[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r12072: put together a new website frontpage, as a frankenstein from (website/trunk/en)
Author: arma
Date: 2007-10-21 04:48:45 -0400 (Sun, 21 Oct 2007)
New Revision: 12072
Modified:
website/trunk/en/index.wml
Log:
put together a new website frontpage, as a frankenstein from shava's
oct 2006 draft and jeff's new draft, plus some glue and some important
topics that weren't in either of them.
Modified: website/trunk/en/index.wml
===================================================================
--- website/trunk/en/index.wml 2007-10-21 04:41:00 UTC (rev 12071)
+++ website/trunk/en/index.wml 2007-10-21 08:48:45 UTC (rev 12072)
@@ -25,42 +25,87 @@
<hr />
<p>
-Tor is a toolset for a wide range of organizations and people that want
-to improve their safety and security on the Internet. Using Tor can help
-you anonymize web browsing and publishing, instant messaging, IRC, SSH,
-and other applications that use the TCP protocol. Tor also provides a
-platform on which software developers can build new applications with
-built-in anonymity, safety, and privacy features.
+Tor covers your tracks on the web. When you connect to the Internet from
+your computer, you leave a return address that's like a calling card,
+everywhere you go. Even if you don't log into a site with a username and
+password, you leave information on what IP address you came from and when.
</p>
<p>
-Tor aims to defend against <a href="<page overview>">traffic analysis</a>,
-a form of network surveillance that threatens personal
-anonymity and privacy, confidential business activities and relationships,
-and state security.
-Communications are bounced around a distributed network of servers called
-onion routers, <a
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#WhatProtections">protecting you</a>
-from websites that build profiles of your interests,
-local eavesdroppers that read your data or learn what sites you visit,
-and even the onion routers themselves.
+Since this is all the information that is usually needed to find out
+who was on the other end of the wire, marketers, governments, and other
+curious parties can trace you by tracing the activity associated with
+your IP address.
</p>
<p>
-Tor's security is improved as its user base grows and as
-more people volunteer to run servers. Please consider
-<a href="<page volunteer>">volunteering your time</a> or
-<a href="<page docs/tor-doc-server>">volunteering your
-bandwidth</a>.
-And remember that this is development code—it's not a good idea to rely
-solely on the current Tor network if you really need strong anonymity.
+Tor hides your IP address. It's like blocking your caller ID.
</p>
+<p>
+Hundreds of thousands of people around the world use Tor — <a
+href="<page whousestor>">journalists and bloggers, human rights workers,
+law enforcement officers, soldiers, corporations, citizens of repressive
+regimes, and just ordinary citizens</a>. We have a full page devoted
+to explaining exactly <a href="<page overview>">what Tor does, why this
+diversity of users is important, and how Tor works</a>.
+</p>
+
+<p>
+To quickly start using Tor, we recommend the
+<a href="<page download>">Vidalia bundle</a>
+as the easiest to install and get working.
+</p>
+
+<p>
+There are three pieces of fine print you need to know about.
+First, Tor does not protect you if you do not use it correctly.
+Read <a href="<page download>#Warnings">our list of warnings</a> and
+make sure to follow the
+<a href="<page documentation>#RunningTor">instructions for your platform</a>
+carefully. Second, even if you configure and use Tor correctly,
+there are still
+<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#RemainingAttacks"
+>
+potential attacks that could compromise Tor's ability to protect you</a>.
+Third, no anonymity system is perfect these days, and Tor is no exception:
+you should not rely solely on the current Tor network if you really need
+strong anonymity.
+</p>
+
+<p>
+Tor works by bouncing your traffic around a set of relays run by
+volunteers all around the world. Tor's security improves as its user
+base grows and as more people volunteer to
+<a href="<page docs/tor-doc-relay>">run a relay</a>. It isn't
+nearly as hard to set up as you might think, and can significantly
+<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">
+enhance your own security against some attacks</a>.
+If running a relay isn't for you, we need
+<a href="<page volunteer>">help with many other aspects of the project</a>,
+and we need funds to <a
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Funding">continue
+making the Tor network faster and easier to use while maintaining good
+security</a>.
+<a href="<page donate>">Please donate.</a>
+</p>
+
<a id="News"></a>
<h2><a class="anchor" href="#News">News</a></h2>
<hr />
<ul>
+<li>Oct 2007: As many of you know, The Tor Project became an <a
+href="<page people>">independent and official nonprofit</a> this past
+February. We did this so we could accept grants from groups who
+only donate to NGOs, and so our donors could deduct qualifying
+<a href="<page donate>">donations</a> made to us.
+<br />
+We'd like to extend our profound thanks to the <a
+href="https://www.eff.org/">Electronic Frontier Foundation</a> for their
+past support, fiscal sponsorship, and help in hosting some of our web
+pages, and for their continued mentorship of and counsel to our
+fledgling nonprofit organization.</li>
<li>Sep 2007: If you have received email claiming to be Tor, it wasn't
from us. The <a href="<page download>">official Tor bundles</a> can be <a
href="http://wiki.noreply.org/noreply/TheOnionRouter/VerifyingSignatures">verified
@@ -80,3 +125,4 @@
</div><!-- #main -->
#include <foot.wmi>
+