From 83633acb816f5ffe6bcac1d3afcc1269c75c3a3c Mon Sep 17 00:00:00 2001 From: Andrew Lewman Date: Thu, 16 Sep 2010 16:20:47 +0000 Subject: [PATCH] Release the paper on 10 things to look for in a circumvention tool. --- ...0-09-16-ten-things-circumvention-tools.wml | 70 ++++++++++++++++++ press/en/index.wml | 1 + .../2010-09-16-circumvention-features.pdf | Bin 0 -> 307933 bytes 3 files changed, 71 insertions(+) create mode 100644 press/en/2010-09-16-ten-things-circumvention-tools.wml create mode 100644 press/presskit/2010-09-16-circumvention-features.pdf diff --git a/press/en/2010-09-16-ten-things-circumvention-tools.wml b/press/en/2010-09-16-ten-things-circumvention-tools.wml new file mode 100644 index 00000000..3ec5a8da --- /dev/null +++ b/press/en/2010-09-16-ten-things-circumvention-tools.wml @@ -0,0 +1,70 @@ +## translation metadata +# Revision: $Revision: 22100 $ +# Translation-Priority: 4-optional + +#include "head.wmi" TITLE="Ten Things to Look for in a Circumvention Tool" CHARSET="UTF-8" + +
+ + + +

FOR IMMEDIATE RELEASE

+ +

TOR PROJECT RELEASES CIRCUMVENTION TOOL ARTICLE

+ +

WALPOLE, MA The Tor Project releases an article about +the "Ten +Things to Look for in a Circumvention Tool". As more countries +crack down on Internet use, people around the world are turning to +anti-censorship software that lets them reach blocked websites. Many +types of software, also known as circumvention tools, have been created +to answer the threat to freedom online. These tools provide different +features and levels of security, and it's important for users to +understand the tradeoffs.

+ +

This article lays out ten features you should consider when evaluating +a circumvention tool. The goal isn't to advocate for any specific +tool, but to point out what kind of tools are useful for different +situations.

+ +

Tor's tools and technologies are already used by millions of people +to protect their activities online. These users include journalists and +human rights workers in politically rigid countries communicating with +whistleblowers and dissidents. Law enforcement officers on Internet +sting operations stay anonymous with Tor, as do people wanting to post +socially sensitive information in chat rooms, like rape or abuse survivors +and those with illnesses.  The Tor network also provides protection +for people looking for another layer of privacy from the millions of +websites and ISPs bent on collecting private information and tracking +their moves online.

+ +

ABOUT THE TOR PROJECT

+ +

Based in Walpole, MA, The Tor Project develops free and open-source +software that provides online anonymity to the everyday Internet +user. Tor was born out of a collaboration with the U.S. Naval Research +Lab starting in 2001, and it became an official U.S. 501(c)(3) non-profit +in 2006. The Tor Project now works with many individuals, NGOs, law +enforcement agencies, and businesses globally to help them protect their +anonymity online.

+ +

In addition to its efforts developing and maintaining the Tor anonymity +software and the Tor network, The Tor Project also helps to lead the +research community in understanding how to build and measure scalable and +secure anonymity networks. The Tor developers publish several new research +papers each year in major academic security conferences, and just about +every major security conference these days includes a Tor-related paper. +Tor is a project-funded organization with a staff of 15.

+ +

The "Onion Logo" and "Tor" wordmark are registered trademarks +of The Tor Project, Inc.

+ +

Contact: Andrew Lewman

+

Tel: +1-781-424-9877

+

Email: execdir@torproject.org

+

Website: Tor Project

+
###
+ +
+ +#include diff --git a/press/en/index.wml b/press/en/index.wml index 03b471be..0e11e56f 100644 --- a/press/en/index.wml +++ b/press/en/index.wml @@ -24,6 +24,7 @@ execdir@torproject.org

Press Releases