mirror of
https://github.com/torproject/webwml.git
synced 2024-12-02 15:36:30 +00:00
138 lines
5.7 KiB
HTML
138 lines
5.7 KiB
HTML
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
|
|
|
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
|
|
<head>
|
|
<title>Tor: Overview</title>
|
|
<meta name="Author" content="Roger Dingledine" />
|
|
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
|
|
<link rel="stylesheet" type="text/css" href="default.css" />
|
|
</head>
|
|
|
|
<body>
|
|
<div class="menu" id="side">
|
|
<!-- <img id="logo" src="tor.jpg" alt="cute tor gate" /> -->
|
|
<a href="index.html">Home</a> <br />
|
|
<a href="howitworks.html">How it works</a> <br />
|
|
<a href="download.html">Download</a> <br />
|
|
<a href="documentation.html">Documentation</a><br />
|
|
<a href="contribute.html">Contribute</a> <br />
|
|
<a href="developers.html">Developers</a> <br />
|
|
<a href="research.html">Research</a> <br />
|
|
<a href="people.html">People</a> <br />
|
|
</div><!-- #side -->
|
|
<div class="main" id="main">
|
|
|
|
<h2>Tor: Overview</h2>
|
|
|
|
<h3>Traffic analysis</h3>
|
|
<p>
|
|
Traffic analysis can be used to infer who is talking to whom over a
|
|
public network. For example, Internet packets have a header used for
|
|
routing, and a payload that carries the data. The header, which must be
|
|
visible to the network (and to observers of the network), reveals the
|
|
source and destination of the packet. Even if the header were obscured
|
|
in some way, the packet could still be tracked as it moves through the
|
|
network. Encrypting the payload is similarly ineffective, because the
|
|
routing information is all an observer needs.
|
|
</p>
|
|
|
|
<p>
|
|
Knowing the source and destination of your Internet traffic allows
|
|
somebody to track your behavior and interests, impacting your checkbook or
|
|
even threatening your job or physical safety.
|
|
</p>
|
|
|
|
<p>
|
|
Individuals, corporations, and governments all have an interest in
|
|
traffic analysis protection. Individuals want to protect themselves and
|
|
their family members from remote websites, or connect to resources such
|
|
as news sites or instant messaging services that are blocked locally.
|
|
User groups such as the German "Diabetes People" organization recommend
|
|
Tor for their members' online privacy and security. Activist groups such
|
|
as the Electronic Frontier Foundation are publicizing Tor as a mechanism
|
|
for maintaining civil liberties online. Corporations such as Google and
|
|
Wal-Mart are investigating Tor as a safe avenue for competitive analysis
|
|
or to try out new experimental projects without associating their name
|
|
with the project. A branch of the U.S. Navy uses Tor for open source
|
|
intelligence gathering, and one of their teams used Tor while deployed
|
|
in the Middle East recently.
|
|
</p>
|
|
|
|
<h3>Network structure</h3>
|
|
<p>
|
|
Tor helps to reduce the traffic analysis risk by distributing your
|
|
transactions over several places on the Internet, so no single point can
|
|
link you to your destination. To make private connections in Tor, a client
|
|
incrementally builds a path or <em>circuit</em> of encrypted connections
|
|
through servers on the network, extending it one step at a time so that
|
|
each server in the circuit only learns which server extended to it and
|
|
which server it has been asked to extend to. The client negotiates a
|
|
separate set of encryption keys for each step along the circuit.
|
|
</p>
|
|
|
|
<p>
|
|
[Insert snazzy onion diagram here.]
|
|
</p>
|
|
|
|
<p>
|
|
Once a circuit has been established, the client software waits for
|
|
applications to request TCP connections, and directs these application
|
|
streams along the circuit. Many streams can be multiplexed along a single
|
|
circuit, so applications don't need to wait for keys to be negotiated
|
|
every time they open a connection. Because each server sees no
|
|
more than one end of the connection, a local eavesdropper or a compromised
|
|
server cannot use traffic analysis to link the connection's source and
|
|
destination. The Tor client software rotates circuits periodically
|
|
to prevent long-term linkability between different actions by a
|
|
single user.
|
|
</p>
|
|
|
|
<!--
|
|
<p>
|
|
Many protocols, not just web.
|
|
</p>
|
|
-->
|
|
|
|
<p>
|
|
Tor also makes it possible for the clients to be hidden. Using Tor
|
|
"rendezvous points," other Tor clients can connect to these hidden
|
|
services, each without knowing the other's network identity. These hidden
|
|
websites let users publish material without worrying about censorship.
|
|
</p>
|
|
|
|
<h3>Privacy</h3>
|
|
<p>
|
|
Of course, Tor can't solve all privacy problems itself. Tor focuses on
|
|
protecting the <em>transport</em>. You need to use other protocol-specific
|
|
software, such as Privoxy for web browsing, to clean identifying
|
|
information like browser type and characteristics, and you need
|
|
to use other common sense: don't provide your name or other
|
|
revealing information in web forms. Also, like all anonymizing networks
|
|
that are fast enough for web browsing, Tor does not provide protection
|
|
against end-to-end timing attacks: if your attacker can watch the traffic
|
|
coming out of your computer, and also the traffic arriving at your chosen
|
|
destination, he can use simple statistics to discover that they are part
|
|
of the same circuit.
|
|
</p>
|
|
|
|
<p>
|
|
Anonymity is threatened as never before by trends in law, policy, and
|
|
technology that are undermining our ability to speak and read freely
|
|
online without revealing who we are. Rather than trusting to laws to
|
|
maintain our rights, Tor aims to give people the power to make their own
|
|
decisions about their privacy. Providing a usable anonymizing network on
|
|
the Internet today is an ongoing challenge, both in terms of making
|
|
usable software that meets users' needs, and also in terms of keeping the
|
|
network up and able to handle all the users; but we're making progress
|
|
at finding a good balance to provide both usability and security. Please
|
|
do what you can to help out.
|
|
</p>
|
|
|
|
</div><!-- #main -->
|
|
<div class="bottom" id="bottom">
|
|
<i><a href="mailto:tor-webmaster@freehaven.net">Webmaster</a></i> -
|
|
$Id$
|
|
</div>
|
|
</body>
|
|
</html>
|