See also their 2006 <a href="http://web.archive.org/web/20090530164605/http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
175 175
     report</a> on China Internet issues.
176 176
     </li>
177 177
     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
Browse code

fix typo reported on tor-assistants

Roger Dingledine authored on 01/12/2011 05:51:48
Showing 1 changed files
... ...
@@ -297,7 +297,7 @@
297 297
     <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
298 298
     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
299 299
     <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
300
-    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
300
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li>
301 301
     </ul>
302 302
     
303 303
     <p>
Browse code

remove the VISTA text from the tor users page, as that app was pending, and never granted.

Andrew Lewman authored on 21/10/2011 19:41:02
Showing 1 changed files
... ...
@@ -227,17 +227,15 @@
227 227
     write were to get back to your boss, would you lose your job?  If your
228 228
     social worker read about your opinion of the system, would she treat
229 229
     you differently?  Anonymity gives a voice to the voiceless.
230
-    To support this, <strong>Tor currently has an open Americorps/VISTA position</strong> pending.  This
231
-    government grant will cover a full time stipend for a volunteer to create
232
-    curricula to <strong>show low-income populations how to use anonymity online for
233
-    safer civic engagement</strong>.  Although it's often said that the poor do not use
234
-    online access for civic engagement, failing to act in their self-interests,
235
-    it is our hypothesis (based on personal conversations and anecdotal
236
-    information) that it is precisely the &ldquo;permanent record &rdquo;
237
-    left online that keeps many of the poor from speaking out on the Internet.
238
-    We hope to show people how to engage more safely online, and then at
239
-    the end of the year, evaluate how online and offline civic engagement has
240
-    changed, and how the population sees this continuing into the future.
230
+    Although it's often said that the poor do not use online access
231
+    for civic engagement, failing to act in their self-interests, it
232
+    is our hypothesis (based on personal conversations and anecdotal
233
+    information) that it is precisely the &ldquo;permanent record
234
+    &rdquo; left online that keeps many of the poor from speaking out
235
+    on the Internet.  We hope to show people how to engage more safely
236
+    online, and then at the end of the year, evaluate how online and
237
+    offline civic engagement has changed, and how the population sees
238
+    this continuing into the future.
241 239
     </li>
242 240
     </ul>
243 241
     
Browse code

add request for more tor stories on the user page.

Andrew Lewman authored on 30/08/2011 06:17:53
Showing 1 changed files
... ...
@@ -24,6 +24,11 @@
24 24
     enforcement officers, activists, and many others. Here are some of
25 25
     the specific uses we've seen or recommend.
26 26
     </p>
27
+
28
+    <p>We need your <a
29
+    href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good
30
+    Tor stories</a>! What do you use Tor for? Why do you need it? What
31
+    has Tor done for you? We need your stories.</p>
27 32
     
28 33
     <a name="normalusers"></a>
29 34
     <img src="$(IMGROOT)/family.jpg" alt="Normal People">
Browse code

looks like we never set the keywords either

Roger Dingledine authored on 27/10/2010 12:31:57
Showing 1 changed files
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Revision: $Revision: 22261 $
2
+# Revision: $Revision$
3 3
 # Translation-Priority: 2-medium
4 4
 
5 5
 #include "head.wmi" TITLE="Who uses Tor?" CHARSET="UTF-8"
Browse code

selectively apply a patch from rransom to torusers

Andrew Lewman authored on 11/10/2010 02:11:28
Showing 1 changed files
... ...
@@ -18,7 +18,7 @@
18 18
     Tor was originally designed, implemented, and deployed as a
19 19
     third-generation <a href="http://www.onion-router.net/">onion routing
20 20
     project of the Naval Research Laboratory</a>.  It was originally
21
-    developed with the U.S. Navy in mind, primarily for the purpose of
21
+    developed with the U.S. Navy in mind, for the primary purpose of
22 22
     protecting government communications.  Today, it is used every day
23 23
     for a wide variety of purposes by the military, journalists, law
24 24
     enforcement officers, activists, and many others. Here are some of
... ...
@@ -31,15 +31,15 @@
31 31
     <hr>
32 32
     <ul>
33 33
     <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
34
-    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">sell
35
-    your Internet browsing records</a> to marketers and anyone else
34
+    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
35
+    sell your Internet browsing records</a> to marketers or anyone else
36 36
     willing to pay for it. ISPs typically say that
37 37
     they anonymize the data by not providing personally identifiable information, but
38 38
     <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
39 39
     has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially
40 40
     userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
41 41
     </li>
42
-    <li><strong>They protect their communications from irresponsible corporations.</strong>
42
+    <li><strong> They protect their communications from irresponsible corporations.</strong>
43 43
     All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
44 44
     private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
45 45
     <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&amp;en=f6f61949c6da4d38&amp;ei=5090">giving away the data to researchers</a>,
... ...
@@ -47,7 +47,7 @@
47 47
     </li>
48 48
     <li><strong>They protect their children online.</strong>
49 49
     You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
50
-    by not concealing their IP address. Increasingly, IP addresses can literally be <a href="http://whatismyipaddress.com/">mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
50
+    by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
51 51
     In the United States, the government is pushing to make this mapping increasingly precise.
52 52
     </li>
53 53
     <li><strong>They research sensitive topics.</strong>
... ...
@@ -74,20 +74,20 @@
74 74
     </li>
75 75
     
76 76
     <li><strong>Hidden services:</strong>
77
-    When the Internet was designed by DARPA, its primary purpose was to facilitate distributed, robust communications in case of
78
-    local strikes.  However, some functions must be centralized, such as command and control sites.  By their nature, Internet protocols
79
-    reveal the geographic location of any server that is reachable online.  Tor's <a href="<page docs/hidden-services>">hidden service capability</a> allows military command and
77
+    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
78
+    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
79
+    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
80 80
     control to be physically secure from discovery and takedown.
81 81
     </li>
82 82
     <li><strong>Intelligence gathering:</strong>
83 83
     Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
84
-    to record a military address, thereby revealing that the site is under surveillance.
84
+    to record a military address, thereby revealing the surveillance.
85 85
     </li>
86 86
     </ul>
87 87
     
88 88
     <a name="journalist"></a>
89 89
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
90
-    <h2><a class="anchor" href="#journalist">Journalists and their audiences use Tor</a></h2>
90
+    <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
91 91
     <hr>
92 92
     <ul>
93 93
     <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
... ...
@@ -96,8 +96,8 @@
96 96
     </li>
97 97
     <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
98 98
     (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
99
-    safe access to free media.  Tor preserves the ability of persons behind national firewalls, or under
100
-    the surveillance of repressive regimes, to obtain a global perspective on controversial topics including democracy,
99
+    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
100
+    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
101 101
     economics and religion.
102 102
     </li>
103 103
     <li><strong>Citizen journalists in China</strong> use Tor to write about
... ...
@@ -124,14 +124,14 @@
124 124
     </li>
125 125
     <li><strong>Sting operations:</strong>
126 126
     Similarly, anonymity allows law officers to engage in online
127
-    &ldquo;undercover&rdquo; operations.  Regardless of how good an
128
-    undercover officer's &ldquo;street cred&rdquo; may be, if his
129
-    communications come from IP addresses allocated to the police, his cover is blown.
127
+    &ldquo;undercover &rdquo; operations.  Regardless of how good an
128
+    undercover officer's &ldquo;street cred&rdquo; may be, if the
129
+    communications include IP ranges from police addresses, the cover is blown.
130 130
     </li>
131 131
     <li><strong>Truly anonymous tip lines:</strong>
132 132
     While online anonymous tip lines are popular, without anonymity
133 133
     software, they are far less useful.  Sophisticated sources understand that
134
-    although a name or e-mail address is not attached to information, server
134
+    although a name or email address is not attached to information, server
135 135
     logs can identify them very quickly.  As a result, tip line web sites that
136 136
     do not encourage anonymity are limiting the sources of their tips.
137 137
     </li>
... ...
@@ -145,7 +145,7 @@
145 145
     <li><strong>Human rights activists use Tor to anonymously report abuses from
146 146
     danger zones.</strong>  Internationally, labor rights workers use Tor and other
147 147
     forms of online and offline anonymity to organize workers in accordance
148
-    with the Universal Declaration of Human Rights. Even though their actions are within
148
+    with the Universal Declaration of Human Rights. Even though they are within
149 149
     the law, it does not mean they are safe. Tor provides the ability to
150 150
     avoid persecution while still raising a voice.
151 151
     </li>
... ...
@@ -155,16 +155,16 @@
155 155
     change rely on Tor for basic privacy during legitimate activities.
156 156
     </li>
157 157
     <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
158
-    recommends Tor in their report,
159
-    &ldquo;<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
158
+    recommends Tor in their report, &ldquo;
159
+    <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
160 160
     Complicity in Chinese Internet Censorship</a>.&rdquo; The study
161 161
     co-author interviewed Roger Dingledine, Tor project leader,
162
-    regarding Tor use.  They cover Tor in the section on how to breach the <a
162
+    on Tor use.  They cover Tor in the section on how to breach the <a
163 163
     href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
164
-    Firewall of China&rdquo;</a>, and recommend that human rights workers throughout
165
-    the globe use Tor for &ldquo;secure browsing and communications&rdquo;.
164
+    Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
165
+    the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
166 166
     </li>
167
-    <li>Tor has consulted with and volunteered help to <strong>Amnesty International's
167
+    <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
168 168
     recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
169 169
     See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
170 170
     report</a> on China Internet issues.
... ...
@@ -172,7 +172,7 @@
172 172
     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
173 173
     recommends Tor, especially for <strong>anonymous blogging</strong>,
174 174
     throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
175
-    web site</a>.
175
+    web site.</a>
176 176
     </li>
177 177
     <li>In the US, the Supreme Court recently stripped legal protections from
178 178
     government whistleblowers.  But whistleblowers working for governmental
... ...
@@ -181,8 +181,8 @@
181 181
     </li>
182 182
     <li>A contact of ours who works with a public health nonprofit in
183 183
     Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
184
-    mostly bribes and such.  When that percentage rises steeply, not only are they unable to afford the money, but they
185
-    cannot afford to complain &mdash; this is the point at which open objection can
184
+    mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
185
+    not afford to complain &mdash; this is the point at which open objection can
186 186
     become dangerous.  So his nonprofit has been working to
187 187
     <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
188 188
     </li>
... ...
@@ -191,17 +191,17 @@
191 191
     local residents to <strong>urge reform in the company</strong> that dominated the town's
192 192
     economic and government affairs. She is fully cognizant that the kind of
193 193
     organizing she was doing <strong>could lead to harm or &ldquo;fatal
194
-    accidents&rdquo;</strong>.
194
+    accidents.&rdquo;</strong>
195 195
     </li>
196 196
     <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
197
-    regarding sweatshops</strong> that produce goods for western countries, and to
197
+    regarding sweatshops</strong> that produce goods for western countries and to
198 198
     organize local labor.
199 199
     </li>
200 200
     <li>
201 201
     Tor can help activists avoid government or corporate censorship that hinders organization.
202
-    In one such case,
203
-    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">a Canadian ISP blocked access to a union website</a>
204
-    used by its own employees to help organize a strike.
202
+    In one such case, a
203
+    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
204
+    to help organize a strike.
205 205
     </li>
206 206
     </ul>
207 207
     
... ...
@@ -228,7 +228,7 @@
228 228
     safer civic engagement</strong>.  Although it's often said that the poor do not use
229 229
     online access for civic engagement, failing to act in their self-interests,
230 230
     it is our hypothesis (based on personal conversations and anecdotal
231
-    information) that it is precisely the &ldquo;permanent record&rdquo;
231
+    information) that it is precisely the &ldquo;permanent record &rdquo;
232 232
     left online that keeps many of the poor from speaking out on the Internet.
233 233
     We hope to show people how to engage more safely online, and then at
234 234
     the end of the year, evaluate how online and offline civic engagement has
... ...
@@ -246,23 +246,23 @@
246 246
     of information on Internet attacks.  Such a repository requires members
247 247
     to report breaches to a central group, who correlates attacks to detect
248 248
     coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
249
-    traffic to such a repository to where the report is
250
-    sent from.  Even if every packet were encrypted, the IP
249
+    traffic to such a repository to be able to track where information is
250
+    coming from.  Even though every packet were encrypted, the IP
251 251
     address would betray the location of a compromised system.  Tor allows
252
-    such repositories of sensitive information to resist eavesdropping.
252
+    such repositories of sensitive information to resist compromises.
253 253
     </li>
254 254
     <li><strong>Seeing your competition as your market does:</strong>
255
-    If you try to check out your competitor's pricing, you may find no
255
+    If you try to check out a competitor's pricing, you may find no
256 256
     information or misleading information on their web site.  This is because
257 257
     their web server may be keyed to detect connections from competitors,
258
-    and block your staff or spread disinformation to them.  Tor allows a business
259
-    to view its sector as the general public would view it.
258
+    and block or spread disinformation to your staff.  Tor allows a business
259
+    to view their sector as the general public would view it.
260 260
     </li>
261 261
     <li><strong>Keeping strategies confidential:</strong>
262 262
     An investment bank, for example, might not want industry snoopers to be
263 263
     able to track what web sites their analysts are watching.  The strategic
264
-    importance of traffic patterns, and the vulnerability of such data
265
-    to surveillance, is starting to be more widely recognized in several areas
264
+    importance of traffic patterns, and the vulnerability of the surveillance
265
+    of such data, is starting to be more widely recognized in several areas
266 266
     of the business world.
267 267
     </li>
268 268
     <li><strong>Accountability:</strong>
... ...
@@ -290,11 +290,11 @@
290 290
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
291 291
     <hr>
292 292
     <ul>
293
-    <li>To verify IP-address-based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges to access a site. Tor can be used to verify those configurations by using an IP number outside the company's alloted IP block.</li>
294
-    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. When a log review reveals a possible violation, Tor can be used to verify the information without putting an exception into corporate security systems.</li>
293
+    <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
294
+    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
295 295
     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
296
-    <li>To access Internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the Internet while leaving standard security policies in place.</li>
297
-    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make Internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations.</li>
296
+    <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
297
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
298 298
     </ul>
299 299
     
300 300
     <p>
... ...
@@ -310,15 +310,15 @@
310 310
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
311 311
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
312 312
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
313
-    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor Project is based on the belief that anonymity is not
314
-    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The EFF maintains <a href="http://www.eff.org/issues/anonymity">a good overview of how anonymity was crucial to the founding of the United States</a>.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
313
+    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
314
+    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
315 315
     <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
316 316
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
317 317
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
318 318
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
319 319
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
320 320
     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
321
-    purposes (e.g., the majority of Tor relays do not support SMTP, in order to prevent anonymous e-mail spamming), or if you're one of the
321
+    purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
322 322
     <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
323 323
     you have better options than Tor. While not dismissing the potential abuses of Tor,
324 324
     this page shows a few of the many important ways anonymity is used online today.</p>
Browse code

Small language fixups from rransom.

arma will probably want to double-check these :-)

Sebastian Hahn authored on 10/10/2010 12:56:05
Showing 1 changed files
... ...
@@ -18,7 +18,7 @@
18 18
     Tor was originally designed, implemented, and deployed as a
19 19
     third-generation <a href="http://www.onion-router.net/">onion routing
20 20
     project of the Naval Research Laboratory</a>.  It was originally
21
-    developed with the U.S. Navy in mind, for the primary purpose of
21
+    developed with the U.S. Navy in mind, primarily for the purpose of
22 22
     protecting government communications.  Today, it is used every day
23 23
     for a wide variety of purposes by the military, journalists, law
24 24
     enforcement officers, activists, and many others. Here are some of
... ...
@@ -31,15 +31,15 @@
31 31
     <hr>
32 32
     <ul>
33 33
     <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
34
-    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
35
-    sell your Internet browsing records</a> to marketers or anyone else
34
+    Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">sell
35
+    your Internet browsing records</a> to marketers and anyone else
36 36
     willing to pay for it. ISPs typically say that
37 37
     they anonymize the data by not providing personally identifiable information, but
38 38
     <a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
39 39
     has proven incorrect</a>.  A full record of every site you visit, the text of every search you perform, and potentially
40 40
     userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
41 41
     </li>
42
-    <li><strong> They protect their communications from irresponsible corporations.</strong>
42
+    <li><strong>They protect their communications from irresponsible corporations.</strong>
43 43
     All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
44 44
     private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
45 45
     <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&amp;en=f6f61949c6da4d38&amp;ei=5090">giving away the data to researchers</a>,
... ...
@@ -47,7 +47,7 @@
47 47
     </li>
48 48
     <li><strong>They protect their children online.</strong>
49 49
     You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply
50
-    by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
50
+    by not concealing their IP address. Increasingly, IP addresses can literally be <a href="http://whatismyipaddress.com/">mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet.
51 51
     In the United States, the government is pushing to make this mapping increasingly precise.
52 52
     </li>
53 53
     <li><strong>They research sensitive topics.</strong>
... ...
@@ -64,7 +64,7 @@
64 64
     <ul>
65 65
     
66 66
     <li>
67
-    <strong>Field Agents:</strong>
67
+    <strong>Field agents:</strong>
68 68
     It is not difficult for insurgents to monitor Internet traffic and
69 69
     discover all the hotels and other locations from which people are
70 70
     connecting to known military servers.
... ...
@@ -74,20 +74,20 @@
74 74
     </li>
75 75
     
76 76
     <li><strong>Hidden services:</strong>
77
-    When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
78
-    local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
79
-    reveal the geographic location of any server that is reachable online.  Tor's hidden services capacity allows military command and
77
+    When the Internet was designed by DARPA, its primary purpose was to facilitate distributed, robust communications in case of
78
+    local strikes.  However, some functions must be centralized, such as command and control sites.  By their nature, Internet protocols
79
+    reveal the geographic location of any server that is reachable online.  Tor's <a href="<page docs/hidden-services>">hidden service capability</a> allows military command and
80 80
     control to be physically secure from discovery and takedown.
81 81
     </li>
82 82
     <li><strong>Intelligence gathering:</strong>
83 83
     Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
84
-    to record a military address, thereby revealing the surveillance.
84
+    to record a military address, thereby revealing that the site is under surveillance.
85 85
     </li>
86 86
     </ul>
87 87
     
88 88
     <a name="journalist"></a>
89 89
     <img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media">
90
-    <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
90
+    <h2><a class="anchor" href="#journalist">Journalists and their audiences use Tor</a></h2>
91 91
     <hr>
92 92
     <ul>
93 93
     <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
... ...
@@ -96,8 +96,8 @@
96 96
     </li>
97 97
     <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
98 98
     (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
99
-    safe access to free media.  Tor preserves the ability of persons behind national firewalls or under
100
-    the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
99
+    safe access to free media.  Tor preserves the ability of persons behind national firewalls, or under
100
+    the surveillance of repressive regimes, to obtain a global perspective on controversial topics including democracy,
101 101
     economics and religion.
102 102
     </li>
103 103
     <li><strong>Citizen journalists in China</strong> use Tor to write about
... ...
@@ -124,14 +124,14 @@
124 124
     </li>
125 125
     <li><strong>Sting operations:</strong>
126 126
     Similarly, anonymity allows law officers to engage in online
127
-    &ldquo;undercover &rdquo; operations.  Regardless of how good an
128
-    undercover officer's &ldquo;street cred&rdquo; may be, if the
129
-    communications include IP ranges from police addresses, the cover is blown.
127
+    &ldquo;undercover&rdquo; operations.  Regardless of how good an
128
+    undercover officer's &ldquo;street cred&rdquo; may be, if his
129
+    communications come from IP addresses allocated to the police, his cover is blown.
130 130
     </li>
131 131
     <li><strong>Truly anonymous tip lines:</strong>
132 132
     While online anonymous tip lines are popular, without anonymity
133 133
     software, they are far less useful.  Sophisticated sources understand that
134
-    although a name or email address is not attached to information, server
134
+    although a name or e-mail address is not attached to information, server
135 135
     logs can identify them very quickly.  As a result, tip line web sites that
136 136
     do not encourage anonymity are limiting the sources of their tips.
137 137
     </li>
... ...
@@ -145,7 +145,7 @@
145 145
     <li><strong>Human rights activists use Tor to anonymously report abuses from
146 146
     danger zones.</strong>  Internationally, labor rights workers use Tor and other
147 147
     forms of online and offline anonymity to organize workers in accordance
148
-    with the Universal Declaration of Human Rights. Even though they are within
148
+    with the Universal Declaration of Human Rights. Even though their actions are within
149 149
     the law, it does not mean they are safe. Tor provides the ability to
150 150
     avoid persecution while still raising a voice.
151 151
     </li>
... ...
@@ -155,16 +155,16 @@
155 155
     change rely on Tor for basic privacy during legitimate activities.
156 156
     </li>
157 157
     <li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
158
-    recommends Tor in their report, &ldquo;
159
-    <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
158
+    recommends Tor in their report,
159
+    &ldquo;<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
160 160
     Complicity in Chinese Internet Censorship</a>.&rdquo; The study
161 161
     co-author interviewed Roger Dingledine, Tor project leader,
162
-    on Tor use.  They cover Tor in the section on how to breach the <a
162
+    regarding Tor use.  They cover Tor in the section on how to breach the <a
163 163
     href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great
164
-    Firewall of China,&rdquo;</a> and recommend that human rights workers throughout
165
-    the globe use Tor for &ldquo;secure browsing and communications.&rdquo;
164
+    Firewall of China&rdquo;</a>, and recommend that human rights workers throughout
165
+    the globe use Tor for &ldquo;secure browsing and communications&rdquo;.
166 166
     </li>
167
-    <li> Tor has consulted with and volunteered help to <strong>Amnesty International's
167
+    <li>Tor has consulted with and volunteered help to <strong>Amnesty International's
168 168
     recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
169 169
     See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
170 170
     report</a> on China Internet issues.
... ...
@@ -172,7 +172,7 @@
172 172
     <li><a href="http://www.globalvoicesonline.org">Global Voices</a>
173 173
     recommends Tor, especially for <strong>anonymous blogging</strong>,
174 174
     throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/">
175
-    web site.</a>
175
+    web site</a>.
176 176
     </li>
177 177
     <li>In the US, the Supreme Court recently stripped legal protections from
178 178
     government whistleblowers.  But whistleblowers working for governmental
... ...
@@ -181,8 +181,8 @@
181 181
     </li>
182 182
     <li>A contact of ours who works with a public health nonprofit in
183 183
     Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>,
184
-    mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can
185
-    not afford to complain &mdash; this is the point at which open objection can
184
+    mostly bribes and such.  When that percentage rises steeply, not only are they unable to afford the money, but they
185
+    cannot afford to complain &mdash; this is the point at which open objection can
186 186
     become dangerous.  So his nonprofit has been working to
187 187
     <strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work.
188 188
     </li>
... ...
@@ -191,17 +191,17 @@
191 191
     local residents to <strong>urge reform in the company</strong> that dominated the town's
192 192
     economic and government affairs. She is fully cognizant that the kind of
193 193
     organizing she was doing <strong>could lead to harm or &ldquo;fatal
194
-    accidents.&rdquo;</strong>
194
+    accidents&rdquo;</strong>.
195 195
     </li>
196 196
     <li>In east Asia, some labor organizers use anonymity to <strong>reveal information
197
-    regarding sweatshops</strong> that produce goods for western countries and to
197
+    regarding sweatshops</strong> that produce goods for western countries, and to
198 198
     organize local labor.
199 199
     </li>
200 200
     <li>
201 201
     Tor can help activists avoid government or corporate censorship that hinders organization.
202
-    In one such case, a
203
-    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
204
-    to help organize a strike.
202
+    In one such case,
203
+    <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">a Canadian ISP blocked access to a union website</a>
204
+    used by its own employees to help organize a strike.
205 205
     </li>
206 206
     </ul>
207 207
     
... ...
@@ -228,7 +228,7 @@
228 228
     safer civic engagement</strong>.  Although it's often said that the poor do not use
229 229
     online access for civic engagement, failing to act in their self-interests,
230 230
     it is our hypothesis (based on personal conversations and anecdotal
231
-    information) that it is precisely the &ldquo;permanent record &rdquo;
231
+    information) that it is precisely the &ldquo;permanent record&rdquo;
232 232
     left online that keeps many of the poor from speaking out on the Internet.
233 233
     We hope to show people how to engage more safely online, and then at
234 234
     the end of the year, evaluate how online and offline civic engagement has
... ...
@@ -246,23 +246,23 @@
246 246
     of information on Internet attacks.  Such a repository requires members
247 247
     to report breaches to a central group, who correlates attacks to detect
248 248
     coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
249
-    traffic to such a repository to be able to track where information is
250
-    coming from.  Even though every packet were encrypted, the IP
249
+    traffic to such a repository to where the report is
250
+    sent from.  Even if every packet were encrypted, the IP
251 251
     address would betray the location of a compromised system.  Tor allows
252
-    such repositories of sensitive information to resist compromises.
252
+    such repositories of sensitive information to resist eavesdropping.
253 253
     </li>
254 254
     <li><strong>Seeing your competition as your market does:</strong>
255
-    If you try to check out a competitor's pricing, you may find no
255
+    If you try to check out your competitor's pricing, you may find no
256 256
     information or misleading information on their web site.  This is because
257 257
     their web server may be keyed to detect connections from competitors,
258
-    and block or spread disinformation to your staff.  Tor allows a business
259
-    to view their sector as the general public would view it.
258
+    and block your staff or spread disinformation to them.  Tor allows a business
259
+    to view its sector as the general public would view it.
260 260
     </li>
261 261
     <li><strong>Keeping strategies confidential:</strong>
262 262
     An investment bank, for example, might not want industry snoopers to be
263 263
     able to track what web sites their analysts are watching.  The strategic
264
-    importance of traffic patterns, and the vulnerability of the surveillance
265
-    of such data, is starting to be more widely recognized in several areas
264
+    importance of traffic patterns, and the vulnerability of such data
265
+    to surveillance, is starting to be more widely recognized in several areas
266 266
     of the business world.
267 267
     </li>
268 268
     <li><strong>Accountability:</strong>
... ...
@@ -290,11 +290,11 @@
290 290
     <h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
291 291
     <hr>
292 292
     <ul>
293
-    <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li>
294
-    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li>
293
+    <li>To verify IP-address-based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges to access a site. Tor can be used to verify those configurations by using an IP number outside the company's alloted IP block.</li>
294
+    <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. When a log review reveals a possible violation, Tor can be used to verify the information without putting an exception into corporate security systems.</li>
295 295
     <li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li>
296
-    <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li>
297
-    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li>
296
+    <li>To access Internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the Internet while leaving standard security policies in place.</li>
297
+    <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make Internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations.</li>
298 298
     </ul>
299 299
     
300 300
     <p>
... ...
@@ -310,15 +310,15 @@
310 310
     <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
311 311
     debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
312 312
     <a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
313
-    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
314
-    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
313
+    href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor Project is based on the belief that anonymity is not
314
+    just a good idea some of the time &mdash; it is a requirement for a free and functioning society.  The EFF maintains <a href="http://www.eff.org/issues/anonymity">a good overview of how anonymity was crucial to the founding of the United States</a>.  Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
315 315
     <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
316 316
     <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
317 317
     <a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
318 318
     and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
319 319
     are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
320 320
     the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
321
-    purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the
321
+    purposes (e.g., the majority of Tor relays do not support SMTP, in order to prevent anonymous e-mail spamming), or if you're one of the
322 322
     <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
323 323
     you have better options than Tor. While not dismissing the potential abuses of Tor,
324 324
     this page shows a few of the many important ways anonymity is used online today.</p>
Browse code

We decided to go with HTML in favor of XHTML.

Sebastian Hahn authored on 10/10/2010 03:34:47
Showing 1 changed files
... ...
@@ -13,7 +13,7 @@
13 13
   <div id="maincol">
14 14
 
15 15
     <h1>Inception</h1>
16
-    <hr />
16
+    <hr>
17 17
     <p>
18 18
     Tor was originally designed, implemented, and deployed as a
19 19
     third-generation <a href="http://www.onion-router.net/">onion routing
... ...
@@ -26,9 +26,9 @@
26 26
     </p>
27 27
     
28 28
     <a name="normalusers"></a>
29
-    <img src="$(IMGROOT)/family.jpg" alt="Normal People" />
29
+    <img src="$(IMGROOT)/family.jpg" alt="Normal People">
30 30
     <h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2>