Update abuse FAQ and re-add the ToC.

This commit is contained in:
Mike Perry 2011-04-04 21:05:05 +00:00
parent 759dcea9ed
commit 12ac473ba8

View File

@ -12,6 +12,7 @@
<div id="maincol">
<!-- PUT CONTENT AFTER THIS TAG -->
<h1>Abuse FAQ</h1>
<hr>
#<!-- BEGIN SIDEBAR -->
#<div class="sidebar-left">
#<h3>Questions</h3>
@ -30,7 +31,21 @@
#</ul>
#</div>
#<!-- END SIDEBAR -->
#<hr>
<h3>Questions</h3>
<ul>
<li><a href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li>
<li><a href="#DDoS">What about distributed denial of service attacks?</a></li>
<li><a href="#WhatAboutSpammers">What about spammers?</a></li>
<li><a href="#HowMuchAbuse">Does Tor get much abuse?</a></li>
<li><a href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></li>
<li><a href="#IrcBans">Tor is banned from the IRC network I want to use.</a></li>
<li><a href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>
<li><a href="#Bans">I want to ban the Tor network from my service.</a></li>
<li><a href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>
<li><a href="#RemoveContent">I want some content removed from a .onion address.</a></li>
<li><a href="#LegalQuestions">I have legal questions about Tor abuse.</a></li>
</ul>
<hr>
<a id="WhatAboutCriminals"></a>
<h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3>
@ -157,6 +172,13 @@
Template</a>, which explains why your ISP can probably ignore
the notice without any liability. [Arbitrary ports]</li>
</ul>
<p>For a complete set of template responses to different abuse complaint
types, see <a
href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates
on the Tor wiki</a>. You can also proactively reduce the amount of abuse you
get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips
for running an exit node with minimal harassment</a>.
<p>You might also find that your Tor relay's IP is blocked from accessing
some Internet sites/services. This might happen regardless of your exit
@ -338,14 +360,27 @@
to ensure their anonymity (identity theft, compromising computers and
using them as bounce points, etc).
</p>
<p>
This ultimately means that it is the responsibility of site owners to protect
themselves against compromise and security issues that can come from
anywhere. This is just part of signing up for the benefits of the
Internet. You must be prepared to secure yourself against the bad elements,
wherever they may come from. Tracking and increased surveillance are not
the answer to preventing abuse.
</p>
<p>
But remember that this doesn't mean that Tor is invulnerable. Traditional
police techniques can still be very effective against Tor, such as
interviewing suspects, surveillance and keyboard taps, writing style
analysis, sting operations, and other physical investigations.
investigating means, motive, and opportunity, interviewing suspects,
writing style analysis, technical analysis of the content itself, sting operations,
keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone
including law enforcement groups to train them how to use the Tor software to safely conduct
investigations or anonymized activities online.
</p>
<a id="RemoveContent"></a>
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
<p>The Tor Project does not host, control, nor have the ability to
@ -359,15 +394,21 @@
owner and location of the .onion site is hidden even from us.</p>
<p>But remember that this doesn't mean that hidden services are
invulnerable. Traditional police techniques can still be very effective
against them, such as interviewing suspects, surveillance and keyboard
taps, writing style analysis, sting operations, and other physical
investigations.</p>
against them, such as interviewing suspects, writing style analysis,
technical analysis of the content itself, sting operations, keyboard taps,
and other physical investigations.</p>
<p>If you have a complaint about child pornography, you may wish to report
it to the National Center for Missing and Exploited Children, which serves
as a national coordination point for investigation of child pornography:
<a href="http://www.missingkids.com/">http://www.missingkids.com/</a>.
We do not view links you report.</p>
<p>The Tor Project also encourages the use of Tor by law enforcement in
the investigation, stings, and infiltration of child pornography rings.
Please contact us for information on Tor trainings.
</p>
<a id="LegalQuestions"></a>
<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>