Author: arma Date: 2013-10-02 17:26:38 +0000 (Wed, 02 Oct 2013) New Revision: 26374
Modified: website/trunk/about/en/overview.wml Log: strip trailing whitespace (no changes)
Modified: website/trunk/about/en/overview.wml =================================================================== --- website/trunk/about/en/overview.wml 2013-10-02 01:24:56 UTC (rev 26373) +++ website/trunk/about/en/overview.wml 2013-10-02 17:26:38 UTC (rev 26374) @@ -24,7 +24,7 @@ </ul> </div> <!-- END SIDEBAR --> - + <hr>
<a name="inception"></a> @@ -39,7 +39,7 @@ for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. </p> - + <a name="overview"></a> <h3><a class="anchor" href="#overview">Overview</a></h3>
@@ -52,7 +52,7 @@ to share information over public networks without compromising their privacy. </p> - + <p> Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the @@ -63,7 +63,7 @@ communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses. </p> - + <p> Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their @@ -71,7 +71,7 @@ country, without notifying everybody nearby that they're working with that organization. </p> - + <p> Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier @@ -84,7 +84,7 @@ consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers? </p> - + <p> A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle @@ -92,7 +92,7 @@ web sites without leaving government IP addresses in their web logs, and for security during sting operations. </p> - + <p> The variety of people who use Tor is actually <a href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes @@ -101,10 +101,10 @@ so the more populous and diverse the user base for Tor is, the more your anonymity will be protected. </p> - + <a name="whyweneedtor"></a> <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3> - + <p> Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer @@ -119,7 +119,7 @@ affiliation to anyone observing the network, even if the connection is encrypted. </p> - + <p> How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is @@ -129,7 +129,7 @@ possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on. </p> - + <p> A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can @@ -138,7 +138,7 @@ analysis might involve sitting somewhere between sender and recipient on the network, looking at headers. </p> - + <p> But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated @@ -147,11 +147,11 @@ these attackers, since it only hides the content of Internet traffic, not the headers. </p> - + <a name="thesolution"></a> <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3> <img src="$(IMGROOT)/htw1.png" alt="How Tor works"> - + <p> Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the @@ -163,7 +163,7 @@ through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going. </p> - + <p> To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through @@ -174,9 +174,9 @@ separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through. </p> - + <p><img alt="Tor circuit step two" src="$(IMGROOT)/htw2.png"></p> - + <p> Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed @@ -186,20 +186,20 @@ only works for TCP streams and can be used by any application with SOCKS support. </p> - + <p> For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones. </p> - + <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p> - - + + <a name="hiddenservices"></a> <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3> - + <p> Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant @@ -213,10 +213,10 @@ hidden services</a> and how the <a href="<page docs/hidden-services>">hidden service protocol</a> works. </p> - + <a name="stayinganonymous"></a> <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3> - + <p> Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific @@ -225,7 +225,7 @@ while browsing the web to withhold some information about your computer's configuration. </p> - + <p> Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all @@ -235,10 +235,10 @@ arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit. </p> - + <a name="thefutureoftor"></a> <h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3> - + <p> Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also @@ -252,7 +252,7 @@ or <a href="<page getinvolved/volunteer>">volunteering</a> as a <a href="<page docs/documentation>#Developers">developer</a>. </p> - + <p> Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These @@ -262,7 +262,7 @@ provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands. </p> - + </div> <!-- END MAINCOL --> <div id = "sidecol"> @@ -272,4 +272,4 @@ <!-- END SIDECOL --> </div> <!-- END CONTENT --> -#include <foot.wmi> +#include <foot.wmi>
tor-commits@lists.torproject.org