[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r12843: commiting jeff's diff (website/trunk/en)



Author: phobos
Date: 2007-12-17 00:11:02 -0500 (Mon, 17 Dec 2007)
New Revision: 12843

Modified:
   website/trunk/en/torusers.wml
Log:
commiting jeff's diff


Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml	2007-12-16 20:47:20 UTC (rev 12842)
+++ website/trunk/en/torusers.wml	2007-12-17 05:11:02 UTC (rev 12843)
@@ -9,6 +9,14 @@
 
 <div class="main-column">
 <h1>Who uses Tor?</h1>
+
+<p>
+Tor was originally designed, implemented, and deployed as a third-generation
+<a href="http://www.onion-router.net/";>onion routing project of the Naval Research Laboratory</a>,
+and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
+Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend.
+</p>
+
 <a link="normalusers"></a>
 <h2>Everyday, ordinary Internet surfers use Tor</h2>
 <ul>
@@ -44,9 +52,17 @@
 <a link="military"></a>
 <h2>Militaries use Tor</h2>
 <ul>
-<li>Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research
-Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
+
+<li>
+<strong>Field Agents:</strong>
+It is not difficult for insurgents to monitor internet traffic and
+discover all the hotels and other locations from which people are
+connecting to known military servers.
+Military field agents deployed away from home have used Tor to
+mask the sites they are visiting, protecting military interests and
+operations, as well as protecting themselves from physical harm.
 </li>
+
 <li><strong>Hidden services:</strong>
 When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
 local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to
@@ -166,6 +182,12 @@
 regarding sweatshops</strong> that produce goods for western countries and to
 organize local labor.
 </li>
+<li>
+Tor can help activists avoid government or corporate censorship that hinders organization.
+In one such case, a
+<a href="http://www.cbc.ca/story/canada/national/2005/07/24/telus-sites050724.html";>Canadian ISP blocked access to a union website used by their own employees</a>
+to help organize a strike.
+</li>
 </ul>
 
 <a link="spotlight"></a>
@@ -256,6 +278,7 @@
 counterproductive.  For example, we talked to an FBI officer who
 explained that he uses Tor every day for his work &mdash; but he quickly followed up with a request not to provide
 details or mention his name.</p>
+
 <p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad.  You have probably seen some of the vigorous
 debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000";>pro</a>,
 <a href="http://www.edge.org/q2006/q06_4.html#kelly";>con</a>, and <a