Browse code

Change hidden -> onion. (See #24285)

Renamed files, made new files with old names for redirects, updated
links to use new URLs.

kat authored on 19/11/2017 22:01:11
Showing 1 changed files
... ...
@@ -46,7 +46,7 @@
46 46
     Individuals use Tor to keep websites from tracking them and their family
47 47
     members, or to connect to news sites, instant messaging services, or the
48 48
     like when these are blocked by their local Internet providers.  Tor's <a
49
-    href="<page docs/hidden-services>">onion services</a>
49
+    href="<page docs/onion-services>">onion services</a>
50 50
     let users publish web sites and other services without needing to reveal
51 51
     the location of the site. Individuals also use Tor for socially sensitive
52 52
     communication: chat rooms and web forums for rape and abuse survivors,
Browse code

Change hidden service to onion service. (See #24285)

kat authored on 16/11/2017 19:08:34
Showing 1 changed files
... ...
@@ -46,7 +46,7 @@
46 46
     Individuals use Tor to keep websites from tracking them and their family
47 47
     members, or to connect to news sites, instant messaging services, or the
48 48
     like when these are blocked by their local Internet providers.  Tor's <a
49
-    href="<page docs/hidden-services>">hidden services</a>
49
+    href="<page docs/hidden-services>">onion services</a>
50 50
     let users publish web sites and other services without needing to reveal
51 51
     the location of the site. Individuals also use Tor for socially sensitive
52 52
     communication: chat rooms and web forums for rape and abuse survivors,
Browse code

Reword first paragraph on tor overview

Sebastian Hahn authored on 14/03/2015 03:26:58
Showing 1 changed files
... ...
@@ -29,13 +29,17 @@
29 29
     <h3><a class="anchor" href="#overview">Overview</a></h3>
30 30
 
31 31
     <p>
32
-    Tor is a network of virtual tunnels that allows people and groups to
33
-    improve their privacy and security on the Internet.  It also enables
34
-    software developers to create new communication tools
35
-    with built-in privacy features.  Tor provides the foundation for
36
-    a range of applications that allow organizations and individuals
37
-    to share information over public networks without compromising their
38
-    privacy.
32
+    The Tor network is a group of <a href="<page
33
+    getinvolved/volunteer>">volunteer</a>-operated servers that allows people
34
+    to improve their privacy and security on the Internet. Tor's users employ
35
+    this network by connecting through a series of virtual tunnels rather than
36
+    making a direct connection, thus allowing both organizations and
37
+    individuals to share information over public networks without compromising
38
+    their privacy. Along the same line, Tor is an effective censorship
39
+    circumvention tool, allowing its users to reach otherwise blocked
40
+    destinations or content.  Tor can also be used as a building block for
41
+    software developers to create new communication tools with built-in privacy
42
+    features.
39 43
     </p>
40 44
 
41 45
     <p>
Browse code

Remove hidden services paragraph from overview page

we already have that content on the hidden service page, and we link to
it from this page already

Sebastian Hahn authored on 14/03/2015 03:11:33
Showing 1 changed files
... ...
@@ -17,7 +17,6 @@
17 17
         <li><a href="<page about/overview>#overview">Overview</a></li>
18 18
         <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li>
19 19
         <li><a href="<page about/overview>#thesolution">The Solution</a></li>
20
-        <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li>
21 20
         <li><a href="<page about/overview>#stayinganonymous">Staying anonymous</a></li>
22 21
         <li><a href="<page about/overview>#thefutureoftor">The future of Tor</a></li>
23 22
       </ul>
... ...
@@ -182,24 +181,6 @@
182 181
 
183 182
     <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>
184 183
 
185
-
186
-    <a name="hiddenservices"></a>
187
-    <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
188
-
189
-    <p>
190
-    Tor also makes it possible for users to hide their locations while
191
-    offering various kinds of services, such as web publishing or an instant
192
-    messaging server.  Using Tor "rendezvous points," other Tor users can
193
-    connect to these hidden services, each without knowing the other's
194
-    network identity.  This hidden service functionality could allow Tor
195
-    users to set up a website where people publish material without worrying
196
-    about censorship.  Nobody would be able to determine who was offering
197
-    the site, and nobody who offered the site would know who was posting to it.
198
-    Learn more about <a href="<page docs/tor-hidden-service>">configuring
199
-    hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
200
-    service protocol</a> works.
201
-    </p>
202
-
203 184
     <a name="stayinganonymous"></a>
204 185
     <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
205 186
 
Browse code

Remove duplicated inception paragraph from "about tor"

Sebastian Hahn authored on 14/03/2015 03:05:34
Showing 1 changed files
... ...
@@ -14,7 +14,6 @@
14 14
     <div class="sidebar-left">
15 15
       <h3>Topics</h3>
16 16
       <ul>
17
-        <li><a href="<page about/overview>#inception">Inception</a></li>
18 17
         <li><a href="<page about/overview>#overview">Overview</a></li>
19 18
         <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li>
20 19
         <li><a href="<page about/overview>#thesolution">The Solution</a></li>
... ...
@@ -27,19 +26,6 @@
27 26
 
28 27
     <hr>
29 28
 
30
-    <a name="inception"></a>
31
-    <h3><a class="anchor" href="#inception">Inception</a></h3>
32
-
33
-    <p>
34
-    Tor was originally designed, implemented, and deployed as a
35
-    third-generation <a href="http://www.onion-router.net/">onion routing
36
-    project of the U.S. Naval Research Laboratory</a>.  It was originally
37
-    developed with the U.S. Navy in mind, for the primary purpose of
38
-    protecting government communications.  Today, it is used every day
39
-    for a wide variety of purposes by normal people, the military,
40
-    journalists, law enforcement officers, activists, and many
41
-    others. </p>
42
-
43 29
     <a name="overview"></a>
44 30
     <h3><a class="anchor" href="#overview">Overview</a></h3>
45 31
 
Browse code

Replaced "the Tor Browser Bundle" in active docs.

Matt Pagan authored on 20/12/2014 16:05:28
Showing 1 changed files
... ...
@@ -221,8 +221,8 @@
221 221
     Tor can't solve all anonymity problems.  It focuses only on
222 222
     protecting the transport of data.  You need to use protocol-specific
223 223
     support software if you don't want the sites you visit to see your
224
-    identifying information. For example, you can use the <a href="<page
225
-    projects/torbrowser>">Tor Browser Bundle</a>
224
+    identifying information. For example, you can use <a href="<page
225
+    projects/torbrowser>">Tor Browser</a>
226 226
     while browsing the web to withhold some information about your computer's
227 227
     configuration.
228 228
     </p>
Browse code

actually make it a link too

Roger Dingledine authored on 02/10/2013 19:33:50
Showing 1 changed files
... ...
@@ -221,7 +221,8 @@
221 221
     Tor can't solve all anonymity problems.  It focuses only on
222 222
     protecting the transport of data.  You need to use protocol-specific
223 223
     support software if you don't want the sites you visit to see your
224
-    identifying information. For example, you can use Tor Browser Bundle
224
+    identifying information. For example, you can use the <a href="<page
225
+    projects/torbrowser>">Tor Browser Bundle</a>
225 226
     while browsing the web to withhold some information about your computer's
226 227
     configuration.
227 228
     </p>
Browse code

it's not called torbutton anymore

Roger Dingledine authored on 02/10/2013 19:27:28
Showing 1 changed files
... ...
@@ -221,7 +221,7 @@
221 221
     Tor can't solve all anonymity problems.  It focuses only on
222 222
     protecting the transport of data.  You need to use protocol-specific
223 223
     support software if you don't want the sites you visit to see your
224
-    identifying information. For example, you can use Torbutton
224
+    identifying information. For example, you can use Tor Browser Bundle
225 225
     while browsing the web to withhold some information about your computer's
226 226
     configuration.
227 227
     </p>
Browse code

strip trailing whitespace (no changes)

Roger Dingledine authored on 02/10/2013 19:26:38
Showing 1 changed files
... ...
@@ -24,7 +24,7 @@
24 24
       </ul>
25 25
     </div>
26 26
     <!-- END SIDEBAR -->
27
-    
27
+
28 28
     <hr>
29 29
 
30 30
     <a name="inception"></a>
... ...
@@ -39,7 +39,7 @@
39 39
     for a wide variety of purposes by normal people, the military,
40 40
     journalists, law enforcement officers, activists, and many
41 41
     others. </p>
42
-    
42
+
43 43
     <a name="overview"></a>
44 44
     <h3><a class="anchor" href="#overview">Overview</a></h3>
45 45
 
... ...
@@ -52,7 +52,7 @@
52 52
     to share information over public networks without compromising their
53 53
     privacy.
54 54
     </p>
55
-    
55
+
56 56
     <p>
57 57
     Individuals use Tor to keep websites from tracking them and their family
58 58
     members, or to connect to news sites, instant messaging services, or the
... ...
@@ -63,7 +63,7 @@
63 63
     communication: chat rooms and web forums for rape and abuse survivors,
64 64
     or people with illnesses.
65 65
     </p>
66
-    
66
+
67 67
     <p>
68 68
     Journalists use Tor to communicate more safely with whistleblowers and
69 69
     dissidents. Non-governmental organizations (NGOs) use Tor to allow their
... ...
@@ -71,7 +71,7 @@
71 71
     country, without notifying everybody nearby that they're working with
72 72
     that organization.
73 73
     </p>
74
-    
74
+
75 75
     <p>
76 76
     Groups such as Indymedia recommend Tor for safeguarding their members'
77 77
     online privacy and security. Activist groups like the Electronic Frontier
... ...
@@ -84,7 +84,7 @@
84 84
     consulting job-hunting websites? Which research divisions are communicating
85 85
     with the company's patent lawyers?
86 86
     </p>
87
-    
87
+
88 88
     <p>
89 89
     A branch of the U.S. Navy uses Tor for open source intelligence
90 90
     gathering, and one of its teams used Tor while deployed in the Middle
... ...
@@ -92,7 +92,7 @@
92 92
     web sites without leaving government IP addresses in their web logs,
93 93
     and for security during sting operations.
94 94
     </p>
95
-    
95
+
96 96
     <p>
97 97
     The variety of people who use Tor is actually <a
98 98
     href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
... ...
@@ -101,10 +101,10 @@
101 101
     so the more populous and diverse the user base for Tor is, the more your
102 102
     anonymity will be protected.
103 103
     </p>
104
-    
104
+
105 105
     <a name="whyweneedtor"></a>
106 106
     <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
107
-    
107
+
108 108
     <p>
109 109
     Using Tor protects you against a common form of Internet surveillance
110 110
     known as "traffic analysis."  Traffic analysis can be used to infer
... ...
@@ -119,7 +119,7 @@
119 119
     affiliation to anyone observing the network, even if the connection
120 120
     is encrypted.
121 121
     </p>
122
-    
122
+
123 123
     <p>
124 124
     How does traffic analysis work?  Internet data packets have two parts:
125 125
     a data payload and a header used for routing.  The data payload is
... ...
@@ -129,7 +129,7 @@
129 129
     possibly, what you're saying.  That's because it focuses on the header,
130 130
     which discloses source, destination, size, timing, and so on.
131 131
     </p>
132
-    
132
+
133 133
     <p>
134 134
     A basic problem for the privacy minded is that the recipient of your
135 135
     communications can see that you sent it by looking at headers.  So can
... ...
@@ -138,7 +138,7 @@
138 138
     analysis might involve sitting somewhere between sender and recipient on
139 139
     the network, looking at headers.
140 140
     </p>
141
-    
141
+
142 142
     <p>
143 143
     But there are also more powerful kinds of traffic analysis.  Some
144 144
     attackers spy on multiple parts of the Internet and use sophisticated
... ...
@@ -147,11 +147,11 @@
147 147
     these attackers, since it only hides the content of Internet traffic, not
148 148
     the headers.
149 149
     </p>
150
-    
150
+
151 151
     <a name="thesolution"></a>
152 152
     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
153 153
     <img src="$(IMGROOT)/htw1.png" alt="How Tor works">
154
-    
154
+
155 155
     <p>
156 156
     Tor helps to reduce the risks of both simple and sophisticated traffic
157 157
     analysis by distributing your transactions over several places on the
... ...
@@ -163,7 +163,7 @@
163 163
     through several relays that cover your tracks so no observer at any
164 164
     single point can tell where the data came from or where it's going.
165 165
     </p>
166
-    
166
+
167 167
     <p>
168 168
     To create a private network pathway with Tor, the user's software or
169 169
     client incrementally builds a circuit of encrypted connections through
... ...
@@ -174,9 +174,9 @@
174 174
     separate set of encryption keys for each hop along the circuit to ensure
175 175
     that each hop can't trace these connections as they pass through.
176 176
     </p>
177
-    
177
+
178 178
     <p><img alt="Tor circuit step two"  src="$(IMGROOT)/htw2.png"></p>
179
-    
179
+
180 180
     <p>
181 181
     Once a circuit has been established, many kinds of data can be exchanged
182 182
     and several different sorts of software applications can be deployed
... ...
@@ -186,20 +186,20 @@
186 186
     only works for TCP streams and can be used by any application with SOCKS
187 187
     support.
188 188
     </p>
189
-    
189
+
190 190
     <p>
191 191
     For efficiency, the Tor software uses the same circuit for connections
192 192
     that happen within the same ten minutes or so.  Later requests are given a
193 193
     new circuit, to keep people from linking your earlier actions to the new
194 194
     ones.
195 195
     </p>
196
-    
196
+
197 197
     <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>
198
-    
199
-    
198
+
199
+
200 200
     <a name="hiddenservices"></a>
201 201
     <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
202
-    
202
+
203 203
     <p>
204 204
     Tor also makes it possible for users to hide their locations while
205 205
     offering various kinds of services, such as web publishing or an instant
... ...
@@ -213,10 +213,10 @@
213 213
     hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
214 214
     service protocol</a> works.
215 215
     </p>
216
-    
216
+
217 217
     <a name="stayinganonymous"></a>
218 218
     <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
219
-    
219
+
220 220
     <p>
221 221
     Tor can't solve all anonymity problems.  It focuses only on
222 222
     protecting the transport of data.  You need to use protocol-specific
... ...
@@ -225,7 +225,7 @@
225 225
     while browsing the web to withhold some information about your computer's
226 226
     configuration.
227 227
     </p>
228
-    
228
+
229 229
     <p>
230 230
     Also, to protect your anonymity, be smart.  Don't provide your name
231 231
     or other revealing information in web forms.  Be aware that, like all
... ...
@@ -235,10 +235,10 @@
235 235
     arriving at your chosen destination, he can use statistical analysis to
236 236
     discover that they are part of the same circuit.
237 237
     </p>
238
-    
238
+
239 239
     <a name="thefutureoftor"></a>
240 240
     <h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
241
-    
241
+
242 242
     <p>
243 243
     Providing a usable anonymizing network on the Internet today is an
244 244
     ongoing challenge. We want software that meets users' needs. We also
... ...
@@ -252,7 +252,7 @@
252 252
     or <a href="<page getinvolved/volunteer>">volunteering</a> as a
253 253
     <a href="<page docs/documentation>#Developers">developer</a>.
254 254
     </p>
255
-    
255
+
256 256
     <p>
257 257
     Ongoing trends in law, policy, and technology threaten anonymity as never
258 258
     before, undermining our ability to speak and read freely online. These
... ...
@@ -262,7 +262,7 @@
262 262
     provides additional diversity, enhancing Tor's ability to put control
263 263
     over your security and privacy back into your hands.
264 264
     </p>
265
-    
265
+
266 266
   </div>
267 267
   <!-- END MAINCOL -->
268 268
   <div id = "sidecol">
... ...
@@ -272,4 +272,4 @@
272 272
   <!-- END SIDECOL -->
273 273
 </div>
274 274
 <!-- END CONTENT -->
275
-#include <foot.wmi> 
275
+#include <foot.wmi>
Browse code

Remove another claim that Privoxy can help protect users' anonymity

Robert Ransom authored on 29/06/2011 20:33:07
Showing 1 changed files
... ...
@@ -221,9 +221,9 @@
221 221
     Tor can't solve all anonymity problems.  It focuses only on
222 222
     protecting the transport of data.  You need to use protocol-specific
223 223
     support software if you don't want the sites you visit to see your
224
-    identifying information. For example, you can use web proxies such as
225
-    Privoxy while web browsing to block cookies and withhold information
226
-    about your browser type.
224
+    identifying information. For example, you can use Torbutton
225
+    while browsing the web to withhold some information about your computer's
226
+    configuration.
227 227
     </p>
228 228
     
229 229
     <p>
Browse code

make the overview h3 just say overview.

Andrew Lewman authored on 30/03/2011 03:45:47
Showing 1 changed files
... ...
@@ -41,7 +41,7 @@
41 41
     others. </p>
42 42
     
43 43
     <a name="overview"></a>
44
-    <h3><a class="anchor" href="#overview">Tor: Overview</a></h3>
44
+    <h3><a class="anchor" href="#overview">Overview</a></h3>
45 45
 
46 46
     <p>
47 47
     Tor is a network of virtual tunnels that allows people and groups to
Browse code

make the overview section logically flow after inception, update the nav and title.

Andrew Lewman authored on 30/03/2011 02:54:38
Showing 1 changed files
... ...
@@ -9,14 +9,13 @@
9 9
     <a href="<page about/overview>">About &raquo; </a>
10 10
   </div>
11 11
   <div id="maincol">
12
-    <a name="overview"></a>
13
-    <h2><a class="anchor" href="#overview">Tor: Overview</a></h2>
12
+    <h2>Tor: Overview</h2>
14 13
     <!-- BEGIN SIDEBAR -->
15 14
     <div class="sidebar-left">
16 15
       <h3>Topics</h3>
17 16
       <ul>
18
-        <li><a href="<page about/overview>#overview">Overview</a></li>
19 17
         <li><a href="<page about/overview>#inception">Inception</a></li>
18
+        <li><a href="<page about/overview>#overview">Overview</a></li>
20 19
         <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li>
21 20
         <li><a href="<page about/overview>#thesolution">The Solution</a></li>
22 21
         <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li>
... ...
@@ -41,6 +40,9 @@
41 40
     journalists, law enforcement officers, activists, and many
42 41
     others. </p>
43 42
     
43
+    <a name="overview"></a>
44
+    <h3><a class="anchor" href="#overview">Tor: Overview</a></h3>
45
+
44 46
     <p>
45 47
     Tor is a network of virtual tunnels that allows people and groups to
46 48
     improve their privacy and security on the Internet.  It also enables
Browse code

copy the inception paragraph from torusers over to overview, since clearly paranoids don't read anything but what they want to read.

Andrew Lewman authored on 30/03/2011 02:19:31
Showing 1 changed files
... ...
@@ -16,6 +16,7 @@
16 16
       <h3>Topics</h3>
17 17
       <ul>
18 18
         <li><a href="<page about/overview>#overview">Overview</a></li>
19
+        <li><a href="<page about/overview>#inception">Inception</a></li>
19 20
         <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li>
20 21
         <li><a href="<page about/overview>#thesolution">The Solution</a></li>
21 22
         <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li>
... ...
@@ -26,6 +27,19 @@
26 27
     <!-- END SIDEBAR -->
27 28
     
28 29
     <hr>
30
+
31
+    <a name="inception"></a>
32
+    <h3><a class="anchor" href="#inception">Inception</a></h3>
33
+
34
+    <p>
35
+    Tor was originally designed, implemented, and deployed as a
36
+    third-generation <a href="http://www.onion-router.net/">onion routing
37
+    project of the U.S. Naval Research Laboratory</a>.  It was originally
38
+    developed with the U.S. Navy in mind, for the primary purpose of
39
+    protecting government communications.  Today, it is used every day
40
+    for a wide variety of purposes by normal people, the military,
41
+    journalists, law enforcement officers, activists, and many
42
+    others. </p>
29 43
     
30 44
     <p>
31 45
     Tor is a network of virtual tunnels that allows people and groups to
Browse code

karen noticed we were duplicating the first "how tor works" picture on our overview page.

Roger Dingledine authored on 22/02/2011 21:08:33
Showing 1 changed files
... ...
@@ -148,8 +148,6 @@
148 148
     single point can tell where the data came from or where it's going.
149 149
     </p>
150 150
     
151
-    <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png"></p>
152
-    
153 151
     <p>
154 152
     To create a private network pathway with Tor, the user's software or
155 153
     client incrementally builds a circuit of encrypted connections through
Browse code

looks like we never set the keywords either

Roger Dingledine authored on 27/10/2010 12:31:57
Showing 1 changed files
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Revision: $Revision: 22308 $
2
+# Revision: $Revision$
3 3
 # Translation-Priority: 2-medium
4 4
 
5 5
 #include "head.wmi" TITLE="Tor Project: Overview" CHARSET="UTF-8"
Browse code

We decided to go with HTML in favor of XHTML.

Sebastian Hahn authored on 10/10/2010 03:34:47
Showing 1 changed files
... ...
@@ -25,7 +25,7 @@
25 25
     </div>
26 26
     <!-- END SIDEBAR -->
27 27
     
28
-    <hr />
28
+    <hr>
29 29
     
30 30
     <p>
31 31
     Tor is a network of virtual tunnels that allows people and groups to
... ...
@@ -134,7 +134,7 @@
134 134
     
135 135
     <a name="thesolution"></a>
136 136
     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
137
-    <img src="$(IMGROOT)/htw1.png" alt="How Tor works" />
137
+    <img src="$(IMGROOT)/htw1.png" alt="How Tor works">
138 138
     
139 139
     <p>
140 140
     Tor helps to reduce the risks of both simple and sophisticated traffic
... ...
@@ -148,7 +148,7 @@
148 148
     single point can tell where the data came from or where it's going.
149 149
     </p>
150 150
     
151
-    <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p>
151
+    <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png"></p>
152 152
     
153 153
     <p>
154 154
     To create a private network pathway with Tor, the user's software or
... ...
@@ -161,7 +161,7 @@
161 161
     that each hop can't trace these connections as they pass through.
162 162
     </p>
163 163
     
164
-    <p><img alt="Tor circuit step two"  src="$(IMGROOT)/htw2.png" /></p>
164
+    <p><img alt="Tor circuit step two"  src="$(IMGROOT)/htw2.png"></p>
165 165
     
166 166
     <p>
167 167
     Once a circuit has been established, many kinds of data can be exchanged
... ...
@@ -180,7 +180,7 @@
180 180
     ones.
181 181
     </p>
182 182
     
183
-    <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p>
183
+    <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>
184 184
     
185 185
     
186 186
     <a name="hiddenservices"></a>
Browse code

no really, fix the path to htw.

Andrew Lewman authored on 09/10/2010 21:36:58
Showing 1 changed files
... ...
@@ -134,7 +134,7 @@
134 134
     
135 135
     <a name="thesolution"></a>
136 136
     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
137
-    <img src="$(IMGROOT)/htw-1.png" alt="How Tor works" />
137
+    <img src="$(IMGROOT)/htw1.png" alt="How Tor works" />
138 138
     
139 139
     <p>
140 140
     Tor helps to reduce the risks of both simple and sophisticated traffic
Browse code

fix the image path for htw

Andrew Lewman authored on 09/10/2010 21:34:19
Showing 1 changed files
... ...
@@ -134,7 +134,7 @@
134 134
     
135 135
     <a name="thesolution"></a>
136 136
     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
137
-    <img src="images/htw-1.png" alt="How Tor works" />
137
+    <img src="$(IMGROOT)/htw-1.png" alt="How Tor works" />
138 138
     
139 139
     <p>
140 140
     Tor helps to reduce the risks of both simple and sophisticated traffic
Browse code

increase max img width, link to about/overview rather than about/about.

Andrew Lewman authored on 27/09/2010 21:27:00
Showing 1 changed files
... ...
@@ -6,8 +6,7 @@
6 6
 <div id="content" class="clearfix">
7 7
   <div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page about/about>">About &raquo; </a>
10
-    <a href="<page about/about>">Overview</a>
9
+    <a href="<page about/overview>">About &raquo; </a>
11 10
   </div>
12 11
   <div id="maincol">
13 12
     <a name="overview"></a>
... ...
@@ -162,7 +161,7 @@
162 161
     that each hop can't trace these connections as they pass through.
163 162
     </p>
164 163
     
165
-    <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p>
164
+    <p><img alt="Tor circuit step two"  src="$(IMGROOT)/htw2.png" /></p>
166 165
     
167 166
     <p>
168 167
     Once a circuit has been established, many kinds of data can be exchanged
Browse code

update overview to point to correct urls

Andrew Lewman authored on 18/08/2010 21:08:12
Showing 1 changed files
... ...
@@ -135,6 +135,7 @@
135 135
     
136 136
     <a name="thesolution"></a>
137 137
     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
138
+    <img src="images/htw-1.png" alt="How Tor works" />
138 139
     
139 140
     <p>
140 141
     Tor helps to reduce the risks of both simple and sophisticated traffic
Browse code

change all of the breadcrumbs from page home to page index.

Andrew Lewman authored on 12/08/2010 17:17:47
Showing 1 changed files
... ...
@@ -5,7 +5,7 @@
5 5
 #include "head.wmi" TITLE="Tor Project: Overview" CHARSET="UTF-8"
6 6
 <div id="content" class="clearfix">
7 7
   <div id="breadcrumbs">
8
-    <a href="<page home>">Home &raquo; </a>
8
+    <a href="<page index>">Home &raquo; </a>
9 9
     <a href="<page about/about>">About &raquo; </a>
10 10
     <a href="<page about/about>">Overview</a>
11 11
   </div>
Browse code

first cut of the new, shiny tor website as wml.

Andrew Lewman authored on 09/07/2010 03:55:22
Showing 1 changed files
1 1
new file mode 100644
... ...
@@ -0,0 +1,261 @@
1
+## translation metadata
2
+# Revision: $Revision: 22308 $
3
+# Translation-Priority: 2-medium
4
+
5
+#include "head.wmi" TITLE="Tor Project: Overview" CHARSET="UTF-8"
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page home>">Home &raquo; </a>
9
+    <a href="<page about/about>">About &raquo; </a>
10
+    <a href="<page about/about>">Overview</a>
11
+  </div>
12
+  <div id="maincol">
13
+    <a name="overview"></a>
14
+    <h2><a class="anchor" href="#overview">Tor: Overview</a></h2>
15
+    <!-- BEGIN SIDEBAR -->
16
+    <div class="sidebar-left">
17
+      <h3>Topics</h3>
18
+      <ul>
19
+        <li><a href="<page about/overview>#overview">Overview</a></li>
20
+        <li><a href="<page about/overview>#whyweneedtor">Why we need Tor</a></li>
21
+        <li><a href="<page about/overview>#thesolution">The Solution</a></li>
22
+        <li><a href="<page about/overview>#hiddenservices">Hidden services</a></li>
23
+        <li><a href="<page about/overview>#stayinganonymous">Staying anonymous</a></li>
24
+        <li><a href="<page about/overview>#thefutureoftor">The future of Tor</a></li>
25
+      </ul>
26
+    </div>
27
+    <!-- END SIDEBAR -->
28
+    
29
+    <hr />
30
+    
31
+    <p>
32
+    Tor is a network of virtual tunnels that allows people and groups to
33
+    improve their privacy and security on the Internet.  It also enables
34
+    software developers to create new communication tools
35
+    with built-in privacy features.  Tor provides the foundation for
36
+    a range of applications that allow organizations and individuals
37
+    to share information over public networks without compromising their
38
+    privacy.
39
+    </p>
40
+    
41
+    <p>
42
+    Individuals use Tor to keep websites from tracking them and their family
43
+    members, or to connect to news sites, instant messaging services, or the
44
+    like when these are blocked by their local Internet providers.  Tor's <a
45
+    href="<page docs/hidden-services>">hidden services</a>
46
+    let users publish web sites and other services without needing to reveal
47
+    the location of the site. Individuals also use Tor for socially sensitive
48
+    communication: chat rooms and web forums for rape and abuse survivors,
49
+    or people with illnesses.
50
+    </p>
51
+    
52
+    <p>
53
+    Journalists use Tor to communicate more safely with whistleblowers and
54
+    dissidents. Non-governmental organizations (NGOs) use Tor to allow their
55
+    workers to connect to their home website while they're in a foreign
56
+    country, without notifying everybody nearby that they're working with
57
+    that organization.
58
+    </p>
59
+    
60
+    <p>
61
+    Groups such as Indymedia recommend Tor for safeguarding their members'
62
+    online privacy and security. Activist groups like the Electronic Frontier
63
+    Foundation (EFF) recommend Tor as a mechanism for
64
+    maintaining civil liberties online. Corporations use Tor as a safe way
65
+    to conduct competitive analysis, and to protect sensitive procurement
66
+    patterns from eavesdroppers. They also use it to replace traditional
67
+    VPNs, which reveal the exact amount and timing of communication. Which
68
+    locations have employees working late? Which locations have employees
69
+    consulting job-hunting websites? Which research divisions are communicating
70
+    with the company's patent lawyers?
71
+    </p>
72
+    
73
+    <p>
74
+    A branch of the U.S. Navy uses Tor for open source intelligence
75
+    gathering, and one of its teams used Tor while deployed in the Middle
76
+    East recently. Law enforcement uses Tor for visiting or surveilling
77
+    web sites without leaving government IP addresses in their web logs,
78
+    and for security during sting operations.
79
+    </p>
80
+    
81
+    <p>
82
+    The variety of people who use Tor is actually <a
83
+    href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
84
+    it so secure</a>.  Tor hides you among <a href="<page about/torusers>">the
85
+    other users on the network</a>,
86
+    so the more populous and diverse the user base for Tor is, the more your
87
+    anonymity will be protected.
88
+    </p>
89
+    
90
+    <a name="whyweneedtor"></a>
91
+    <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
92
+    
93
+    <p>
94
+    Using Tor protects you against a common form of Internet surveillance
95
+    known as "traffic analysis."  Traffic analysis can be used to infer
96
+    who is talking to whom over a public network.  Knowing the source
97
+    and destination of your Internet traffic allows others to track your
98
+    behavior and interests.  This can impact your checkbook if, for example,
99
+    an e-commerce site uses price discrimination based on your country or
100
+    institution of origin.  It can even threaten your job and physical safety
101
+    by revealing who and where you are. For example, if you're travelling
102
+    abroad and you connect to your employer's computers to check or send mail,
103
+    you can inadvertently reveal your national origin and professional
104
+    affiliation to anyone observing the network, even if the connection
105
+    is encrypted.
106
+    </p>
107
+    
108
+    <p>
109
+    How does traffic analysis work?  Internet data packets have two parts:
110
+    a data payload and a header used for routing.  The data payload is
111
+    whatever is being sent, whether that's an email message, a web page, or an
112
+    audio file.  Even if you encrypt the data payload of your communications,
113
+    traffic analysis still reveals a great deal about what you're doing and,
114
+    possibly, what you're saying.  That's because it focuses on the header,
115
+    which discloses source, destination, size, timing, and so on.
116
+    </p>
117
+    
118
+    <p>
119
+    A basic problem for the privacy minded is that the recipient of your
120
+    communications can see that you sent it by looking at headers.  So can
121
+    authorized intermediaries like Internet service providers, and sometimes
122
+    unauthorized intermediaries as well.  A very simple form of traffic
123
+    analysis might involve sitting somewhere between sender and recipient on
124
+    the network, looking at headers.
125
+    </p>
126
+    
127
+    <p>
128
+    But there are also more powerful kinds of traffic analysis.  Some
129
+    attackers spy on multiple parts of the Internet and use sophisticated
130
+    statistical techniques to track the communications patterns of many
131
+    different organizations and individuals.  Encryption does not help against
132
+    these attackers, since it only hides the content of Internet traffic, not
133
+    the headers.
134
+    </p>
135
+    
136
+    <a name="thesolution"></a>
137
+    <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
138
+    
139
+    <p>
140
+    Tor helps to reduce the risks of both simple and sophisticated traffic
141
+    analysis by distributing your transactions over several places on the
142
+    Internet, so no single point can link you to your destination.  The idea
143
+    is similar to using a twisty, hard-to-follow route in order to throw off
144
+    somebody who is tailing you &mdash; and then periodically erasing your
145
+    footprints.  Instead of taking a direct route from source to
146
+    destination, data packets on the Tor network take a random pathway
147
+    through several relays that cover your tracks so no observer at any
148
+    single point can tell where the data came from or where it's going.
149
+    </p>
150
+    
151
+    <p><img alt="Tor circuit step one" src="$(IMGROOT)/htw1.png" /></p>
152
+    
153
+    <p>
154
+    To create a private network pathway with Tor, the user's software or
155
+    client incrementally builds a circuit of encrypted connections through
156
+    relays on the network.  The circuit is extended one hop at a time, and
157
+    each relay along the way knows only which relay gave it data and which
158
+    relay it is giving data to.  No individual relay ever knows the
159
+    complete path that a data packet has taken.  The client negotiates a
160
+    separate set of encryption keys for each hop along the circuit to ensure
161
+    that each hop can't trace these connections as they pass through.
162
+    </p>
163
+    
164
+    <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png" /></p>
165
+    
166
+    <p>
167
+    Once a circuit has been established, many kinds of data can be exchanged
168
+    and several different sorts of software applications can be deployed
169
+    over the Tor network.  Because each relay sees no more than one hop in
170
+    the circuit, neither an eavesdropper nor a compromised relay can use
171
+    traffic analysis to link the connection's source and destination.  Tor
172
+    only works for TCP streams and can be used by any application with SOCKS
173
+    support.
174
+    </p>
175
+    
176
+    <p>
177
+    For efficiency, the Tor software uses the same circuit for connections
178
+    that happen within the same ten minutes or so.  Later requests are given a
179
+    new circuit, to keep people from linking your earlier actions to the new
180
+    ones.
181
+    </p>
182
+    
183
+    <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png" /></p>
184
+    
185
+    
186
+    <a name="hiddenservices"></a>
187
+    <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
188
+    
189
+    <p>
190
+    Tor also makes it possible for users to hide their locations while
191
+    offering various kinds of services, such as web publishing or an instant
192
+    messaging server.  Using Tor "rendezvous points," other Tor users can
193
+    connect to these hidden services, each without knowing the other's
194
+    network identity.  This hidden service functionality could allow Tor
195
+    users to set up a website where people publish material without worrying
196
+    about censorship.  Nobody would be able to determine who was offering
197
+    the site, and nobody who offered the site would know who was posting to it.
198
+    Learn more about <a href="<page docs/tor-hidden-service>">configuring
199
+    hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
200
+    service protocol</a> works.
201
+    </p>
202
+    
203
+    <a name="stayinganonymous"></a>
204
+    <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
205
+    
206
+    <p>
207
+    Tor can't solve all anonymity problems.  It focuses only on
208
+    protecting the transport of data.  You need to use protocol-specific
209
+    support software if you don't want the sites you visit to see your
210
+    identifying information. For example, you can use web proxies such as
211
+    Privoxy while web browsing to block cookies and withhold information
212
+    about your browser type.
213
+    </p>
214
+    
215
+    <p>
216
+    Also, to protect your anonymity, be smart.  Don't provide your name
217
+    or other revealing information in web forms.  Be aware that, like all
218
+    anonymizing networks that are fast enough for web browsing, Tor does not
219
+    provide protection against end-to-end timing attacks: If your attacker
220
+    can watch the traffic coming out of your computer, and also the traffic
221
+    arriving at your chosen destination, he can use statistical analysis to
222
+    discover that they are part of the same circuit.
223
+    </p>
224
+    
225
+    <a name="thefutureoftor"></a>
226
+    <h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
227
+    
228
+    <p>
229
+    Providing a usable anonymizing network on the Internet today is an
230
+    ongoing challenge. We want software that meets users' needs. We also
231
+    want to keep the network up and running in a way that handles as many
232
+    users as possible. Security and usability don't have to be at odds:
233
+    As Tor's usability increases, it will attract more users, which will
234
+    increase the possible sources and destinations of each communication,
235
+    thus increasing security for everyone.
236
+    We're making progress, but we need your help.  Please consider
237
+    <a href="<page docs/tor-doc-relay>">running a relay</a>
238
+    or <a href="<page getinvolved/volunteer>">volunteering</a> as a
239
+    <a href="<page docs/documentation>#Developers">developer</a>.
240
+    </p>
241
+    
242
+    <p>
243
+    Ongoing trends in law, policy, and technology threaten anonymity as never
244
+    before, undermining our ability to speak and read freely online. These
245
+    trends also undermine national security and critical infrastructure by
246
+    making communication among individuals, organizations, corporations,
247
+    and governments more vulnerable to analysis. Each new user and relay
248
+    provides additional diversity, enhancing Tor's ability to put control
249
+    over your security and privacy back into your hands.
250
+    </p>
251
+    
252
+  </div>
253
+  <!-- END MAINCOL -->
254
+  <div id = "sidecol">
255
+#include "side.wmi"
256
+#include "info.wmi"
257
+  </div>
258
+  <!-- END SIDECOL -->
259
+</div>
260
+<!-- END CONTENT -->
261
+#include <foot.wmi>