Make dead news report links point to wayback machine versions.
Make dead adopton link point to Wikipedia.
Removed outdated IBB/BBG link and content.
Added SecureDrop to journalist section.
... | ... |
@@ -57,7 +57,7 @@ |
57 | 57 |
</li> |
58 | 58 |
<li><strong>They research sensitive topics.</strong> |
59 | 59 |
There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control, |
60 |
- <a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>, |
|
60 |
+ <a href="https://web.archive.org/web/20120107130815/http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>, |
|
61 | 61 |
or world religions is behind a national firewall. |
62 | 62 |
</li> |
63 | 63 |
<li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity. |
... | ... |
@@ -74,12 +74,10 @@ |
74 | 74 |
tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise |
75 | 75 |
journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety. |
76 | 76 |
</li> |
77 |
- <li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> |
|
78 |
- (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without |
|
79 |
- safe access to free media. Tor preserves the ability of persons behind national firewalls or under |
|
80 |
- the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, |
|
81 |
- economics and religion. |
|
82 |
- </li> |
|
77 |
+ <li>Tor is part of <strong><a href="https://securedrop.org/">SecureDrop</a></strong>, an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. <a href="https://securedrop.org/directory">Many news organizations</a> use SecureDrop, including the Associated Press, The Washington Post, The New York Times, The CBC, ProPublica, Dagbladet, and more. |
|
78 |
+ </li> |
|
79 |
+ <li>Tor preserves the ability of people behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion. |
|
80 |
+ </li> |
|
83 | 81 |
<li><strong>Citizen journalists in China</strong> use Tor to write about |
84 | 82 |
local events to encourage social change and political reform. |
85 | 83 |
</li> |
... | ... |
@@ -179,7 +177,7 @@ |
179 | 177 |
<li> |
180 | 178 |
Tor can help activists avoid government or corporate censorship that hinders organization. |
181 | 179 |
In one such case, a |
182 |
- <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a> |
|
180 |
+ <a href="https://web.archive.org/web/20071015142759/http://www.cbc.ca:80/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a> |
|
183 | 181 |
to help organize a strike. |
184 | 182 |
</li> |
185 | 183 |
</ul> |
... | ... |
@@ -256,7 +254,7 @@ |
256 | 254 |
<hr> |
257 | 255 |
<ul> |
258 | 256 |
<li>Frequently we hear about bloggers who are |
259 |
- <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or |
|
257 |
+ <a href="https://web.archive.org/web/20060910122231/http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or |
|
260 | 258 |
<a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a> |
261 | 259 |
for saying perfectly legal things online, in their blog.</li> |
262 | 260 |
<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li> |
... | ... |
@@ -317,8 +315,8 @@ |
317 | 315 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
318 | 316 |
href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not |
319 | 317 |
just a good idea some of the time — it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
320 |
- <a href="https://www.crimeline.co.za/">police tip lines</a>, |
|
321 |
- <a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
|
318 |
+ <a href="https://www.crimeline.co.za/">police tip lines</a>, |
|
319 |
+ <a href="https://en.wikipedia.org/wiki/Closed_adoption">some adoption services</a>, |
|
322 | 320 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
323 | 321 |
and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there |
324 | 322 |
are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of |
... | ... |
@@ -83,9 +83,8 @@ |
83 | 83 |
<li><strong>Citizen journalists in China</strong> use Tor to write about |
84 | 84 |
local events to encourage social change and political reform. |
85 | 85 |
</li> |
86 |
- <li><strong>Citizens and journalists in <a |
|
87 |
- href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black |
|
88 |
- holes</a></strong> use Tor to research state propaganda and opposing |
|
86 |
+ <li><strong>Citizens and journalists in Internet black |
|
87 |
+ holes</strong> use Tor to research state propaganda and opposing |
|
89 | 88 |
viewpoints, to file stories with non-State controlled media, and to |
90 | 89 |
avoid risking the personal consequences of intellectual curiosity. |
91 | 90 |
</li> |
... | ... |
@@ -280,17 +280,17 @@ |
280 | 280 |
operations, as well as protecting themselves from physical harm. |
281 | 281 |
</li> |
282 | 282 |
|
283 |
- <li><strong>Hidden services:</strong> |
|
284 |
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
285 |
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
286 |
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
287 |
- control to be physically secure from discovery and takedown. |
|
288 |
- </li> |
|
289 |
- <li><strong>Intelligence gathering:</strong> |
|
290 |
- Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
291 |
- to record a military address, thereby revealing the surveillance. |
|
292 |
- </li> |
|
293 |
- </ul> |
|
283 |
+ <li><strong>Onion services:</strong> |
|
284 |
+ When the Internet was designed by DARPA, its primary purpose was to be able |
|
285 |
+ to facilitate distributed, robust communications in case of local strikes. |
|
286 |
+ However, some functions must be centralized, such as command and control |
|
287 |
+ sites. It's the nature of the Internet protocols to reveal the geographic |
|
288 |
+ location of any server that is reachable online. Tor's onion services |
|
289 |
+ capacity allows military command and control to be physically secure from |
|
290 |
+ discovery and takedown. </li> <li><strong>Intelligence gathering:</strong> |
|
291 |
+ Military personnel need to use electronic resources run and monitored by |
|
292 |
+ insurgents. They do not want the webserver logs on an insurgent website to |
|
293 |
+ record a military address, thereby revealing the surveillance. </li> </ul> |
|
294 | 294 |
|
295 | 295 |
<a name="itprofessionals"></a> |
296 | 296 |
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2> |
... | ... |
@@ -29,7 +29,7 @@ |
29 | 29 |
href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good |
30 | 30 |
Tor stories</a>! What do you use Tor for? Why do you need it? What |
31 | 31 |
has Tor done for you? We need your stories.</p> |
32 |
- |
|
32 |
+ |
|
33 | 33 |
<a name="normalusers"></a> |
34 | 34 |
<img src="$(IMGROOT)/family.jpg" alt="Normal People"> |
35 | 35 |
<h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2> |
... | ... |
@@ -64,35 +64,7 @@ |
64 | 64 |
</li> |
65 | 65 |
<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li> |
66 | 66 |
</ul> |
67 |
- |
|
68 |
- <a name="military"></a> |
|
69 |
- <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> |
|
70 |
- <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
|
71 |
- <hr> |
|
72 |
- <ul> |
|
73 |
- |
|
74 |
- <li> |
|
75 |
- <strong>Field agents:</strong> |
|
76 |
- It is not difficult for insurgents to monitor Internet traffic and |
|
77 |
- discover all the hotels and other locations from which people are |
|
78 |
- connecting to known military servers. |
|
79 |
- Military field agents deployed away from home use Tor to |
|
80 |
- mask the sites they are visiting, protecting military interests and |
|
81 |
- operations, as well as protecting themselves from physical harm. |
|
82 |
- </li> |
|
83 |
- |
|
84 |
- <li><strong>Hidden services:</strong> |
|
85 |
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
86 |
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
87 |
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
88 |
- control to be physically secure from discovery and takedown. |
|
89 |
- </li> |
|
90 |
- <li><strong>Intelligence gathering:</strong> |
|
91 |
- Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
92 |
- to record a military address, thereby revealing the surveillance. |
|
93 |
- </li> |
|
94 |
- </ul> |
|
95 |
- |
|
67 |
+ |
|
96 | 68 |
<a name="journalist"></a> |
97 | 69 |
<img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media"> |
98 | 70 |
<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> |
... | ... |
@@ -118,7 +90,7 @@ |
118 | 90 |
avoid risking the personal consequences of intellectual curiosity. |
119 | 91 |
</li> |
120 | 92 |
</ul> |
121 |
- |
|
93 |
+ |
|
122 | 94 |
<a name="lawenforcement"></a> |
123 | 95 |
<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2> |
124 | 96 |
<hr> |
... | ... |
@@ -144,7 +116,7 @@ |
144 | 116 |
do not encourage anonymity are limiting the sources of their tips. |
145 | 117 |
</li> |
146 | 118 |
</ul> |
147 |
- |
|
119 |
+ |
|
148 | 120 |
<a name="activists"></a> |
149 | 121 |
<img src="$(IMGROOT)/activists.jpg" alt="Activists & Whistleblowers"> |
150 | 122 |
<h2><a class="anchor" href="#activists">Activists & Whistleblowers use Tor</a></h2> |
... | ... |
@@ -212,7 +184,7 @@ |
212 | 184 |
to help organize a strike. |
213 | 185 |
</li> |
214 | 186 |
</ul> |
215 |
- |
|
187 |
+ |
|
216 | 188 |
<a name="spotlight"></a> |
217 | 189 |
<h2><a class="anchor" href="#spotlight">High & low profile people use Tor</a></h2> |
218 | 190 |
<hr> |
... | ... |
@@ -241,7 +213,7 @@ |
241 | 213 |
this continuing into the future. |
242 | 214 |
</li> |
243 | 215 |
</ul> |
244 |
- |
|
216 |
+ |
|
245 | 217 |
<a name="executives"></a> |
246 | 218 |
<img src="$(IMGROOT)/consumers.jpg" alt="Businesses"> |
247 | 219 |
<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2> |
... | ... |
@@ -279,7 +251,7 @@ |
279 | 251 |
into whistleblowing. |
280 | 252 |
</li> |
281 | 253 |
</ul> |
282 |
- |
|
254 |
+ |
|
283 | 255 |
<a name="bloggers"></a> |
284 | 256 |
<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2> |
285 | 257 |
<hr> |
... | ... |
@@ -291,7 +263,35 @@ |
291 | 263 |
<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li> |
292 | 264 |
<li>Global Voices maintains a <a href="http://advocacy.globalvoicesonline.org/projects/guide/">guide to anonymous blogging with Wordpress and Tor</a>.</li> |
293 | 265 |
</ul> |
294 |
- |
|
266 |
+ |
|
267 |
+ <a name="military"></a> |
|
268 |
+ <img src="$(IMGROOT)/military.jpg" alt="Military and Law Enforcement"> |
|
269 |
+ <h2><a class="anchor" href="#military">Militaries use Tor</a></h2> |
|
270 |
+ <hr> |
|
271 |
+ <ul> |
|
272 |
+ |
|
273 |
+ <li> |
|
274 |
+ <strong>Field agents:</strong> |
|
275 |
+ It is not difficult for insurgents to monitor Internet traffic and |
|
276 |
+ discover all the hotels and other locations from which people are |
|
277 |
+ connecting to known military servers. |
|
278 |
+ Military field agents deployed away from home use Tor to |
|
279 |
+ mask the sites they are visiting, protecting military interests and |
|
280 |
+ operations, as well as protecting themselves from physical harm. |
|
281 |
+ </li> |
|
282 |
+ |
|
283 |
+ <li><strong>Hidden services:</strong> |
|
284 |
+ When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
285 |
+ local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
286 |
+ reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
287 |
+ control to be physically secure from discovery and takedown. |
|
288 |
+ </li> |
|
289 |
+ <li><strong>Intelligence gathering:</strong> |
|
290 |
+ Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
|
291 |
+ to record a military address, thereby revealing the surveillance. |
|
292 |
+ </li> |
|
293 |
+ </ul> |
|
294 |
+ |
|
295 | 295 |
<a name="itprofessionals"></a> |
296 | 296 |
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2> |
297 | 297 |
<hr> |
... | ... |
@@ -302,7 +302,7 @@ |
302 | 302 |
<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li> |
303 | 303 |
<li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li> |
304 | 304 |
</ul> |
305 |
- |
|
305 |
+ |
|
306 | 306 |
<p> |
307 | 307 |
Please do send us your success stories. They are very important because |
308 | 308 |
Tor provides anonymity. While it is thrilling to speculate about <a |
... | ... |
@@ -312,7 +312,7 @@ |
312 | 312 |
counterproductive. For example, we talked to an FBI officer who |
313 | 313 |
explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide |
314 | 314 |
details or mention his name.</p> |
315 |
- |
|
315 |
+ |
|
316 | 316 |
<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous |
317 | 317 |
debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
318 | 318 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
... | ... |
@@ -57,7 +57,7 @@ |
57 | 57 |
</li> |
58 | 58 |
<li><strong>They research sensitive topics.</strong> |
59 | 59 |
There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control, |
60 |
- <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>, |
|
60 |
+ <a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>, |
|
61 | 61 |
or world religions is behind a national firewall. |
62 | 62 |
</li> |
63 | 63 |
<li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity. |
... | ... |
@@ -60,8 +60,9 @@ |
60 | 60 |
<a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>, |
61 | 61 |
or world religions is behind a national firewall. |
62 | 62 |
</li> |
63 |
-<li><strong>They skirt surveillance.</strong> Even using the web for harmless tasks can sometimes <a href="http://www.theatlanticwire.com/national/2013/08/government-knocking-doors-because-google-searches/67864/">raise red flags</a> for suspicious observers. When the 2013 <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">disclosures of mass surveillance</a> became public, internal NSA documents revealed Tor to be <a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">an effective surveillance circumvention tool</a>.</li> |
|
64 |
-<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="http://techcrunch.com/2013/06/01/as-anti-government-protests-erupt-in-istanbul-facebook-and-twitter-appear-suddenly-throttled/">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li> |
|
63 |
+<li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity. |
|
64 |
+</li> |
|
65 |
+<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="https://en.wikipedia.org/wiki/Censorship_of_Facebook">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li> |
|
65 | 66 |
</ul> |
66 | 67 |
|
67 | 68 |
<a name="military"></a> |
... | ... |
@@ -60,6 +60,8 @@ |
60 | 60 |
<a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>, |
61 | 61 |
or world religions is behind a national firewall. |
62 | 62 |
</li> |
63 |
+<li><strong>They skirt surveillance.</strong> Even using the web for harmless tasks can sometimes <a href="http://www.theatlanticwire.com/national/2013/08/government-knocking-doors-because-google-searches/67864/">raise red flags</a> for suspicious observers. When the 2013 <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">disclosures of mass surveillance</a> became public, internal NSA documents revealed Tor to be <a href="http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document">an effective surveillance circumvention tool</a>.</li> |
|
64 |
+<li><strong>They circumvent censorship.</strong> If you live in a country that has ever <a href="http://techcrunch.com/2013/06/01/as-anti-government-protests-erupt-in-istanbul-facebook-and-twitter-appear-suddenly-throttled/">blocked Facebook</a> or <a href="https://en.wikipedia.org/wiki/Censorship_of_YouTube">Youtube</a>, you might need to use Tor to get basic internet functionality. </li> |
|
63 | 65 |
</ul> |
64 | 66 |
|
65 | 67 |
<a name="military"></a> |
... | ... |
@@ -315,7 +315,7 @@ |
315 | 315 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
316 | 316 |
href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not |
317 | 317 |
just a good idea some of the time — it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
318 |
- <a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
|
318 |
+ <a href="https://www.crimeline.co.za/">police tip lines</a>, |
|
319 | 319 |
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
320 | 320 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
321 | 321 |
and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there |
... | ... |
@@ -155,7 +155,7 @@ |
155 | 155 |
avoid persecution while still raising a voice. |
156 | 156 |
</li> |
157 | 157 |
<li>When groups such as the <strong>Friends Service Committee and environmental |
158 |
- groups are increasingly <a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a> |
|
158 |
+ groups are increasingly <a href="http://www.afsc.org/story/iowans-rally-defense-civil-liberties">falling under surveillance</a> |
|
159 | 159 |
in the United States</strong> under laws meant to protect against terrorism, many peaceful agents of |
160 | 160 |
change rely on Tor for basic privacy during legitimate activities. |
161 | 161 |
</li> |
... | ... |
@@ -170,8 +170,8 @@ |
170 | 170 |
the globe use Tor for “secure browsing and communications.” |
171 | 171 |
</li> |
172 | 172 |
<li> Tor has consulted with and volunteered help to <strong>Amnesty International's |
173 |
- recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>. |
|
174 |
- See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full |
|
173 |
+ past <a href="http://web.archive.org/web/20090323052228/http://irrepressible.info/">corporate responsibility campaign</a></strong>. |
|
174 |
+ See also their 2006 <a href="http://web.archive.org/web/20090530164605/http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full |
|
175 | 175 |
report</a> on China Internet issues. |
176 | 176 |
</li> |
177 | 177 |
<li><a href="http://www.globalvoicesonline.org">Global Voices</a> |
... | ... |
@@ -297,7 +297,7 @@ |
297 | 297 |
<li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li> |
298 | 298 |
<li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li> |
299 | 299 |
<li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li> |
300 |
- <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li> |
|
300 |
+ <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations. </li> |
|
301 | 301 |
</ul> |
302 | 302 |
|
303 | 303 |
<p> |
... | ... |
@@ -227,17 +227,15 @@ |
227 | 227 |
write were to get back to your boss, would you lose your job? If your |
228 | 228 |
social worker read about your opinion of the system, would she treat |
229 | 229 |
you differently? Anonymity gives a voice to the voiceless. |
230 |
- To support this, <strong>Tor currently has an open Americorps/VISTA position</strong> pending. This |
|
231 |
- government grant will cover a full time stipend for a volunteer to create |
|
232 |
- curricula to <strong>show low-income populations how to use anonymity online for |
|
233 |
- safer civic engagement</strong>. Although it's often said that the poor do not use |
|
234 |
- online access for civic engagement, failing to act in their self-interests, |
|
235 |
- it is our hypothesis (based on personal conversations and anecdotal |
|
236 |
- information) that it is precisely the “permanent record ” |
|
237 |
- left online that keeps many of the poor from speaking out on the Internet. |
|
238 |
- We hope to show people how to engage more safely online, and then at |
|
239 |
- the end of the year, evaluate how online and offline civic engagement has |
|
240 |
- changed, and how the population sees this continuing into the future. |
|
230 |
+ Although it's often said that the poor do not use online access |
|
231 |
+ for civic engagement, failing to act in their self-interests, it |
|
232 |
+ is our hypothesis (based on personal conversations and anecdotal |
|
233 |
+ information) that it is precisely the “permanent record |
|
234 |
+ ” left online that keeps many of the poor from speaking out |
|
235 |
+ on the Internet. We hope to show people how to engage more safely |
|
236 |
+ online, and then at the end of the year, evaluate how online and |
|
237 |
+ offline civic engagement has changed, and how the population sees |
|
238 |
+ this continuing into the future. |
|
241 | 239 |
</li> |
242 | 240 |
</ul> |
243 | 241 |
|
... | ... |
@@ -24,6 +24,11 @@ |
24 | 24 |
enforcement officers, activists, and many others. Here are some of |
25 | 25 |
the specific uses we've seen or recommend. |
26 | 26 |
</p> |
27 |
+ |
|
28 |
+ <p>We need your <a |
|
29 |
+ href="https://blog.torproject.org/blog/we-need-your-good-tor-stories">good |
|
30 |
+ Tor stories</a>! What do you use Tor for? Why do you need it? What |
|
31 |
+ has Tor done for you? We need your stories.</p> |
|
27 | 32 |
|
28 | 33 |
<a name="normalusers"></a> |
29 | 34 |
<img src="$(IMGROOT)/family.jpg" alt="Normal People"> |
... | ... |
@@ -18,7 +18,7 @@ |
18 | 18 |
Tor was originally designed, implemented, and deployed as a |
19 | 19 |
third-generation <a href="http://www.onion-router.net/">onion routing |
20 | 20 |
project of the Naval Research Laboratory</a>. It was originally |
21 |
- developed with the U.S. Navy in mind, primarily for the purpose of |
|
21 |
+ developed with the U.S. Navy in mind, for the primary purpose of |
|
22 | 22 |
protecting government communications. Today, it is used every day |
23 | 23 |
for a wide variety of purposes by the military, journalists, law |
24 | 24 |
enforcement officers, activists, and many others. Here are some of |
... | ... |
@@ -31,15 +31,15 @@ |
31 | 31 |
<hr> |
32 | 32 |
<ul> |
33 | 33 |
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
34 |
- Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">sell |
|
35 |
- your Internet browsing records</a> to marketers and anyone else |
|
34 |
+ Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month"> |
|
35 |
+ sell your Internet browsing records</a> to marketers or anyone else |
|
36 | 36 |
willing to pay for it. ISPs typically say that |
37 | 37 |
they anonymize the data by not providing personally identifiable information, but |
38 | 38 |
<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this |
39 | 39 |
has proven incorrect</a>. A full record of every site you visit, the text of every search you perform, and potentially |
40 | 40 |
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information. |
41 | 41 |
</li> |
42 |
- <li><strong>They protect their communications from irresponsible corporations.</strong> |
|
42 |
+ <li><strong> They protect their communications from irresponsible corporations.</strong> |
|
43 | 43 |
All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of |
44 | 44 |
private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to |
45 | 45 |
<a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>, |
... | ... |
@@ -47,7 +47,7 @@ |
47 | 47 |
</li> |
48 | 48 |
<li><strong>They protect their children online.</strong> |
49 | 49 |
You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply |
50 |
- by not concealing their IP address. Increasingly, IP addresses can literally be <a href="http://whatismyipaddress.com/">mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet. |
|
50 |
+ by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet. |
|
51 | 51 |
In the United States, the government is pushing to make this mapping increasingly precise. |
52 | 52 |
</li> |
53 | 53 |
<li><strong>They research sensitive topics.</strong> |
... | ... |
@@ -74,20 +74,20 @@ |
74 | 74 |
</li> |
75 | 75 |
|
76 | 76 |
<li><strong>Hidden services:</strong> |
77 |
- When the Internet was designed by DARPA, its primary purpose was to facilitate distributed, robust communications in case of |
|
78 |
- local strikes. However, some functions must be centralized, such as command and control sites. By their nature, Internet protocols |
|
79 |
- reveal the geographic location of any server that is reachable online. Tor's <a href="<page docs/hidden-services>">hidden service capability</a> allows military command and |
|
77 |
+ When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
78 |
+ local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
79 |
+ reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
80 | 80 |
control to be physically secure from discovery and takedown. |
81 | 81 |
</li> |
82 | 82 |
<li><strong>Intelligence gathering:</strong> |
83 | 83 |
Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
84 |
- to record a military address, thereby revealing that the site is under surveillance. |
|
84 |
+ to record a military address, thereby revealing the surveillance. |
|
85 | 85 |
</li> |
86 | 86 |
</ul> |
87 | 87 |
|
88 | 88 |
<a name="journalist"></a> |
89 | 89 |
<img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media"> |
90 |
- <h2><a class="anchor" href="#journalist">Journalists and their audiences use Tor</a></h2> |
|
90 |
+ <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> |
|
91 | 91 |
<hr> |
92 | 92 |
<ul> |
93 | 93 |
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
... | ... |
@@ -96,8 +96,8 @@ |
96 | 96 |
</li> |
97 | 97 |
<li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> |
98 | 98 |
(Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without |
99 |
- safe access to free media. Tor preserves the ability of persons behind national firewalls, or under |
|
100 |
- the surveillance of repressive regimes, to obtain a global perspective on controversial topics including democracy, |
|
99 |
+ safe access to free media. Tor preserves the ability of persons behind national firewalls or under |
|
100 |
+ the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, |
|
101 | 101 |
economics and religion. |
102 | 102 |
</li> |
103 | 103 |
<li><strong>Citizen journalists in China</strong> use Tor to write about |
... | ... |
@@ -124,14 +124,14 @@ |
124 | 124 |
</li> |
125 | 125 |
<li><strong>Sting operations:</strong> |
126 | 126 |
Similarly, anonymity allows law officers to engage in online |
127 |
- “undercover” operations. Regardless of how good an |
|
128 |
- undercover officer's “street cred” may be, if his |
|
129 |
- communications come from IP addresses allocated to the police, his cover is blown. |
|
127 |
+ “undercover ” operations. Regardless of how good an |
|
128 |
+ undercover officer's “street cred” may be, if the |
|
129 |
+ communications include IP ranges from police addresses, the cover is blown. |
|
130 | 130 |
</li> |
131 | 131 |
<li><strong>Truly anonymous tip lines:</strong> |
132 | 132 |
While online anonymous tip lines are popular, without anonymity |
133 | 133 |
software, they are far less useful. Sophisticated sources understand that |
134 |
- although a name or e-mail address is not attached to information, server |
|
134 |
+ although a name or email address is not attached to information, server |
|
135 | 135 |
logs can identify them very quickly. As a result, tip line web sites that |
136 | 136 |
do not encourage anonymity are limiting the sources of their tips. |
137 | 137 |
</li> |
... | ... |
@@ -145,7 +145,7 @@ |
145 | 145 |
<li><strong>Human rights activists use Tor to anonymously report abuses from |
146 | 146 |
danger zones.</strong> Internationally, labor rights workers use Tor and other |
147 | 147 |
forms of online and offline anonymity to organize workers in accordance |
148 |
- with the Universal Declaration of Human Rights. Even though their actions are within |
|
148 |
+ with the Universal Declaration of Human Rights. Even though they are within |
|
149 | 149 |
the law, it does not mean they are safe. Tor provides the ability to |
150 | 150 |
avoid persecution while still raising a voice. |
151 | 151 |
</li> |
... | ... |
@@ -155,16 +155,16 @@ |
155 | 155 |
change rely on Tor for basic privacy during legitimate activities. |
156 | 156 |
</li> |
157 | 157 |
<li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong> |
158 |
- recommends Tor in their report, |
|
159 |
- “<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate |
|
158 |
+ recommends Tor in their report, “ |
|
159 |
+ <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate |
|
160 | 160 |
Complicity in Chinese Internet Censorship</a>.” The study |
161 | 161 |
co-author interviewed Roger Dingledine, Tor project leader, |
162 |
- regarding Tor use. They cover Tor in the section on how to breach the <a |
|
162 |
+ on Tor use. They cover Tor in the section on how to breach the <a |
|
163 | 163 |
href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great |
164 |
- Firewall of China”</a>, and recommend that human rights workers throughout |
|
165 |
- the globe use Tor for “secure browsing and communications”. |
|
164 |
+ Firewall of China,”</a> and recommend that human rights workers throughout |
|
165 |
+ the globe use Tor for “secure browsing and communications.” |
|
166 | 166 |
</li> |
167 |
- <li>Tor has consulted with and volunteered help to <strong>Amnesty International's |
|
167 |
+ <li> Tor has consulted with and volunteered help to <strong>Amnesty International's |
|
168 | 168 |
recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>. |
169 | 169 |
See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full |
170 | 170 |
report</a> on China Internet issues. |
... | ... |
@@ -172,7 +172,7 @@ |
172 | 172 |
<li><a href="http://www.globalvoicesonline.org">Global Voices</a> |
173 | 173 |
recommends Tor, especially for <strong>anonymous blogging</strong>, |
174 | 174 |
throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/"> |
175 |
- web site</a>. |
|
175 |
+ web site.</a> |
|
176 | 176 |
</li> |
177 | 177 |
<li>In the US, the Supreme Court recently stripped legal protections from |
178 | 178 |
government whistleblowers. But whistleblowers working for governmental |
... | ... |
@@ -181,8 +181,8 @@ |
181 | 181 |
</li> |
182 | 182 |
<li>A contact of ours who works with a public health nonprofit in |
183 | 183 |
Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>, |
184 |
- mostly bribes and such. When that percentage rises steeply, not only are they unable to afford the money, but they |
|
185 |
- cannot afford to complain — this is the point at which open objection can |
|
184 |
+ mostly bribes and such. When that percentage rises steeply, not only can they not afford the money, but they can |
|
185 |
+ not afford to complain — this is the point at which open objection can |
|
186 | 186 |
become dangerous. So his nonprofit has been working to |
187 | 187 |
<strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work. |
188 | 188 |
</li> |
... | ... |
@@ -191,17 +191,17 @@ |
191 | 191 |
local residents to <strong>urge reform in the company</strong> that dominated the town's |
192 | 192 |
economic and government affairs. She is fully cognizant that the kind of |
193 | 193 |
organizing she was doing <strong>could lead to harm or “fatal |
194 |
- accidents”</strong>. |
|
194 |
+ accidents.”</strong> |
|
195 | 195 |
</li> |
196 | 196 |
<li>In east Asia, some labor organizers use anonymity to <strong>reveal information |
197 |
- regarding sweatshops</strong> that produce goods for western countries, and to |
|
197 |
+ regarding sweatshops</strong> that produce goods for western countries and to |
|
198 | 198 |
organize local labor. |
199 | 199 |
</li> |
200 | 200 |
<li> |
201 | 201 |
Tor can help activists avoid government or corporate censorship that hinders organization. |
202 |
- In one such case, |
|
203 |
- <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">a Canadian ISP blocked access to a union website</a> |
|
204 |
- used by its own employees to help organize a strike. |
|
202 |
+ In one such case, a |
|
203 |
+ <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a> |
|
204 |
+ to help organize a strike. |
|
205 | 205 |
</li> |
206 | 206 |
</ul> |
207 | 207 |
|
... | ... |
@@ -228,7 +228,7 @@ |
228 | 228 |
safer civic engagement</strong>. Although it's often said that the poor do not use |
229 | 229 |
online access for civic engagement, failing to act in their self-interests, |
230 | 230 |
it is our hypothesis (based on personal conversations and anecdotal |
231 |
- information) that it is precisely the “permanent record” |
|
231 |
+ information) that it is precisely the “permanent record ” |
|
232 | 232 |
left online that keeps many of the poor from speaking out on the Internet. |
233 | 233 |
We hope to show people how to engage more safely online, and then at |
234 | 234 |
the end of the year, evaluate how online and offline civic engagement has |
... | ... |
@@ -246,23 +246,23 @@ |
246 | 246 |
of information on Internet attacks. Such a repository requires members |
247 | 247 |
to report breaches to a central group, who correlates attacks to detect |
248 | 248 |
coordinated patterns and send out alerts. But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming |
249 |
- traffic to such a repository to where the report is |
|
250 |
- sent from. Even if every packet were encrypted, the IP |
|
249 |
+ traffic to such a repository to be able to track where information is |
|
250 |
+ coming from. Even though every packet were encrypted, the IP |
|
251 | 251 |
address would betray the location of a compromised system. Tor allows |
252 |
- such repositories of sensitive information to resist eavesdropping. |
|
252 |
+ such repositories of sensitive information to resist compromises. |
|
253 | 253 |
</li> |
254 | 254 |
<li><strong>Seeing your competition as your market does:</strong> |
255 |
- If you try to check out your competitor's pricing, you may find no |
|
255 |
+ If you try to check out a competitor's pricing, you may find no |
|
256 | 256 |
information or misleading information on their web site. This is because |
257 | 257 |
their web server may be keyed to detect connections from competitors, |
258 |
- and block your staff or spread disinformation to them. Tor allows a business |
|
259 |
- to view its sector as the general public would view it. |
|
258 |
+ and block or spread disinformation to your staff. Tor allows a business |
|
259 |
+ to view their sector as the general public would view it. |
|
260 | 260 |
</li> |
261 | 261 |
<li><strong>Keeping strategies confidential:</strong> |
262 | 262 |
An investment bank, for example, might not want industry snoopers to be |
263 | 263 |
able to track what web sites their analysts are watching. The strategic |
264 |
- importance of traffic patterns, and the vulnerability of such data |
|
265 |
- to surveillance, is starting to be more widely recognized in several areas |
|
264 |
+ importance of traffic patterns, and the vulnerability of the surveillance |
|
265 |
+ of such data, is starting to be more widely recognized in several areas |
|
266 | 266 |
of the business world. |
267 | 267 |
</li> |
268 | 268 |
<li><strong>Accountability:</strong> |
... | ... |
@@ -290,11 +290,11 @@ |
290 | 290 |
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2> |
291 | 291 |
<hr> |
292 | 292 |
<ul> |
293 |
- <li>To verify IP-address-based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges to access a site. Tor can be used to verify those configurations by using an IP number outside the company's alloted IP block.</li> |
|
294 |
- <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. When a log review reveals a possible violation, Tor can be used to verify the information without putting an exception into corporate security systems.</li> |
|
293 |
+ <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li> |
|
294 |
+ <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li> |
|
295 | 295 |
<li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li> |
296 |
- <li>To access Internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the Internet while leaving standard security policies in place.</li> |
|
297 |
- <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make Internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations.</li> |
|
296 |
+ <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li> |
|
297 |
+ <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li> |
|
298 | 298 |
</ul> |
299 | 299 |
|
300 | 300 |
<p> |
... | ... |
@@ -310,15 +310,15 @@ |
310 | 310 |
<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous |
311 | 311 |
debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
312 | 312 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
313 |
- href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor Project is based on the belief that anonymity is not |
|
314 |
- just a good idea some of the time — it is a requirement for a free and functioning society. The EFF maintains <a href="http://www.eff.org/issues/anonymity">a good overview of how anonymity was crucial to the founding of the United States</a>. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
313 |
+ href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not |
|
314 |
+ just a good idea some of the time — it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
315 | 315 |
<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
316 | 316 |
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
317 | 317 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
318 | 318 |
and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there |
319 | 319 |
are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of |
320 | 320 |
the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
321 |
- purposes (e.g., the majority of Tor relays do not support SMTP, in order to prevent anonymous e-mail spamming), or if you're one of the |
|
321 |
+ purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the |
|
322 | 322 |
<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
323 | 323 |
you have better options than Tor. While not dismissing the potential abuses of Tor, |
324 | 324 |
this page shows a few of the many important ways anonymity is used online today.</p> |
arma will probably want to double-check these :-)
... | ... |
@@ -18,7 +18,7 @@ |
18 | 18 |
Tor was originally designed, implemented, and deployed as a |
19 | 19 |
third-generation <a href="http://www.onion-router.net/">onion routing |
20 | 20 |
project of the Naval Research Laboratory</a>. It was originally |
21 |
- developed with the U.S. Navy in mind, for the primary purpose of |
|
21 |
+ developed with the U.S. Navy in mind, primarily for the purpose of |
|
22 | 22 |
protecting government communications. Today, it is used every day |
23 | 23 |
for a wide variety of purposes by the military, journalists, law |
24 | 24 |
enforcement officers, activists, and many others. Here are some of |
... | ... |
@@ -31,15 +31,15 @@ |
31 | 31 |
<hr> |
32 | 32 |
<ul> |
33 | 33 |
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong> |
34 |
- Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month"> |
|
35 |
- sell your Internet browsing records</a> to marketers or anyone else |
|
34 |
+ Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">sell |
|
35 |
+ your Internet browsing records</a> to marketers and anyone else |
|
36 | 36 |
willing to pay for it. ISPs typically say that |
37 | 37 |
they anonymize the data by not providing personally identifiable information, but |
38 | 38 |
<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this |
39 | 39 |
has proven incorrect</a>. A full record of every site you visit, the text of every search you perform, and potentially |
40 | 40 |
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information. |
41 | 41 |
</li> |
42 |
- <li><strong> They protect their communications from irresponsible corporations.</strong> |
|
42 |
+ <li><strong>They protect their communications from irresponsible corporations.</strong> |
|
43 | 43 |
All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of |
44 | 44 |
private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to |
45 | 45 |
<a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>, |
... | ... |
@@ -47,7 +47,7 @@ |
47 | 47 |
</li> |
48 | 48 |
<li><strong>They protect their children online.</strong> |
49 | 49 |
You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply |
50 |
- by not concealing their IP address. Increasingly, IP addresses can be <a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet. |
|
50 |
+ by not concealing their IP address. Increasingly, IP addresses can literally be <a href="http://whatismyipaddress.com/">mapped to a city or even street location</a>, and can <a href="http://whatsmyip.org/more/">reveal other information</a> about how you are connecting to the Internet. |
|
51 | 51 |
In the United States, the government is pushing to make this mapping increasingly precise. |
52 | 52 |
</li> |
53 | 53 |
<li><strong>They research sensitive topics.</strong> |
... | ... |
@@ -64,7 +64,7 @@ |
64 | 64 |
<ul> |
65 | 65 |
|
66 | 66 |
<li> |
67 |
- <strong>Field Agents:</strong> |
|
67 |
+ <strong>Field agents:</strong> |
|
68 | 68 |
It is not difficult for insurgents to monitor Internet traffic and |
69 | 69 |
discover all the hotels and other locations from which people are |
70 | 70 |
connecting to known military servers. |
... | ... |
@@ -74,20 +74,20 @@ |
74 | 74 |
</li> |
75 | 75 |
|
76 | 76 |
<li><strong>Hidden services:</strong> |
77 |
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of |
|
78 |
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to |
|
79 |
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and |
|
77 |
+ When the Internet was designed by DARPA, its primary purpose was to facilitate distributed, robust communications in case of |
|
78 |
+ local strikes. However, some functions must be centralized, such as command and control sites. By their nature, Internet protocols |
|
79 |
+ reveal the geographic location of any server that is reachable online. Tor's <a href="<page docs/hidden-services>">hidden service capability</a> allows military command and |
|
80 | 80 |
control to be physically secure from discovery and takedown. |
81 | 81 |
</li> |
82 | 82 |
<li><strong>Intelligence gathering:</strong> |
83 | 83 |
Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website |
84 |
- to record a military address, thereby revealing the surveillance. |
|
84 |
+ to record a military address, thereby revealing that the site is under surveillance. |
|
85 | 85 |
</li> |
86 | 86 |
</ul> |
87 | 87 |
|
88 | 88 |
<a name="journalist"></a> |
89 | 89 |
<img src="$(IMGROOT)/media.jpg" alt="Journalists and the Media"> |
90 |
- <h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2> |
|
90 |
+ <h2><a class="anchor" href="#journalist">Journalists and their audiences use Tor</a></h2> |
|
91 | 91 |
<hr> |
92 | 92 |
<ul> |
93 | 93 |
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong> |
... | ... |
@@ -96,8 +96,8 @@ |
96 | 96 |
</li> |
97 | 97 |
<li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong> |
98 | 98 |
(Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without |
99 |
- safe access to free media. Tor preserves the ability of persons behind national firewalls or under |
|
100 |
- the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, |
|
99 |
+ safe access to free media. Tor preserves the ability of persons behind national firewalls, or under |
|
100 |
+ the surveillance of repressive regimes, to obtain a global perspective on controversial topics including democracy, |
|
101 | 101 |
economics and religion. |
102 | 102 |
</li> |
103 | 103 |
<li><strong>Citizen journalists in China</strong> use Tor to write about |
... | ... |
@@ -124,14 +124,14 @@ |
124 | 124 |
</li> |
125 | 125 |
<li><strong>Sting operations:</strong> |
126 | 126 |
Similarly, anonymity allows law officers to engage in online |
127 |
- “undercover ” operations. Regardless of how good an |
|
128 |
- undercover officer's “street cred” may be, if the |
|
129 |
- communications include IP ranges from police addresses, the cover is blown. |
|
127 |
+ “undercover” operations. Regardless of how good an |
|
128 |
+ undercover officer's “street cred” may be, if his |
|
129 |
+ communications come from IP addresses allocated to the police, his cover is blown. |
|
130 | 130 |
</li> |
131 | 131 |
<li><strong>Truly anonymous tip lines:</strong> |
132 | 132 |
While online anonymous tip lines are popular, without anonymity |
133 | 133 |
software, they are far less useful. Sophisticated sources understand that |
134 |
- although a name or email address is not attached to information, server |
|
134 |
+ although a name or e-mail address is not attached to information, server |
|
135 | 135 |
logs can identify them very quickly. As a result, tip line web sites that |
136 | 136 |
do not encourage anonymity are limiting the sources of their tips. |
137 | 137 |
</li> |
... | ... |
@@ -145,7 +145,7 @@ |
145 | 145 |
<li><strong>Human rights activists use Tor to anonymously report abuses from |
146 | 146 |
danger zones.</strong> Internationally, labor rights workers use Tor and other |
147 | 147 |
forms of online and offline anonymity to organize workers in accordance |
148 |
- with the Universal Declaration of Human Rights. Even though they are within |
|
148 |
+ with the Universal Declaration of Human Rights. Even though their actions are within |
|
149 | 149 |
the law, it does not mean they are safe. Tor provides the ability to |
150 | 150 |
avoid persecution while still raising a voice. |
151 | 151 |
</li> |
... | ... |
@@ -155,16 +155,16 @@ |
155 | 155 |
change rely on Tor for basic privacy during legitimate activities. |
156 | 156 |
</li> |
157 | 157 |
<li><strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong> |
158 |
- recommends Tor in their report, “ |
|
159 |
- <a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate |
|
158 |
+ recommends Tor in their report, |
|
159 |
+ “<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate |
|
160 | 160 |
Complicity in Chinese Internet Censorship</a>.” The study |
161 | 161 |
co-author interviewed Roger Dingledine, Tor project leader, |
162 |
- on Tor use. They cover Tor in the section on how to breach the <a |
|
162 |
+ regarding Tor use. They cover Tor in the section on how to breach the <a |
|
163 | 163 |
href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great |
164 |
- Firewall of China,”</a> and recommend that human rights workers throughout |
|
165 |
- the globe use Tor for “secure browsing and communications.” |
|
164 |
+ Firewall of China”</a>, and recommend that human rights workers throughout |
|
165 |
+ the globe use Tor for “secure browsing and communications”. |
|
166 | 166 |
</li> |
167 |
- <li> Tor has consulted with and volunteered help to <strong>Amnesty International's |
|
167 |
+ <li>Tor has consulted with and volunteered help to <strong>Amnesty International's |
|
168 | 168 |
recent <a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>. |
169 | 169 |
See also their <a href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full |
170 | 170 |
report</a> on China Internet issues. |
... | ... |
@@ -172,7 +172,7 @@ |
172 | 172 |
<li><a href="http://www.globalvoicesonline.org">Global Voices</a> |
173 | 173 |
recommends Tor, especially for <strong>anonymous blogging</strong>, |
174 | 174 |
throughout their <a href="http://advocacy.globalvoicesonline.org/projects/guide/"> |
175 |
- web site.</a> |
|
175 |
+ web site</a>. |
|
176 | 176 |
</li> |
177 | 177 |
<li>In the US, the Supreme Court recently stripped legal protections from |
178 | 178 |
government whistleblowers. But whistleblowers working for governmental |
... | ... |
@@ -181,8 +181,8 @@ |
181 | 181 |
</li> |
182 | 182 |
<li>A contact of ours who works with a public health nonprofit in |
183 | 183 |
Africa reports that his nonprofit <strong>must budget 10% to cover various sorts of corruption</strong>, |
184 |
- mostly bribes and such. When that percentage rises steeply, not only can they not afford the money, but they can |
|
185 |
- not afford to complain — this is the point at which open objection can |
|
184 |
+ mostly bribes and such. When that percentage rises steeply, not only are they unable to afford the money, but they |
|
185 |
+ cannot afford to complain — this is the point at which open objection can |
|
186 | 186 |
become dangerous. So his nonprofit has been working to |
187 | 187 |
<strong>use Tor to safely whistleblow on government corruption</strong> in order to continue their work. |
188 | 188 |
</li> |
... | ... |
@@ -191,17 +191,17 @@ |
191 | 191 |
local residents to <strong>urge reform in the company</strong> that dominated the town's |
192 | 192 |
economic and government affairs. She is fully cognizant that the kind of |
193 | 193 |
organizing she was doing <strong>could lead to harm or “fatal |
194 |
- accidents.”</strong> |
|
194 |
+ accidents”</strong>. |
|
195 | 195 |
</li> |
196 | 196 |
<li>In east Asia, some labor organizers use anonymity to <strong>reveal information |
197 |
- regarding sweatshops</strong> that produce goods for western countries and to |
|
197 |
+ regarding sweatshops</strong> that produce goods for western countries, and to |
|
198 | 198 |
organize local labor. |
199 | 199 |
</li> |
200 | 200 |
<li> |
201 | 201 |
Tor can help activists avoid government or corporate censorship that hinders organization. |
202 |
- In one such case, a |
|
203 |
- <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a> |
|
204 |
- to help organize a strike. |
|
202 |
+ In one such case, |
|
203 |
+ <a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">a Canadian ISP blocked access to a union website</a> |
|
204 |
+ used by its own employees to help organize a strike. |
|
205 | 205 |
</li> |
206 | 206 |
</ul> |
207 | 207 |
|
... | ... |
@@ -228,7 +228,7 @@ |
228 | 228 |
safer civic engagement</strong>. Although it's often said that the poor do not use |
229 | 229 |
online access for civic engagement, failing to act in their self-interests, |
230 | 230 |
it is our hypothesis (based on personal conversations and anecdotal |
231 |
- information) that it is precisely the “permanent record ” |
|
231 |
+ information) that it is precisely the “permanent record” |
|
232 | 232 |
left online that keeps many of the poor from speaking out on the Internet. |
233 | 233 |
We hope to show people how to engage more safely online, and then at |
234 | 234 |
the end of the year, evaluate how online and offline civic engagement has |
... | ... |
@@ -246,23 +246,23 @@ |
246 | 246 |
of information on Internet attacks. Such a repository requires members |
247 | 247 |
to report breaches to a central group, who correlates attacks to detect |
248 | 248 |
coordinated patterns and send out alerts. But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming |
249 |
- traffic to such a repository to be able to track where information is |
|
250 |
- coming from. Even though every packet were encrypted, the IP |
|
249 |
+ traffic to such a repository to where the report is |
|
250 |
+ sent from. Even if every packet were encrypted, the IP |
|
251 | 251 |
address would betray the location of a compromised system. Tor allows |
252 |
- such repositories of sensitive information to resist compromises. |
|
252 |
+ such repositories of sensitive information to resist eavesdropping. |
|
253 | 253 |
</li> |
254 | 254 |
<li><strong>Seeing your competition as your market does:</strong> |
255 |
- If you try to check out a competitor's pricing, you may find no |
|
255 |
+ If you try to check out your competitor's pricing, you may find no |
|
256 | 256 |
information or misleading information on their web site. This is because |
257 | 257 |
their web server may be keyed to detect connections from competitors, |
258 |
- and block or spread disinformation to your staff. Tor allows a business |
|
259 |
- to view their sector as the general public would view it. |
|
258 |
+ and block your staff or spread disinformation to them. Tor allows a business |
|
259 |
+ to view its sector as the general public would view it. |
|
260 | 260 |
</li> |
261 | 261 |
<li><strong>Keeping strategies confidential:</strong> |
262 | 262 |
An investment bank, for example, might not want industry snoopers to be |
263 | 263 |
able to track what web sites their analysts are watching. The strategic |
264 |
- importance of traffic patterns, and the vulnerability of the surveillance |
|
265 |
- of such data, is starting to be more widely recognized in several areas |
|
264 |
+ importance of traffic patterns, and the vulnerability of such data |
|
265 |
+ to surveillance, is starting to be more widely recognized in several areas |
|
266 | 266 |
of the business world. |
267 | 267 |
</li> |
268 | 268 |
<li><strong>Accountability:</strong> |
... | ... |
@@ -290,11 +290,11 @@ |
290 | 290 |
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2> |
291 | 291 |
<hr> |
292 | 292 |
<ul> |
293 |
- <li>To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block.</li> |
|
294 |
- <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.</li> |
|
293 |
+ <li>To verify IP-address-based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges to access a site. Tor can be used to verify those configurations by using an IP number outside the company's alloted IP block.</li> |
|
294 |
+ <li>To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. When a log review reveals a possible violation, Tor can be used to verify the information without putting an exception into corporate security systems.</li> |
|
295 | 295 |
<li>To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.</li> |
296 |
- <li>To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.</li> |
|
297 |
- <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. </li> |
|
296 |
+ <li>To access Internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the Internet while leaving standard security policies in place.</li> |
|
297 |
+ <li>To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make Internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations.</li> |
|
298 | 298 |
</ul> |
299 | 299 |
|
300 | 300 |
<p> |
... | ... |
@@ -310,15 +310,15 @@ |
310 | 310 |
<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous |
311 | 311 |
debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>, |
312 | 312 |
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a |
313 |
- href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not |
|
314 |
- just a good idea some of the time — it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
313 |
+ href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor Project is based on the belief that anonymity is not |
|
314 |
+ just a good idea some of the time — it is a requirement for a free and functioning society. The EFF maintains <a href="http://www.eff.org/issues/anonymity">a good overview of how anonymity was crucial to the founding of the United States</a>. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves: |
|
315 | 315 |
<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>, |
316 | 316 |
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>, |
317 | 317 |
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>, |
318 | 318 |
and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there |
319 | 319 |
are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of |
320 | 320 |
the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your |
321 |
- purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you're one of the |
|
321 |
+ purposes (e.g., the majority of Tor relays do not support SMTP, in order to prevent anonymous e-mail spamming), or if you're one of the |
|
322 | 322 |
<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>, |
323 | 323 |
you have better options than Tor. While not dismissing the potential abuses of Tor, |
324 | 324 |
this page shows a few of the many important ways anonymity is used online today.</p> |
... | ... |
@@ -13,7 +13,7 @@ |
13 | 13 |
<div id="maincol"> |
14 | 14 |
|
15 | 15 |
<h1>Inception</h1> |
16 |
- <hr /> |
|
16 |
+ <hr> |
|
17 | 17 |
<p> |
18 | 18 |
Tor was originally designed, implemented, and deployed as a |
19 | 19 |
third-generation <a href="http://www.onion-router.net/">onion routing |
... | ... |
@@ -26,9 +26,9 @@ |
26 | 26 |
</p> |
27 | 27 |
|
28 | 28 |
<a name="normalusers"></a> |
29 |
- <img src="$(IMGROOT)/family.jpg" alt="Normal People" /> |
|
29 |
+ <img src="$(IMGROOT)/family.jpg" alt="Normal People"> |
|
30 | 30 |
<h2><a class="anchor" href="#normalusers">Normal people use Tor</a></h2> |