[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r12634: torusers from jeff (website/trunk/en)
Author: phobos
Date: 2007-12-02 01:39:29 -0500 (Sun, 02 Dec 2007)
New Revision: 12634
Modified:
website/trunk/en/torusers.wml
Log:
torusers from jeff
Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml 2007-12-02 06:11:53 UTC (rev 12633)
+++ website/trunk/en/torusers.wml 2007-12-02 06:39:29 UTC (rev 12634)
@@ -10,11 +10,10 @@
<div class="main-column">
<h1>Who uses Tor?</h1>
-<hr />
<p>
-We're still writing this page; please <a href="<page
-contact>">send us</a> your fixes, comments, and stories!
+If you have a success story with Tor, especially one we
+can link to, please <a href="<page contact>">send us</a> a note!
</p>
<p>
@@ -28,327 +27,317 @@
with a request not to provide details or mention his name.
</p>
-<p>So while each story below represents actual users we've talked to,
-we've done our best to anonymize them when appropriate.
+<p>
+Like any technology, from pencils to cellphones to airplanes, anonymity can be used for both good and evil.
+You have probably seen at least some of the vigorous debate
+(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
+<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
+and
+<a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
+over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF has a good overview</a> of how anonymity was crucial to the founding of the United States and has been recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
+<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
+<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
+<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
+and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support port 25 to prevent anonymous email spamming), or if you're one of the
+<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Internet</a>,
+you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:
</p>
-<hr />
-<h2>People use Tor every day to...</h2>
+<h2>Everyday, ordinary Internet surfers use Tor</h2>
<ul>
-<li>...protect their privacy from unscrupulous marketers</li>
+<li>
+<strong>They protect their privacy from unscrupulous
+marketers and identity thieves.</strong>
+Internet Service Providers (ISPs)
+<a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
+sell your Internet browsing records</a>
+to marketers or anyone else willing to pay for it. They typically say that
+they anonymize it by not providing your username or personally
+identifiable information, but
+<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this is a farce</a>.
+A full record of every
+site you visit, the text of every search you perform, and potentially
+userid and even password information can still be part of this data.
+In addition to your ISP, the websites
+(<a href="http://www.google.com/privacy_faq.html">and search engines</a>)
+you visit have their own logs,
+containing the same or more information.
+</li>
-<p>Anonymity helps defeat marketing that doesn't have your permissions.
-There are all kinds of unscrupulous marketing techniques that track your
-activity
-to build marketing databases, often selling your private information
-without your permission. Tor, used appropriately,
-helps defeat many of these violations
-of your privacy.</p>
+<li>
+<strong> They protect their communications from irresponsible corporations.</strong>
+All over the net, Tor is being recommended to people newly concerned
+about their privacy in the face of increasing breaches and betrayals of
+private data. From
+<a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
+<a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
+your data is often not well protected by those you are supposed to trust to keep it safe.
+</li>
-<li>...protect their children online</li>
-
-<p>“I'm proud my mom and dad let me stay alone at home now.”
+<li>
+<strong>They protect their children online.</strong>
You've told your kids they shouldn't share personally identifying
information online, but they may be sharing their location simply
-by not concealing their IP address. Increasingly, IP
-addresses can be literally mapped to street locations, and in the US the
-government is pushing to get this mapping closer and closer to
-street addresses.
-</p>
+by not concealing their IP address. Increasingly, IP
+addresses can be
+<a href="http://whatismyipaddress.com/">literally mapped to a city or even street location</a>,
+and can
+<a href="http://whatsmyip.org/more/">reveal other information</a>
+about how you are connecting to the Internet.
+In the United States the
+government is pushing to make this mapping increasingly precise.
+</li>
-<li>...research sensitive topics</li>
-
-<p>There's a wealth of information available online. But perhaps in your
-country, access to information on AIDS, birth control, Tibetan culture,
+<li>
+<strong>They research sensitive topics.</strong>
+There's a wealth of information available online. But perhaps in your
+country, access to information on AIDS, birth control,
+<a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
or world religions is behind a national firewall.
Or perhaps you are worried that if you research a particular set of
symptoms, at some later date an insurance company might buy the
logs of the websites you visited and establish that
you had suspicions of a pre-existing condition.
-</p>
+</li>
-<li>...see how the rest of the world lives</li>
+</ul>
-<p>Tor allows you to see the World Wide
-Web from a different perspective. Want to see Google come up in Polish?
-If you leave the Tor cloud at a Polish Tor relay, you'll see what
-Poland sees online. Want to check the differential pricing offered by
-an online retailer or wholesaler to folks in another country, compared
-to the pricing offered to you or your company? Tor can
-provide that window to the world.</p>
-</ul>
-<h2>Journalists use Tor</h2>
-
+<h2>Soldiers in the field use Tor</h2>
<ul>
-<li>Reporters without Borders</li>
+<li>
+<strong>Military field agents:</strong>
+How much, do you imagine, would the Iraqi insurgency pay to find out
+the location of every computer in Baghdad that logged into a military
+server in Maryland to read email? Tor can protect military personnel in
+the field by hiding their location.
+</li>
-<p><a href="http://www.rsf.org/">Reporters without Borders</a> advises
-journalists, sources, bloggers, and dissidents online to use Tor to
-ensure their privacy. RSF tracks internet prisoners of conscience and
-jailed or harmed journalists all over the world.</p>
+<li>
+<strong>Hidden services:</strong>
+When the Internet was designed by DARPA, its primary purpose was to
+be able to facilitate distributed, robust communications in case of
+local strikes. However, some functions must be centralized, such as
+command and control sites. It's the nature of the Internet protocols to
+reveal the geographic location of any server that is reachable online.
+Tor's hidden services capacity allows military command and
+control to be physically secure from discovery and takedown.
+</li>
-<li>IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
+<li>
+<strong>Intelligence gathering:</strong>
+Military personnel need to use electronic resources run and monitored
+by insurgents. Obviously, they do not want the server logs on an insurgent
+website to show a military address, revealing their surveillance.
+</li>
-<p>The US <a href="http://www.ibb.gov/">International Broadcasting
-Bureau</a> supports Tor development to help Internet users in countries
-where they can't get
-safe access to free media. Tor not only protects freedom of expression,
-but preserves the ability of persons behind national firewalls or under
-the surveillance of repressive regimes to view information that gives
-a global perspective on democracy, economics, religion, and other vital
-topics to a full global perspective on culture.</p>
+</ul>
-<li>Reporters in sensitive locations</li>
-<p>Reporters in sensitive environments can use Tor to be more secure in
-filing their stories.</p>
-<li>sources</li>
+<h2>Journalists and their audience use Tor</h2>
-<p>Journalists' sources often use Tor to report sensitive information,
-or to discuss items with journalists from sensitive locations.</p>
+<ul>
+<li><strong>
+<a href="http://www.rsf.org/">Reporters without Borders</a></strong>
+tracks internet prisoners of conscience and
+jailed or harmed journalists all over the world. They advise
+journalists, sources, bloggers, and dissidents to use Tor to
+ensure their privacy and safety.
+</li>
-<li>whistleblowers</li>
+<li>
+<strong>The US <a href="http://www.ibb.gov/">International Broadcasting
+Bureau</a></strong> (Voice of America/Radio Free Europe/Radio Free Asia)
+supports Tor development to help Internet users in countries without
+safe access to free media. Tor
+preserves the ability of persons behind national firewalls or under
+the surveillance of repressive regimes to obtain
+a global perspective on controversial topics including democracy,
+economics and religion.
+</li>
-<p>Likewise, whistleblowers use Tor to safely leave tips on governmental
-and corporate malfeasance.
+<li>
+Although we often think of foreign journalists working in far off lands,
+<strong>citizen journalists in China and other
+<a href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black holes</a>
+use Tor to write about local events</strong> and to encourage social
+change and political reform, more secure that there will not be a knock
+on the door at midnight.
+</li>
-<li>citizen journalism</li>
+</ul>
-<p>Citizen journalists in China and other “Internet black
-holes” use Tor to write about local events and to encourage social
-change and political reform, more secure that there will not be a knock
-on their door at midnight.</p>
+<h2>Law enforcement officers use Tor</h2>
+<ul>
+
+<li>
+<strong>Online surveillance:</strong>
+Tor allows officials to surf questionable web sites and services
+without leaving tell-tale tracks. If the system administrator of an
+illegal gambling site, for example, were to see multiple connections from
+governmental or law enforcement computers in usage logs, investigations
+would be hampered.
+</strong>
+
+<li>
+<strong>Sting operations:</strong>
+Similarly, anonymity allows law officers to engage in online
+“undercover ” operations. Regardless of how good an
+undercover officer's “street cred” may be, if his or her
+email headers include nypd.nyc.ny.state.us, his or her cover is blown.
+</li>
+
+<li>
+<strong>Truly anonymous tip lines:</strong>
+While online anonymous tip lines are popular, without anonymity
+software, they are far less useful. Sophisticated sources understand that
+although a name or email address is not attached to information, server
+logs can identify them very quickly. As a result, tip line web sites that
+do not encourage anonymity are limiting the sources of their tips.
+</li>
+
</ul>
-<h2>Human rights workers use Tor</h2>
-<p>Reporting human rights violations from within their country of origin
-is a task for peaceful warriors. It takes courage and a good eye to risk
-mitigation. Human rights activists use Tor to anonymously report from
-danger zones. Internationally, labor rights workers use Tor and other
-forms of online and offline anonymity to organize workers in accordance
-with the Universal Declaration of Human Rights. Are they within the law?
-But, does that mean they are safe?</p>
+<h2>Activists & whistleblowers use Tor</h2>
<ul>
-<li>Human Rights Watch</li>
+<li>
+<strong>Human rights activists use Tor to anonymously report abuses from
+danger zones.</strong> Internationally, labor rights workers use Tor and other
+forms of online and offline anonymity to organize workers in accordance
+with the Universal Declaration of Human Rights. Even though they are within
+the law, it does not mean they are safe. Tor provides the ability to
+avoid persecution while still raising a voice.
+</li>
-<p>In their report “Race to the Bottom: Corporate
-Complicity in Chinese Internet Censorship,” a study
+<li>
+When groups such as the <strong>Friends Service Committee and environmental
+groups are increasingly
+<a href="http://www.afsc.org/news/2005/government-spying.htm">falling under surveillance</a>
+in the United States</strong>
+under laws meant to protect against terrorism, many peaceful agents of
+change rely on Tor for basic privacy during legitimate activities.
+</li>
+
+<li>
+<strong><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a></strong>
+recommends Tor
+in their report, “
+<a href="http://www.hrw.org/reports/2006/china0806/">Race to the Bottom: Corporate
+Complicity in Chinese Internet Censorship</a>.” The study
co-author interviewed Roger Dingledine, Tor project leader,
on Tor use. They cover Tor in the section on how to breach the <a
href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">“Great
-Firewall of China ”</a></p>
+Firewall of China,”</a>
+and recommend that human rights workers throughout
+the globe use Tor for “secure browsing and communications.”
+</li>
-<p><a href="http://hrw.org/doc/?t=internet">Human Rights Watch</a>
-recommends Tor for human rights workers throughout
-the globe for “secure browsing and communications.”</p>
-
-<li>Amnesty International</li>
-
-<p>Tor has consulted and volunteered help to Amnesty International's
-recent corporate responsibility campaign at
-<a href="http://irrepressible.info/">http://irrepressible.info/</a>.
+<li>
+Tor has consulted with and volunteered help to <strong>Amnesty International's
+recent
+<a href="http://irrepressible.info/">corporate responsibility campaign</a></strong>.
See also their <a
href="http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf">full
-report</a> on China Internet issues.</p>
+report</a> on China Internet issues.
+</li>
-<li>Global Voices</li>
-
-<p>Global Voices can't stop recommending Tor throughout their <a
+<li>
+<a href="http://www.globalvoicesonline.org">Global Voices</a>
+can't stop recommending Tor, especially for <strong>anonynomous blogging</strong>,
+throughout their <a
href="http://www.google.com/search?q=site:www.globalvoicesonline.org+tor">
-web site.</a></p>
+web site.</a>
+</li>
-<li>10% for corruption</li>
+<li>
+In the US, the Supreme Court recently stripped legal protections from
+government whistleblowers. But whistleblowers working for governmental
+transparency or corporate accountability can use Tor to seek justice
+without personal repercussions.
+</li>
-<p>A contact of ours who works with a public health nonprofit in
-Africa reports that his nonprofit must budget 10% to cover various
-sorts of corruption, mostly bribes and such. When that percentage
+<li>
+A contact of ours who works with a public health nonprofit in
+Africa reports that his nonprofit
+<strong>must budget 10% to cover various sorts of corruption</strong>,
+mostly bribes and such. When that percentage
rises steeply, not only can they not afford the money, but they can
not afford to complain — this is the point at which open objection can
-become dangerous. So his nonprofit has been working to use
-Tor to safely whistleblow on governmental corruption in order to continue
-their work more effectively and safely.</p>
+become dangerous. So his nonprofit has been working to
+<strong>use Tor to safely whistleblow on governmental corruption</strong>
+in order to continue their work.
+</li>
-<li>Labor organizers in the US and overseas</li>
-
-<p>At a recent conference a Tor staffer ran into a woman who came from
+<li>
+At a recent conference a Tor staffer ran into a woman who came from
a “company town” in a mountainous area of the
eastern United States. She was attempting to blog anonymously to rally
-local residents to urge reform on the company that dominated the town's
+local residents to
+<strong>urge reform on the company</strong> that dominated the town's
economic and governmental affairs, fully cognizant that the kind of
-organizing she was doing could lead to harm or “fatal
-accidents.”</p>
+organizing she was doing <strong>could lead to harm or “fatal
+accidents.”</strong>
+</li>
-<p>In east Asia, some labor organizers use anonymity to reveal information
-regarding sweatshops that produce goods for western countries and to
-organize local labor.</p>
+<li>
+In east Asia, some labor organizers use anonymity to <strong>reveal information
+regarding sweatshops</strong> that produce goods for western countries and to
+organize local labor.
+</li>
</ul>
-<h2>People with high profile community roles use Tor</h2>
-<p>Does being in the public spotlight shut you off from having a private
+<h2>Both high and low profile people use Tor</h2>
+<ul>
+
+<li>
+Does being in the public spotlight shut you off from having a private
life, forever, online? A rural lawyer in a small New England state keeps
an anonymous blog because, with the diverse clientele at his prestigious
-law firm, his political beliefs are bound to offend someone. Yet, he
+law firm, <strong>his political beliefs are bound to offend someone</strong>. Yet, he
doesn't want to remain silent on issues he cares about. Tor helps him
feel secure that he can express his opinion without consequences to his
-public role.</p>
+public role.
+</li>
-<h2>Poor people use Tor</h2>
-
-<p>People living in poverty often don't participate fully in civil society
+<li>People living in poverty often don't participate fully in civil society
-- not out of ignorance or apathy, but out of fear. If something you
write were to get back to your boss, would you lose your job? If your
social worker read about your opinion of the system, would she treat
-you differently? Anonymity gives a voice to the voiceless.</p>
-
-<ul>
-
-<li>VISTA grant</li>
-
-<p>Tor has an open Americorps/VISTA position. This
+you differently? Anonymity gives a voice to the voiceless.
+To support this,
+<strong>Tor currently has an open Americorps/VISTA position</strong> pending. This
government grant will cover a full time stipend for a volunteer to create
-curricula to show low-income populations how to use anonymity online for
-safer civic engagement. Although it's often said that the poor do not use
+curricula to <strong>show low-income populations how to use anonymity online for
+safer civic engagement</strong>. Although it's often said that the poor do not use
online access for civic engagment, failing to act in their self-interests,
it is our hypothesis (based on personal conversations and anecdotal
information) that it is precisely the “permanent record ”
left online that keeps many of the poor from speaking out on the Internet.
-Where speaking out on social programs or job related issues might seem
-in their enlightened self interest, they see things closer to home.
-The boss or social worker or educational advisor virtually looking over
-their shoulder could put a fragile situation into a tailspin.</p>
-
-<p>We hope to show people how to more safely engage online, and then at
+We hope to show people how to engage more safely online, and then at
the end of the year, evaluate how online and offline civic engagement has
-changed, and how the population sees this continuing in clear channels
-and anonymously into the future.</p>
+changed, and how the population sees this continuing into the future.
+</li>
</ul>
-<h2>People who care about privacy, in general, increasingly use Tor</h2>
-<p>In the section below on recent media mentions of Tor, it becomes
-clear that the recent revelation of users' browsing patterns by AOL has
-piqued the conscience of the everyday Internet surfer in more privacy.
-All over the net, Tor is being recommended to people newly concerned
-about their privacy in the face of increasing breaches and betrayals of
-private data.</p>
-
-<h2>Soldiers in the field use Tor</h2>
-
-<ul>
-
-<li>Field agents</li>
-
-<p>How much, do you imagine, would the Iraqi insurgency pay to find out
-the location of every computer in Baghdad that logged into a military
-server in Maryland to read email? Tor can protect military personnel in
-the field by hiding their location, and even by concealing the location
-of Command and Control servers.</p>
-
-<li>Hidden services</li>
-
-<p>When the Internet was designed by DARPA, its primary purpose was to
-be able to facilitate distributed, robust communications in case of
-local strikes. However, some functions must be centralized, such as
-command and control sites. It's the nature of the Internet protocols to
-reveal the geographic location of any server that is reachable online,
-however Tor's hidden services capacity allows military command and
-control to be physically secure from discovery and takedown.</p>
-
-</ul>
-
-<h2>Law enforcement officers use Tor</h2>
-
-<p>Undercover officers use Tor to conceal their IP address during
-sting operations. “Anonymous tip lines” may still
-preserve a log of IP addresses, if the informant isn't using Tor.</p>
-
-<ul>
-
-<li>online surveillance</li>
-
-<p>Tor allows officials to surf questionable web sites and services
-without leaving tell-tale tracks. If the system administrator of an
-illegal gambling site, for example, were to see multiple connections from
-governmental or law enforcement computers in usage logs, investigations
-would be hampered.</p>
-
-<li>sting operations</li>
-
-<p>Similarly, anonymity allows law officers to engage in online
-“undercover ” operations. Regardless of how good an
-undercover officer's “street cred” may be, if his or her
-email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p>
-
-<li>truly anonymous tip lines</li>
-
-<p>While online anonymous tip lines are popular, without anonymity
-software, they are far less useful. Sophisticated sources understand that
-although a name or email address is not attached to information, server
-logs can identify them very quickly. As a result, tip line web sites that
-do not encourage anonymity are limiting the sources of their tips.</p>
-
-</ul>
-
-<h2>Whistleblowers use Tor</h2>
-
-<p>In the US, the Supreme Court recently stripped legal protections from
-government whistleblowers. But whistleblowers working for governmental
-transparency or corporate accountability can use Tor to seek justice
-without personal repercussions.</p>
-
-<h2>Bloggers use Tor</h2>
-
-<p>Every day we hear about bloggers who are sued or fired for saying
-perfectly legal things online, in their blog. In addition to following
-the guidelines of EFF's Guide and RSF's guide, we recommend using Tor.</p>
-
-<h2>Citizens of repressive regimes use Tor</h2>
-
-<p>Whether to read information on censored topics (such as AIDS, Tibet,
-or democracy), or to write about controversial topics, people inside
-oppressive regimes can risk life and livelihood. Tor helps cover the
-tracks of dissidents, foreign nationals, or even just people who want
-free accesss to information most of us take for granted.</p>
-
-<h2>People organizing for change use Tor</h2>
-
-<ul>
-<li>union organizers/labor activists</li>
-
-See mentions above
-
-<li>democracy activists/dissidents</li>
-
-See mentions above
-
-<li>peace/green activists</li>
-
-<p>When groups such as the Friends Service Committee and environmental
-groups are increasingly falling under surveillance in the United States
-under laws meant to protect against terrorism, many peaceful agents of
-change rely on Tor for basic privacy for legitimate activities.</p>
-
-</ul>
-
<h2>Business executives use Tor</h2>
<ul>
-<li>security breach information clearinghouses</li>
-
-<p>Say a financial institution participates in a security clearinghouse
+<li>
+<strong>Security breach information clearinghouses:</strong>
+Say a financial institution participates in a security clearinghouse
of information on Internet attacks. Such a repository requires members
to report breaches to a central group, who correlates attacks to detect
coordinated patterns and send out alerts. But if a specific bank in
@@ -356,35 +345,58 @@
traffic to such a repository to be able to track where information is
coming from. Even though every packet were encrypted, the Internet
address would betray the location of a compromised system. Tor allows
-such repositories of sensitive information to resist compromises.</p>
+such repositories of sensitive information to resist compromises.
+</li>
-<li>seeing your competition as your market does</li>
-
-<p>If you try to check out a competitor's pricing, you may find no
+<li>
+<strong>Seeing your competition as your market does:</strong>
+If you try to check out a competitor's pricing, you may find no
information or misleading information on their web site. This is because
their web server may be keyed to detect connections from competitors,
and block or spread disinformation to your staff. Tor allows a business
-to view their sector as the general public would view it.</p>
+to view their sector as the general public would view it.
+</li>
-<li>keeping strategies confidential</li>
-
-<p>An investment bank, for example, might not want industry snoopers to be
+<li>
+<strong>Keeping strategies confidential:</strong>
+An investment bank, for example, might not want industry snoopers to be
able to track what web sites their analysts are watching. The strategic
importance of traffic patterns, and the vulnerability of the surveillance
of such data, is starting to be more widely recognized in several areas
-of the business world.</p>
+of the business world.
+</li>
-<li>accountability</li>
-
-<p>In an age when irresponsible and unreported corporate activity has
+<li>
+<strong>Accountability:</strong>
+In an age when irresponsible and unreported corporate activity has
undermined multi-billion dollar businesses, an executive exercising true
stewardship wants the whole staff to feel free to disclose internal
malfeasance. Tor facilitates internal accountability before it turns
-into whistleblowing.</p>
+into whistleblowing.
+</li>
</ul>
+
+<h2>Bloggers use Tor</h2>
+<ul>
+<li>
+Every day we hear about bloggers who are
+<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
+<a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
+for saying perfectly legal things online, in their blog. In addition to following
+the advice in the
+<a href="http://w2.eff.org/bloggers/lg/">EFF Legal Guide for Bloggers</a>
+and Reporters Without Borders'
+<a href="http://www.rsf.org/rubrique.php3?id_rubrique=542">Handbook for bloggers and cyber-dissidents</a>,
+we recommend using Tor.
+</li>
+
+</ul>
+
+
+
+
</div><!-- #main -->
#include <foot.wmi>
-