[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r21120: {website} add a new question and answer about .onion domains. (website/trunk/en)
Author: phobos
Date: 2009-12-08 01:56:43 -0500 (Tue, 08 Dec 2009)
New Revision: 21120
Modified:
website/trunk/en/faq-abuse.wml
Log:
add a new question and answer about .onion domains.
Modified: website/trunk/en/faq-abuse.wml
===================================================================
--- website/trunk/en/faq-abuse.wml 2009-12-07 23:24:52 UTC (rev 21119)
+++ website/trunk/en/faq-abuse.wml 2009-12-08 06:56:43 UTC (rev 21120)
@@ -22,6 +22,7 @@
<li><a href="<page faq-abuse>#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>
<li><a href="<page faq-abuse>#Bans">I want to ban the Tor network from my service.</a></li>
<li><a href="<page faq-abuse>#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>
+<li><a href="<page faq-abuse>#RemovingContent">I want some content removed from a .onion address.</a></li>
<li><a href="<page faq-abuse>#LegalQuestions">I have legal questions about Tor abuse.</a></li>
</ul>
</div>
@@ -341,6 +342,23 @@
analysis, sting operations, and other physical investigations.
</p>
+<a id="ContentRemoval"></a>
+<h3><a class="anchor" href="#ContentRemoval">I want some content removed from a .onion address.</a></h3>
+<p>The Tor Project does not host, control, nor have the ability to
+discover the owner or location of a .onion address. The .onion address is
+an address from <a href="<page docs/tor-hidden-service>">a hidden
+service</a>. The name you see ending in .onion is a hidden service descriptor.
+It's an automatically generated name which can be located on any Tor
+relay or client anywhere on the Internet. Hidden services are designed
+to protect both the user and service provider from discovering who they
+are and where they are from. The design of hidden services means the
+owner and location of the .onion site is hidden even from us.</p>
+<p>But remember that this doesn't mean that hidden services are
+invulnerable. Traditional police techniques can still be very effective
+against them, such as interviewing suspects, surveillance and keyboard
+taps, writing style analysis, sting operations, and other physical
+investigations.</p>
+
<a id="LegalQuestions"></a>
<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>