[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r12808: content updates and restructuring per paul's suggestion. (website/trunk/en)
Author: phobos
Date: 2007-12-14 00:50:01 -0500 (Fri, 14 Dec 2007)
New Revision: 12808
Modified:
website/trunk/en/torusers.wml
Log:
content updates and restructuring per paul's suggestion.
Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml 2007-12-14 05:30:18 UTC (rev 12807)
+++ website/trunk/en/torusers.wml 2007-12-14 05:50:01 UTC (rev 12808)
@@ -9,34 +9,7 @@
<div class="main-column">
<h1>Who uses Tor?</h1>
-<p>If you have a success story with Tor, especially one we
-can link to, please <a href="<page contact>">send us</a> a note!</p>
-<p>Tor provides anonymity: when it succeeds, nobody notices. This is
-great for users, but not so good for us, since publishing success
-stories about how people or organizations are staying anonymous could be
-counterproductive. For example, we talked to an FBI officer who explained that he uses Tor every day for his
-work — but he quickly followed up with a request not to provide details or mention his name.</p>
-<p> Like any technology, from pencils to cellphones, anonymity can be
-used for both good and bad. You have probably seen some of the vigorous debate
-(<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
-<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>,
-and <a href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>)
-over anonymity. The Tor project is based on the belief that anonymity is
-not just a good idea some of the time - it is a requirement for a free
-and functioning society. The <a
-href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a>
-of how anonymity was crucial to the founding of the United States.
-Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
-<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
-<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
-<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
-and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
-are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
-the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
-purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
-<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
-you have better options than Tor. While not dismissing the potential abuses of Tor, here are just a few of the many important ways anonymity is used today:</p>
-
+<a link="normalusers"></a>
<h2>Everyday, ordinary Internet surfers use Tor</h2>
<ul>
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
@@ -44,10 +17,8 @@
sell your Internet browsing records</a> to marketers or anyone else
willing to pay for it. ISPs typically say that
they anonymize the data by not providing personally identifiable information, but
-<a
-href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
-has proven incorrect</a>.
-A full record of every site you visit, the text of every search you perform, and potentially
+<a href="http://www.wired.com/politics/security/news/2006/08/71579?currentPage=all">this
+has proven incorrect</a>. A full record of every site you visit, the text of every search you perform, and potentially
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
</li>
<li><strong> They protect their communications from irresponsible corporations.</strong>
@@ -70,10 +41,10 @@
</li>
</ul>
+<a link="military"></a>
<h2>Militaries use Tor</h2>
<ul>
-<li><strong>Field agents:</strong>
-Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research
+<li>Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research
Laboratory, and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
</li>
<li><strong>Hidden services:</strong>
@@ -83,12 +54,12 @@
control to be physically secure from discovery and takedown.
</li>
<li><strong>Intelligence gathering:</strong>
-Military personnel need to use electronic resources run and monitored by
-insurgents. They do not want the webserver logs on an insurgent website
+Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
to record a military address, thereby revealing the surveillance.
</li>
</ul>
+<a link="journalist"></a>
<h2>Journalists and their audience use Tor</h2>
<ul>
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
@@ -112,6 +83,7 @@
</li>
</ul>
+<a link="lawenforcement"></a>
<h2>Law enforcement officers use Tor</h2>
<ul>
<li><strong>Online surveillance:</strong>
@@ -136,6 +108,7 @@
</li>
</ul>
+<a link="activists"></a>
<h2>Activists & whistleblowers use Tor</h2>
<ul>
<li><strong>Human rights activists use Tor to anonymously report abuses from
@@ -195,7 +168,7 @@
</li>
</ul>
-
+<a link="spotlight"></a>
<h2>Both high and low profile people use Tor</h2>
<ul>
<li>Does being in the public spotlight shut you off from having a private
@@ -225,6 +198,7 @@
</li>
</ul>
+<a link="executives"></a>
<h2>Business executives use Tor</h2>
<ul>
<li><strong>Security breach information clearinghouses:</strong>
@@ -261,6 +235,7 @@
</li>
</ul>
+<a link="bloggers"></a>
<h2>Bloggers use Tor</h2>
<ul>
<li>Every day we hear about bloggers who are
@@ -272,5 +247,29 @@
we recommend using Tor.
</li>
</ul>
-</div><!-- #main -->
+<p>
+Please do send us your success stories. They are very important because
+Tor provides anonymity. While it is thrilling speculate about <a
+href="<page contact>">undesired effects of Tor</a>, when it succeeds, nobody notices. This is
+great for users, but not so good for us, since publishing success
+stories about how people or organizations are staying anonymous could be
+counterproductive. For example, we talked to an FBI officer who
+explained that he uses Tor every day for his work — but he quickly followed up with a request not to provide
+details or mention his name.</p>
+<p> Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous
+debate (<a href="http://www.wired.com/politics/security/commentary/securitymatters/2006/01/70000">pro</a>,
+<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
+href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
+just a good idea some of the time - it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
+<a href="https://www.crimeline.co.za/default.asp">police tip lines</a>,
+<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
+<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
+and so forth. It would be impossible to rehash the entire anonymity debate here - it is too large an issue with too many nuances, and there
+are plenty of other places where this information can be found. We do have a <a href="page faq-abuse">Tor abuse</a> page describing some of
+the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you'll either find it mostly closed for your
+purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
+<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
+you have better options than Tor. While not dismissing the potential abuses of Tor,
+this page shows a few of the many important ways anonymity is used today.</p>
+</div>
#include <foot.wmi>