[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] r26374: {website} strip trailing whitespace (no changes) (website/trunk/about/en)
Author: arma
Date: 2013-10-02 17:26:38 +0000 (Wed, 02 Oct 2013)
New Revision: 26374
Modified:
website/trunk/about/en/overview.wml
Log:
strip trailing whitespace (no changes)
Modified: website/trunk/about/en/overview.wml
===================================================================
--- website/trunk/about/en/overview.wml 2013-10-02 01:24:56 UTC (rev 26373)
+++ website/trunk/about/en/overview.wml 2013-10-02 17:26:38 UTC (rev 26374)
@@ -24,7 +24,7 @@
</ul>
</div>
<!-- END SIDEBAR -->
-
+
<hr>
<a name="inception"></a>
@@ -39,7 +39,7 @@
for a wide variety of purposes by normal people, the military,
journalists, law enforcement officers, activists, and many
others. </p>
-
+
<a name="overview"></a>
<h3><a class="anchor" href="#overview">Overview</a></h3>
@@ -52,7 +52,7 @@
to share information over public networks without compromising their
privacy.
</p>
-
+
<p>
Individuals use Tor to keep websites from tracking them and their family
members, or to connect to news sites, instant messaging services, or the
@@ -63,7 +63,7 @@
communication: chat rooms and web forums for rape and abuse survivors,
or people with illnesses.
</p>
-
+
<p>
Journalists use Tor to communicate more safely with whistleblowers and
dissidents. Non-governmental organizations (NGOs) use Tor to allow their
@@ -71,7 +71,7 @@
country, without notifying everybody nearby that they're working with
that organization.
</p>
-
+
<p>
Groups such as Indymedia recommend Tor for safeguarding their members'
online privacy and security. Activist groups like the Electronic Frontier
@@ -84,7 +84,7 @@
consulting job-hunting websites? Which research divisions are communicating
with the company's patent lawyers?
</p>
-
+
<p>
A branch of the U.S. Navy uses Tor for open source intelligence
gathering, and one of its teams used Tor while deployed in the Middle
@@ -92,7 +92,7 @@
web sites without leaving government IP addresses in their web logs,
and for security during sting operations.
</p>
-
+
<p>
The variety of people who use Tor is actually <a
href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
@@ -101,10 +101,10 @@
so the more populous and diverse the user base for Tor is, the more your
anonymity will be protected.
</p>
-
+
<a name="whyweneedtor"></a>
<h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
-
+
<p>
Using Tor protects you against a common form of Internet surveillance
known as "traffic analysis." Traffic analysis can be used to infer
@@ -119,7 +119,7 @@
affiliation to anyone observing the network, even if the connection
is encrypted.
</p>
-
+
<p>
How does traffic analysis work? Internet data packets have two parts:
a data payload and a header used for routing. The data payload is
@@ -129,7 +129,7 @@
possibly, what you're saying. That's because it focuses on the header,
which discloses source, destination, size, timing, and so on.
</p>
-
+
<p>
A basic problem for the privacy minded is that the recipient of your
communications can see that you sent it by looking at headers. So can
@@ -138,7 +138,7 @@
analysis might involve sitting somewhere between sender and recipient on
the network, looking at headers.
</p>
-
+
<p>
But there are also more powerful kinds of traffic analysis. Some
attackers spy on multiple parts of the Internet and use sophisticated
@@ -147,11 +147,11 @@
these attackers, since it only hides the content of Internet traffic, not
the headers.
</p>
-
+
<a name="thesolution"></a>
<h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
<img src="$(IMGROOT)/htw1.png" alt="How Tor works">
-
+
<p>
Tor helps to reduce the risks of both simple and sophisticated traffic
analysis by distributing your transactions over several places on the
@@ -163,7 +163,7 @@
through several relays that cover your tracks so no observer at any
single point can tell where the data came from or where it's going.
</p>
-
+
<p>
To create a private network pathway with Tor, the user's software or
client incrementally builds a circuit of encrypted connections through
@@ -174,9 +174,9 @@
separate set of encryption keys for each hop along the circuit to ensure
that each hop can't trace these connections as they pass through.
</p>
-
+
<p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png"></p>
-
+
<p>
Once a circuit has been established, many kinds of data can be exchanged
and several different sorts of software applications can be deployed
@@ -186,20 +186,20 @@
only works for TCP streams and can be used by any application with SOCKS
support.
</p>
-
+
<p>
For efficiency, the Tor software uses the same circuit for connections
that happen within the same ten minutes or so. Later requests are given a
new circuit, to keep people from linking your earlier actions to the new
ones.
</p>
-
+
<p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>
-
-
+
+
<a name="hiddenservices"></a>
<h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
-
+
<p>
Tor also makes it possible for users to hide their locations while
offering various kinds of services, such as web publishing or an instant
@@ -213,10 +213,10 @@
hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
service protocol</a> works.
</p>
-
+
<a name="stayinganonymous"></a>
<h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
-
+
<p>
Tor can't solve all anonymity problems. It focuses only on
protecting the transport of data. You need to use protocol-specific
@@ -225,7 +225,7 @@
while browsing the web to withhold some information about your computer's
configuration.
</p>
-
+
<p>
Also, to protect your anonymity, be smart. Don't provide your name
or other revealing information in web forms. Be aware that, like all
@@ -235,10 +235,10 @@
arriving at your chosen destination, he can use statistical analysis to
discover that they are part of the same circuit.
</p>
-
+
<a name="thefutureoftor"></a>
<h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
-
+
<p>
Providing a usable anonymizing network on the Internet today is an
ongoing challenge. We want software that meets users' needs. We also
@@ -252,7 +252,7 @@
or <a href="<page getinvolved/volunteer>">volunteering</a> as a
<a href="<page docs/documentation>#Developers">developer</a>.
</p>
-
+
<p>
Ongoing trends in law, policy, and technology threaten anonymity as never
before, undermining our ability to speak and read freely online. These
@@ -262,7 +262,7 @@
provides additional diversity, enhancing Tor's ability to put control
over your security and privacy back into your hands.
</p>
-
+
</div>
<!-- END MAINCOL -->
<div id = "sidecol">
@@ -272,4 +272,4 @@
<!-- END SIDECOL -->
</div>
<!-- END CONTENT -->
-#include <foot.wmi>
+#include <foot.wmi>
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits