Author: mikeperry Date: 2011-04-04 21:05:05 +0000 (Mon, 04 Apr 2011) New Revision: 24558
Modified: website/trunk/docs/en/faq-abuse.wml Log: Update abuse FAQ and re-add the ToC.
Modified: website/trunk/docs/en/faq-abuse.wml =================================================================== --- website/trunk/docs/en/faq-abuse.wml 2011-04-04 19:53:25 UTC (rev 24557) +++ website/trunk/docs/en/faq-abuse.wml 2011-04-04 21:05:05 UTC (rev 24558) @@ -12,6 +12,7 @@ <div id="maincol"> <!-- PUT CONTENT AFTER THIS TAG --> <h1>Abuse FAQ</h1> + <hr> #<!-- BEGIN SIDEBAR --> #<div class="sidebar-left"> #<h3>Questions</h3> @@ -30,7 +31,21 @@ #</ul> #</div> #<!-- END SIDEBAR --> - #<hr> + <h3>Questions</h3> + <ul> + <li><a href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li> + <li><a href="#DDoS">What about distributed denial of service attacks?</a></li> + <li><a href="#WhatAboutSpammers">What about spammers?</a></li> + <li><a href="#HowMuchAbuse">Does Tor get much abuse?</a></li> + <li><a href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></li> + <li><a href="#IrcBans">Tor is banned from the IRC network I want to use.</a></li> + <li><a href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li> + <li><a href="#Bans">I want to ban the Tor network from my service.</a></li> + <li><a href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li> + <li><a href="#RemoveContent">I want some content removed from a .onion address.</a></li> + <li><a href="#LegalQuestions">I have legal questions about Tor abuse.</a></li> + </ul> + <hr>
<a id="WhatAboutCriminals"></a> <h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3> @@ -157,6 +172,13 @@ Template</a>, which explains why your ISP can probably ignore the notice without any liability. [Arbitrary ports]</li> </ul> + + <p>For a complete set of template responses to different abuse complaint + types, see <a + href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates + on the Tor wiki</a>. You can also proactively reduce the amount of abuse you + get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips + for running an exit node with minimal harassment</a>.
<p>You might also find that your Tor relay's IP is blocked from accessing some Internet sites/services. This might happen regardless of your exit @@ -338,14 +360,27 @@ to ensure their anonymity (identity theft, compromising computers and using them as bounce points, etc). </p> - + <p> + This ultimately means that it is the responsibility of site owners to protect + themselves against compromise and security issues that can come from + anywhere. This is just part of signing up for the benefits of the + Internet. You must be prepared to secure yourself against the bad elements, + wherever they may come from. Tracking and increased surveillance are not + the answer to preventing abuse. + </p> + + <p> But remember that this doesn't mean that Tor is invulnerable. Traditional police techniques can still be very effective against Tor, such as - interviewing suspects, surveillance and keyboard taps, writing style - analysis, sting operations, and other physical investigations. + investigating means, motive, and opportunity, interviewing suspects, + writing style analysis, technical analysis of the content itself, sting operations, + keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone + including law enforcement groups to train them how to use the Tor software to safely conduct + investigations or anonymized activities online. </p> - + + <a id="RemoveContent"></a> <h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3> <p>The Tor Project does not host, control, nor have the ability to @@ -359,15 +394,21 @@ owner and location of the .onion site is hidden even from us.</p> <p>But remember that this doesn't mean that hidden services are invulnerable. Traditional police techniques can still be very effective - against them, such as interviewing suspects, surveillance and keyboard - taps, writing style analysis, sting operations, and other physical - investigations.</p> + against them, such as interviewing suspects, writing style analysis, + technical analysis of the content itself, sting operations, keyboard taps, + and other physical investigations.</p> + <p>If you have a complaint about child pornography, you may wish to report it to the National Center for Missing and Exploited Children, which serves as a national coordination point for investigation of child pornography: <a href="http://www.missingkids.com/">http://www.missingkids.com/</a>. We do not view links you report.</p> - + + <p>The Tor Project also encourages the use of Tor by law enforcement in + the investigation, stings, and infiltration of child pornography rings. + Please contact us for information on Tor trainings. + </p> + <a id="LegalQuestions"></a> <h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
tor-commits@lists.torproject.org