mirror of
https://github.com/torproject/webwml.git
synced 2025-03-09 04:41:06 +00:00
strip trailing whitespace (no changes)
This commit is contained in:
parent
52db02f313
commit
4dce17212d
@ -24,7 +24,7 @@
|
||||
</ul>
|
||||
</div>
|
||||
<!-- END SIDEBAR -->
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
<a name="inception"></a>
|
||||
@ -39,7 +39,7 @@
|
||||
for a wide variety of purposes by normal people, the military,
|
||||
journalists, law enforcement officers, activists, and many
|
||||
others. </p>
|
||||
|
||||
|
||||
<a name="overview"></a>
|
||||
<h3><a class="anchor" href="#overview">Overview</a></h3>
|
||||
|
||||
@ -52,7 +52,7 @@
|
||||
to share information over public networks without compromising their
|
||||
privacy.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Individuals use Tor to keep websites from tracking them and their family
|
||||
members, or to connect to news sites, instant messaging services, or the
|
||||
@ -63,7 +63,7 @@
|
||||
communication: chat rooms and web forums for rape and abuse survivors,
|
||||
or people with illnesses.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Journalists use Tor to communicate more safely with whistleblowers and
|
||||
dissidents. Non-governmental organizations (NGOs) use Tor to allow their
|
||||
@ -71,7 +71,7 @@
|
||||
country, without notifying everybody nearby that they're working with
|
||||
that organization.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Groups such as Indymedia recommend Tor for safeguarding their members'
|
||||
online privacy and security. Activist groups like the Electronic Frontier
|
||||
@ -84,7 +84,7 @@
|
||||
consulting job-hunting websites? Which research divisions are communicating
|
||||
with the company's patent lawyers?
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
A branch of the U.S. Navy uses Tor for open source intelligence
|
||||
gathering, and one of its teams used Tor while deployed in the Middle
|
||||
@ -92,7 +92,7 @@
|
||||
web sites without leaving government IP addresses in their web logs,
|
||||
and for security during sting operations.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
The variety of people who use Tor is actually <a
|
||||
href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
|
||||
@ -101,10 +101,10 @@
|
||||
so the more populous and diverse the user base for Tor is, the more your
|
||||
anonymity will be protected.
|
||||
</p>
|
||||
|
||||
|
||||
<a name="whyweneedtor"></a>
|
||||
<h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Using Tor protects you against a common form of Internet surveillance
|
||||
known as "traffic analysis." Traffic analysis can be used to infer
|
||||
@ -119,7 +119,7 @@
|
||||
affiliation to anyone observing the network, even if the connection
|
||||
is encrypted.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
How does traffic analysis work? Internet data packets have two parts:
|
||||
a data payload and a header used for routing. The data payload is
|
||||
@ -129,7 +129,7 @@
|
||||
possibly, what you're saying. That's because it focuses on the header,
|
||||
which discloses source, destination, size, timing, and so on.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
A basic problem for the privacy minded is that the recipient of your
|
||||
communications can see that you sent it by looking at headers. So can
|
||||
@ -138,7 +138,7 @@
|
||||
analysis might involve sitting somewhere between sender and recipient on
|
||||
the network, looking at headers.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
But there are also more powerful kinds of traffic analysis. Some
|
||||
attackers spy on multiple parts of the Internet and use sophisticated
|
||||
@ -147,11 +147,11 @@
|
||||
these attackers, since it only hides the content of Internet traffic, not
|
||||
the headers.
|
||||
</p>
|
||||
|
||||
|
||||
<a name="thesolution"></a>
|
||||
<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
|
||||
<img src="$(IMGROOT)/htw1.png" alt="How Tor works">
|
||||
|
||||
|
||||
<p>
|
||||
Tor helps to reduce the risks of both simple and sophisticated traffic
|
||||
analysis by distributing your transactions over several places on the
|
||||
@ -163,7 +163,7 @@
|
||||
through several relays that cover your tracks so no observer at any
|
||||
single point can tell where the data came from or where it's going.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
To create a private network pathway with Tor, the user's software or
|
||||
client incrementally builds a circuit of encrypted connections through
|
||||
@ -174,9 +174,9 @@
|
||||
separate set of encryption keys for each hop along the circuit to ensure
|
||||
that each hop can't trace these connections as they pass through.
|
||||
</p>
|
||||
|
||||
|
||||
<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png"></p>
|
||||
|
||||
|
||||
<p>
|
||||
Once a circuit has been established, many kinds of data can be exchanged
|
||||
and several different sorts of software applications can be deployed
|
||||
@ -186,20 +186,20 @@
|
||||
only works for TCP streams and can be used by any application with SOCKS
|
||||
support.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
For efficiency, the Tor software uses the same circuit for connections
|
||||
that happen within the same ten minutes or so. Later requests are given a
|
||||
new circuit, to keep people from linking your earlier actions to the new
|
||||
ones.
|
||||
</p>
|
||||
|
||||
|
||||
<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>
|
||||
|
||||
|
||||
|
||||
|
||||
<a name="hiddenservices"></a>
|
||||
<h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Tor also makes it possible for users to hide their locations while
|
||||
offering various kinds of services, such as web publishing or an instant
|
||||
@ -213,10 +213,10 @@
|
||||
hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
|
||||
service protocol</a> works.
|
||||
</p>
|
||||
|
||||
|
||||
<a name="stayinganonymous"></a>
|
||||
<h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Tor can't solve all anonymity problems. It focuses only on
|
||||
protecting the transport of data. You need to use protocol-specific
|
||||
@ -225,7 +225,7 @@
|
||||
while browsing the web to withhold some information about your computer's
|
||||
configuration.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Also, to protect your anonymity, be smart. Don't provide your name
|
||||
or other revealing information in web forms. Be aware that, like all
|
||||
@ -235,10 +235,10 @@
|
||||
arriving at your chosen destination, he can use statistical analysis to
|
||||
discover that they are part of the same circuit.
|
||||
</p>
|
||||
|
||||
|
||||
<a name="thefutureoftor"></a>
|
||||
<h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Providing a usable anonymizing network on the Internet today is an
|
||||
ongoing challenge. We want software that meets users' needs. We also
|
||||
@ -252,7 +252,7 @@
|
||||
or <a href="<page getinvolved/volunteer>">volunteering</a> as a
|
||||
<a href="<page docs/documentation>#Developers">developer</a>.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Ongoing trends in law, policy, and technology threaten anonymity as never
|
||||
before, undermining our ability to speak and read freely online. These
|
||||
@ -262,7 +262,7 @@
|
||||
provides additional diversity, enhancing Tor's ability to put control
|
||||
over your security and privacy back into your hands.
|
||||
</p>
|
||||
|
||||
|
||||
</div>
|
||||
<!-- END MAINCOL -->
|
||||
<div id = "sidecol">
|
||||
@ -272,4 +272,4 @@
|
||||
<!-- END SIDECOL -->
|
||||
</div>
|
||||
<!-- END CONTENT -->
|
||||
#include <foot.wmi>
|
||||
#include <foot.wmi>
|
||||
|
Loading…
x
Reference in New Issue
Block a user