mirror of
https://github.com/torproject/webwml.git
synced 2024-12-14 13:58:30 +00:00
Update abuse FAQ and re-add the ToC.
This commit is contained in:
parent
759dcea9ed
commit
12ac473ba8
@ -12,6 +12,7 @@
|
||||
<div id="maincol">
|
||||
<!-- PUT CONTENT AFTER THIS TAG -->
|
||||
<h1>Abuse FAQ</h1>
|
||||
<hr>
|
||||
#<!-- BEGIN SIDEBAR -->
|
||||
#<div class="sidebar-left">
|
||||
#<h3>Questions</h3>
|
||||
@ -30,7 +31,21 @@
|
||||
#</ul>
|
||||
#</div>
|
||||
#<!-- END SIDEBAR -->
|
||||
#<hr>
|
||||
<h3>Questions</h3>
|
||||
<ul>
|
||||
<li><a href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li>
|
||||
<li><a href="#DDoS">What about distributed denial of service attacks?</a></li>
|
||||
<li><a href="#WhatAboutSpammers">What about spammers?</a></li>
|
||||
<li><a href="#HowMuchAbuse">Does Tor get much abuse?</a></li>
|
||||
<li><a href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></li>
|
||||
<li><a href="#IrcBans">Tor is banned from the IRC network I want to use.</a></li>
|
||||
<li><a href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>
|
||||
<li><a href="#Bans">I want to ban the Tor network from my service.</a></li>
|
||||
<li><a href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>
|
||||
<li><a href="#RemoveContent">I want some content removed from a .onion address.</a></li>
|
||||
<li><a href="#LegalQuestions">I have legal questions about Tor abuse.</a></li>
|
||||
</ul>
|
||||
<hr>
|
||||
|
||||
<a id="WhatAboutCriminals"></a>
|
||||
<h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3>
|
||||
@ -157,6 +172,13 @@
|
||||
Template</a>, which explains why your ISP can probably ignore
|
||||
the notice without any liability. [Arbitrary ports]</li>
|
||||
</ul>
|
||||
|
||||
<p>For a complete set of template responses to different abuse complaint
|
||||
types, see <a
|
||||
href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates
|
||||
on the Tor wiki</a>. You can also proactively reduce the amount of abuse you
|
||||
get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips
|
||||
for running an exit node with minimal harassment</a>.
|
||||
|
||||
<p>You might also find that your Tor relay's IP is blocked from accessing
|
||||
some Internet sites/services. This might happen regardless of your exit
|
||||
@ -338,14 +360,27 @@
|
||||
to ensure their anonymity (identity theft, compromising computers and
|
||||
using them as bounce points, etc).
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
This ultimately means that it is the responsibility of site owners to protect
|
||||
themselves against compromise and security issues that can come from
|
||||
anywhere. This is just part of signing up for the benefits of the
|
||||
Internet. You must be prepared to secure yourself against the bad elements,
|
||||
wherever they may come from. Tracking and increased surveillance are not
|
||||
the answer to preventing abuse.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
But remember that this doesn't mean that Tor is invulnerable. Traditional
|
||||
police techniques can still be very effective against Tor, such as
|
||||
interviewing suspects, surveillance and keyboard taps, writing style
|
||||
analysis, sting operations, and other physical investigations.
|
||||
investigating means, motive, and opportunity, interviewing suspects,
|
||||
writing style analysis, technical analysis of the content itself, sting operations,
|
||||
keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone
|
||||
including law enforcement groups to train them how to use the Tor software to safely conduct
|
||||
investigations or anonymized activities online.
|
||||
</p>
|
||||
|
||||
|
||||
|
||||
<a id="RemoveContent"></a>
|
||||
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
|
||||
<p>The Tor Project does not host, control, nor have the ability to
|
||||
@ -359,15 +394,21 @@
|
||||
owner and location of the .onion site is hidden even from us.</p>
|
||||
<p>But remember that this doesn't mean that hidden services are
|
||||
invulnerable. Traditional police techniques can still be very effective
|
||||
against them, such as interviewing suspects, surveillance and keyboard
|
||||
taps, writing style analysis, sting operations, and other physical
|
||||
investigations.</p>
|
||||
against them, such as interviewing suspects, writing style analysis,
|
||||
technical analysis of the content itself, sting operations, keyboard taps,
|
||||
and other physical investigations.</p>
|
||||
|
||||
<p>If you have a complaint about child pornography, you may wish to report
|
||||
it to the National Center for Missing and Exploited Children, which serves
|
||||
as a national coordination point for investigation of child pornography:
|
||||
<a href="http://www.missingkids.com/">http://www.missingkids.com/</a>.
|
||||
We do not view links you report.</p>
|
||||
|
||||
|
||||
<p>The Tor Project also encourages the use of Tor by law enforcement in
|
||||
the investigation, stings, and infiltration of child pornography rings.
|
||||
Please contact us for information on Tor trainings.
|
||||
</p>
|
||||
|
||||
<a id="LegalQuestions"></a>
|
||||
<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user