[or-cvs] r9294: fix ^M's and other spacing issues, so it builds (website/branches/Oct2006/en)

arma at seul.org arma at seul.org
Sun Jan 7 04:07:00 UTC 2007


Author: arma
Date: 2007-01-06 23:06:58 -0500 (Sat, 06 Jan 2007)
New Revision: 9294

Modified:
   website/branches/Oct2006/en/Whatistor.wml
   website/branches/Oct2006/en/badpeople.wml
   website/branches/Oct2006/en/glossary.wml
   website/branches/Oct2006/en/history.wml
   website/branches/Oct2006/en/pressawards.wml
   website/branches/Oct2006/en/whoususestor.wml
Log:
fix ^M's and other spacing issues, so it builds


Modified: website/branches/Oct2006/en/Whatistor.wml
===================================================================
--- website/branches/Oct2006/en/Whatistor.wml	2007-01-07 03:15:30 UTC (rev 9293)
+++ website/branches/Oct2006/en/Whatistor.wml	2007-01-07 04:06:58 UTC (rev 9294)
@@ -1,3 +1,18 @@
-## translation metadata
# Revision: $Revision: 7935 $


#include "head.wmi" TITLE="Redirecting" REDIRECT="overview"
+## translation metadata
+# Revision: $Revision: 7935 $
 
-<h1>What is Tor?</h1>

<p>Tor covers your tracks on the web.  When you connect to the internet from your computer, you leave an return address that's like a calling card, everywhere you go.  Even if you don't log into a site with a username and password, you leave information on what IP you came from and when.</P>

<p>Since this is all the information that is usually needed to find out who was on the other end of the wire, so to speak, marketers, governments, and other curious parties can trace you by tracing the activity associated with your IP address.</P>

<p>Tor hides your IP address.  It's like blocking your caller ID.  If you keep Tor turned on all the time, you won't be able to use some services on the Web.</P>

<p>Tor does not prevent you from connecting to a site and then logging on or otherwise identifying yourself.  It simply hides the physical location of your originating connection -- where your computer is, geographically.  Without fastidious care, you can accidentally reveal your location even with the use of Tor, if you don't turn off Javascript, Flash, and other browser plug-ins that are &ldquo;leaky.&rdquo;  Similarly, adware and spyware can reveal your location if you don't protect your machine from malware.  So Tor on its own is necessary, but not sufficient, to protect your privacy.</P>

#include <foot.wmi>
\ No newline at end of file
+
+#include "head.wmi" TITLE="Redirecting" REDIRECT="overview"
+
+<h1>What is Tor?</h1>
+
+<p>Tor covers your tracks on the web.  When you connect to the internet from your computer, you leave an return address that's like a calling card, everywhere you go.  Even if you don't log into a site with a username and password, you leave information on what IP you came from and when.</P>
+
+<p>Since this is all the information that is usually needed to find out who was on the other end of the wire, so to speak, marketers, governments, and other curious parties can trace you by tracing the activity associated with your IP address.</P>
+
+<p>Tor hides your IP address.  It's like blocking your caller ID.  If you keep Tor turned on all the time, you won't be able to use some services on the Web.</P>
+
+<p>Tor does not prevent you from connecting to a site and then logging on or otherwise identifying yourself.  It simply hides the physical location of your originating connection -- where your computer is, geographically.  Without fastidious care, you can accidentally reveal your location even with the use of Tor, if you don't turn off Javascript, Flash, and other browser plug-ins that are &ldquo;leaky.&rdquo;  Similarly, adware and spyware can reveal your location if you don't protect your machine from malware.  So Tor on its own is necessary, but not sufficient, to protect your privacy.</P>
+
+#include <foot.wmi>
+

Modified: website/branches/Oct2006/en/badpeople.wml
===================================================================
--- website/branches/Oct2006/en/badpeople.wml	2007-01-07 03:15:30 UTC (rev 9293)
+++ website/branches/Oct2006/en/badpeople.wml	2007-01-07 04:06:58 UTC (rev 9294)
@@ -1,26 +1,46 @@
-## translation metadata
-# Revision: $Revision: 7935 $
-
-#include "head.wmi" TITLE="Bad People"
-
-<div class="main-column">
-<h2>	Won't bad people use Tor?</h2>
-
-<p>Onion routing, a precursor to Tor, was originally developed for the US military, who use it to safeguard personnel in the field, and command and control facilities (see  http://www.onion-router.net/History.html and information below).  </p>
-
-<p>However, they realized that any anonymity network that was only used by military personnel was of little use at all.  An enemy would simply look for clients or servers running military anonymity software, and take them out.  So the Naval Research Lab released their onion routing (hence Tor for &ldquo;the onion router&rdquo;) to the world, and the open source community.</p>
-
-<p>If anyone can be anonymous, then by nature, anyone can be.  You can't restrict who can use the network.  Therefore, like the mail, like the phone networks, and like any public forum, Tor can be used by people who mean well, and people who mean to break the law.  </p>
-
-<p>However, people who wish to break the law have many other means of gaining anonymity at their disposal.  They don't have to use Tor.  A criminal can gain a greater level of security, whether stealing intellectual property or trafficking in child pornography, dealing drugs or plotting mayhem, through other -- highly illegal and more highly secure -- means of anonymity.</p>  
-
-<p>For example, criminals create infected &ldquo;botnets&rdquo; of &ldquo;zombies&rdquo; computers.  They steal identities.  They steal cell phones (or simply use throw-away cell chips).  They steal computers.  They don't have to use Tor, and it's more secure for them if they don't.</p>
-
-<p>These illegal means, which involve victims and theft, are not acceptable to Internet users who seek online privacy through Tor, as described below.</p>
-
-<p>Our goal is to provide a reasonably secure anonymity network for those people who need privacy but are not willing to victimize or steal to get it.</p>
-
-<p>There's a strong social assumption that people who can hide behind the shield of anonymity will be rude.  And it's true to some extent.  But there are also counter examples, such as the 2channel network in Japan, where anonymity allows a style of conversation which is liberating, self-policing, and generally polite.  However, anonymity online is not the end of civility, and the rude actions of a few &ldquo;trollss&rdquo; or "flamerss&rdquo; has not ruined online discourse yet.</p>
- </div><!-- #main -->
-
-#include <foot.wmi>
\ No newline at end of file
+## translation metadata
+# Revision: $Revision: 7935 $
+
+#include "head.wmi" TITLE="Bad People"
+
+<div class="main-column">
+
+<h2>	Won't bad people use Tor?</h2>
+
+
+
+<p>Onion routing, a precursor to Tor, was originally developed for the US military, who use it to safeguard personnel in the field, and command and control facilities (see  http://www.onion-router.net/History.html and information below).  </p>
+
+
+
+<p>However, they realized that any anonymity network that was only used by military personnel was of little use at all.  An enemy would simply look for clients or servers running military anonymity software, and take them out.  So the Naval Research Lab released their onion routing (hence Tor for &ldquo;the onion router&rdquo;) to the world, and the open source community.</p>
+
+
+
+<p>If anyone can be anonymous, then by nature, anyone can be.  You can't restrict who can use the network.  Therefore, like the mail, like the phone networks, and like any public forum, Tor can be used by people who mean well, and people who mean to break the law.  </p>
+
+
+
+<p>However, people who wish to break the law have many other means of gaining anonymity at their disposal.  They don't have to use Tor.  A criminal can gain a greater level of security, whether stealing intellectual property or trafficking in child pornography, dealing drugs or plotting mayhem, through other -- highly illegal and more highly secure -- means of anonymity.</p>  
+
+
+
+<p>For example, criminals create infected &ldquo;botnets&rdquo; of &ldquo;zombies&rdquo; computers.  They steal identities.  They steal cell phones (or simply use throw-away cell chips).  They steal computers.  They don't have to use Tor, and it's more secure for them if they don't.</p>
+
+
+
+<p>These illegal means, which involve victims and theft, are not acceptable to Internet users who seek online privacy through Tor, as described below.</p>
+
+
+
+<p>Our goal is to provide a reasonably secure anonymity network for those people who need privacy but are not willing to victimize or steal to get it.</p>
+
+
+
+<p>There's a strong social assumption that people who can hide behind the shield of anonymity will be rude.  And it's true to some extent.  But there are also counter examples, such as the 2channel network in Japan, where anonymity allows a style of conversation which is liberating, self-policing, and generally polite.  However, anonymity online is not the end of civility, and the rude actions of a few &ldquo;trollss&rdquo; or "flamerss&rdquo; has not ruined online discourse yet.</p>
+
+ </div><!-- #main -->
+
+
+
+#include <foot.wmi>

Modified: website/branches/Oct2006/en/glossary.wml
===================================================================
--- website/branches/Oct2006/en/glossary.wml	2007-01-07 03:15:30 UTC (rev 9293)
+++ website/branches/Oct2006/en/glossary.wml	2007-01-07 04:06:58 UTC (rev 9294)
@@ -1,32 +1,59 @@
-## translation metadata
-# Revision: $Revision: 7935 $
-
-#include "head.wmi" TITLE="a glossary"
-
-<div class="main-column">
-
-<h2>Tor: a glossary of terms</h2>
-<hr />
-When we talk about Tor, we will refer to several things:
-<ul>
-<li>The Tor network -- a complex of volunteer-run servers that relay anonymous traffic, 
-located on six continents.</li>
-<li>The Tor client -- a piece of software that runs on an individual's computer to allow
-them access to the Tor network</li>
-<li>The Tor bundle -- software we've chosen to distribute with our client, including the 
-Vidalia user interface and Privoxy, which protects you from intrusive marketing and helps 
-protect your anonymity.  We think these applications provide synergy with the client, and 
-we believe in the people who produce them.</li>
-<li>The Tor software -- the software we produce that runs the servers, 
-and provides individuals with a client program that connects to the Tor network</li>
-</ul>
-
-<p>
-Since we're a largely volunteer motivated project, you will find the term "Tor" used to mean 
-any or all of these things, sometimes in the same document!  We hope you'll be patient with us, 
-and we'd enjoy your <a href="<page volunteer>"help</a> in maintaining our documents and web site.
-</p>
-
-  </div><!-- #main -->
-
-#include <foot.wmi>
+## translation metadata
+# Revision: $Revision: 7935 $
+
+#include "head.wmi" TITLE="a glossary"
+
+<div class="main-column">
+
+
+
+<h2>Tor: a glossary of terms</h2>
+
+<hr />
+
+When we talk about Tor, we will refer to several things:
+
+<ul>
+
+<li>The Tor network -- a complex of volunteer-run servers that relay anonymous traffic, 
+
+located on six continents.</li>
+
+<li>The Tor client -- a piece of software that runs on an individual's computer to allow
+
+them access to the Tor network</li>
+
+<li>The Tor bundle -- software we've chosen to distribute with our client, including the 
+
+Vidalia user interface and Privoxy, which protects you from intrusive marketing and helps 
+
+protect your anonymity.  We think these applications provide synergy with the client, and 
+
+we believe in the people who produce them.</li>
+
+<li>The Tor software -- the software we produce that runs the servers, 
+
+and provides individuals with a client program that connects to the Tor network</li>
+
+</ul>
+
+
+
+<p>
+
+Since we're a largely volunteer motivated project, you will find the term "Tor" used to mean 
+
+any or all of these things, sometimes in the same document!  We hope you'll be patient with us, 
+
+and we'd enjoy your <a href="<page volunteer>"help</a> in maintaining our documents and web site.
+
+</p>
+
+
+
+  </div><!-- #main -->
+
+
+
+#include <foot.wmi>
+

Modified: website/branches/Oct2006/en/history.wml
===================================================================
--- website/branches/Oct2006/en/history.wml	2007-01-07 03:15:30 UTC (rev 9293)
+++ website/branches/Oct2006/en/history.wml	2007-01-07 04:06:58 UTC (rev 9294)
@@ -1,168 +1,330 @@
-## translation metadata
-# Revision: $Revision: 7935 $
-
-#include "head.wmi" TITLE="Brief History of Tor"
-
-<div class="main-column">
-
-#include "head.wmi" TITLE="Brief History of Tor"
-<BODY LANG="en-US" DIR="LTR">
-<H1>Brief Selected History</H1>
-<P>A more technical history is available at Paul Syverson's
-onion-router.net <A HREF="http://www.onion-router.net/History.html">history</A>
-page. 
-</P>
-<H2>1995:</H2>
-<P STYLE="margin-bottom: 0in">In 1995, Paul Syverson, at the US Naval
-Research Lab,  funded implementation of the initial specification for
-Onion Routing, the parent technology of Tor. 
-</P>
-<H2>1996:</H2>
-<P>Initial formal presentation and publication of Onion Routing
-<A HREF="Publications.html#or-infohiding">&quot;Hiding Routing
-Information&quot;</A> at the First Information Hiding Workshop, May
-31. Proof of concept prototype on Solaris 2.5.1/2.6 is deployed,
-consisting of a 5 node system running on a single machine at NRL with
-proxies for Web browsing with and without sanitization of the
-application protocol data. 
-</P>
-<P>General availability of the sourcecode is necessary because trust
-and incentive requirements for the system to have its intended
-security properties require that it be open source, although that
-term was not yet in common use in 1996. The generation 1 code that
-existed in May was approved for general public distribution in July.</P>
-<H2>1997:</H2>
-<P>In addition to ONR funding, robustness aspects of Onion Routing
-are funded by DARPA under High Confidence Networks Program. 
-</P>
-<P>The first paper is published proposing the use of Tor for mobile
-(cellular) services and private control of location information in
-active badges and other tracking devices. 
-</P>
-<P>Most of the gen1 design is published at the IEEE Symposium on
-Security and Privacy.</P>
-<H2>1998:</H2>
-<P>Several generation 0/1 networks are set up. We set up a
-distributed network of 13 nodes at NRL, NRAD, and UMD. Two
-independent test networks are set up using the proof-of-concept code
-with which we have no association besides providing the basic code
-and a little advice. One in the Canadian Ministry of Defence. 
-</P>
-<P>NRAD redirector is built: runs on Windows NT and redirects all TCP
-traffic to the Onion Routing network without the need for special
-proxies (but requires a locally running kernel mod). Several other
-proxies built include those for HTTP (anonymizing and nonanonymizing
-versions), FTP, SMTP, and rlogin. 
-</P>
-<P>We hit our maximum usage for the generation 0 prototype running on
-the local NRL testbed. An average of over 50,000 hits per day occured
-during the final months, or more than 1 million connections per
-month. Peak reported load of 84,022 connections occured on 12/31/98. 
-</P>
-<P>Zero Knowledge Systems announces the Freedom Network late in 1998.
-Freedom was a commercial network with many similarities to Onion
-Routing. Most notable differences are (1) Onion Routing runs over TCP
-while Freedom ran over UDP, (2) Freedom was commercially funded
-rather than volunteer based, and (3) Freedom included a pseudonym
-management scheme both to limit the network to paid subscribers and
-to allow persistent pseudonymous communication. (The Freedom Network
-was deployed from late 1999 till late 2001, when it was shut down
-because it was unable to acheive enough widespread acceptance to
-cover its costs.) 
-</P>
-<H2>1999:</H2>
-<P>Alan Berman Research Publication Award given for <A HREF="Publications.html#JSAC-1998">&quot;Anonymous
-Connections and Onion Routing&quot;</A>. This paper provides the most
-detailed specification published of generation 1 Onion Routing,
-although some features are added later. 
-</P>
-<P>Work on Onion Routing development is suspended. There is no new
-funding for it, plus most principals and all developers have left NRL
-for other pursuits. Nonetheless, research and analysis work
-continues. 
-</P>
-<H2>2000:</H2>
-<P>The generation 0 proof-of-concept network is shut down in January.
-</P>
-<P>During its operating period of roughly two years, over twenty
-million requests from more than sixty countries and all major US top
-level domains were processed by the initial prototype Onion Routing
-network. An average of over 50,000 hits per day occured during the
-final year. Peak reported load of 84,022 connections occured on
-12/31/98. 
-</P>
-<P>A <A HREF="Publications.html#WDIAU-2000">security analysis paper</A>
-is presented at the first Privacy Enhancing Technologies
-Workshop---where the seeds of future Tor development are unknowingly
-sown when Syverson meets Dingledine for the first time. (official
-title of the first workshop was <I>Design Issues in Anonymity and
-Unobservability</I> and the proceedings was titled <I>Designing
-Privacy Enhancing Technologies</I>). This paper is where the c^2/n^2
-analysis is set out. Analyses of strategies for picking route length
-and the effect on security are also made but not published in the
-final version of the paper. 
-</P>
-<P>Patent issued in July. 
-</P>
-<P><A HREF="http://anon.inf.tu-dresden.de/index_en.html">JAP</A>
-(Java Anon Proxy) Web Mixes goes online in autumn. This is a mix
-cascade based Web proxy organized through TU Dresden. Unlike the
-Freedom network mentioned above, this is not really a flavor of Onion
-Routing. The threat model and approach are more based on traffic from
-users in persistent groups and formal independence of mix operators,
-while Onion Routing includes elements of path and jurisdictional
-uncertainty on a per circuit basis. 
-</P>
-<H2>2001:</H2>
-<P>Work on OR development resumes, funded by DARPA under Fault
-Tolerant Networks Program with initial goal of making the generation
-1 code complete enough to run a beta network and the subsequent goal
-of adding fault tolerance and resource management. 
-</P>
-<P>Edison Invention Award presented to Paul Syverson for the
-invention of Onion Routing. 
-</P>
-<H2>2002:</H2>
-<P>Generation 1 code abandoned as too dated and crufty. Work on
-generation 2 (Tor) code begins building initially off of a codebase
-originally produced by Matej Pfajfar at Cambridge University for his
-undergraduate final-year project. However, by 2004, none of that code
-romains in the Tor codebase. 
-</P>
-<H2>2003:</H2>
-<P>Funding from ONR for generation 2 development and deployment,
-DARPA for building in resource management and fault tolerance, and
-NRL internal funding from ONR for building survivable hidden servers.
-</P>
-<P>In October, Tor network is deployed, and Tor code is released
-under the free and open 3-clause bsd license. Both the network and
-code development are managed through the original <A HREF="http://tor.freehaven.net/">Tor
-development site</A> on Roger Dingledine's freehaven project. By the
-end of 2003, the network has about a dozen volunteer nodes, mostly in
-the US with one in Germany.</P>
-<H2>2004:</H2>
-<P>Location hidden services are deployed in the spring when the
-hidden wiki is set up. 
-</P>
-<P>The <A HREF="Publications.html#tor-design">Tor design paper</A> is
-published at USENIX Security. 
-</P>
-<P>Funding from ONR and DARPA ends in Q4.<BR>Funding from EFF for
-continued Tor deployment and development begins. <BR>Internal NRL
-funding (from ONR) for work on location hidden servers continues. 
-</P>
-<P>The JAP team independently implements a client for Tor that
-functions with the Tor network. (see 2000) 
-</P>
-<P>By the end of 2004 there are over 100 Tor nodes on three
-continents.<BR>(As of mid May 2005, there are about 160 nodes on five
-continents. Sustained application traffic throughout the first half
-of 2005 is between five and ten megabytes/second from an
-indeterminate number of users estimated to be in the tens of
-thousands. [The network hides this information, even from us.]) 
-</P>
-<H2>2005:</H2>
-<P>In June, Tor is listed in PC World's Top 100 Products
-http://pcworld.com/article/id,120763-page,4/article.html</P>
-</BODY>
-#include <foot.wmi>
\ No newline at end of file
+## translation metadata
+# Revision: $Revision: 7935 $
+
+#include "head.wmi" TITLE="Brief History of Tor"
+
+<div class="main-column">
+
+
+
+#include "head.wmi" TITLE="Brief History of Tor"
+
+<BODY LANG="en-US" DIR="LTR">
+
+<H1>Brief Selected History</H1>
+
+<P>A more technical history is available at Paul Syverson's
+
+onion-router.net <A HREF="http://www.onion-router.net/History.html">history</A>
+
+page. 
+
+</P>
+
+<H2>1995:</H2>
+
+<P STYLE="margin-bottom: 0in">In 1995, Paul Syverson, at the US Naval
+
+Research Lab,  funded implementation of the initial specification for
+
+Onion Routing, the parent technology of Tor. 
+
+</P>
+
+<H2>1996:</H2>
+
+<P>Initial formal presentation and publication of Onion Routing
+
+<A HREF="Publications.html#or-infohiding">&quot;Hiding Routing
+
+Information&quot;</A> at the First Information Hiding Workshop, May
+
+31. Proof of concept prototype on Solaris 2.5.1/2.6 is deployed,
+
+consisting of a 5 node system running on a single machine at NRL with
+
+proxies for Web browsing with and without sanitization of the
+
+application protocol data. 
+
+</P>
+
+<P>General availability of the sourcecode is necessary because trust
+
+and incentive requirements for the system to have its intended
+
+security properties require that it be open source, although that
+
+term was not yet in common use in 1996. The generation 1 code that
+
+existed in May was approved for general public distribution in July.</P>
+
+<H2>1997:</H2>
+
+<P>In addition to ONR funding, robustness aspects of Onion Routing
+
+are funded by DARPA under High Confidence Networks Program. 
+
+</P>
+
+<P>The first paper is published proposing the use of Tor for mobile
+
+(cellular) services and private control of location information in
+
+active badges and other tracking devices. 
+
+</P>
+
+<P>Most of the gen1 design is published at the IEEE Symposium on
+
+Security and Privacy.</P>
+
+<H2>1998:</H2>
+
+<P>Several generation 0/1 networks are set up. We set up a
+
+distributed network of 13 nodes at NRL, NRAD, and UMD. Two
+
+independent test networks are set up using the proof-of-concept code
+
+with which we have no association besides providing the basic code
+
+and a little advice. One in the Canadian Ministry of Defence. 
+
+</P>
+
+<P>NRAD redirector is built: runs on Windows NT and redirects all TCP
+
+traffic to the Onion Routing network without the need for special
+
+proxies (but requires a locally running kernel mod). Several other
+
+proxies built include those for HTTP (anonymizing and nonanonymizing
+
+versions), FTP, SMTP, and rlogin. 
+
+</P>
+
+<P>We hit our maximum usage for the generation 0 prototype running on
+
+the local NRL testbed. An average of over 50,000 hits per day occured
+
+during the final months, or more than 1 million connections per
+
+month. Peak reported load of 84,022 connections occured on 12/31/98. 
+
+</P>
+
+<P>Zero Knowledge Systems announces the Freedom Network late in 1998.
+
+Freedom was a commercial network with many similarities to Onion
+
+Routing. Most notable differences are (1) Onion Routing runs over TCP
+
+while Freedom ran over UDP, (2) Freedom was commercially funded
+
+rather than volunteer based, and (3) Freedom included a pseudonym
+
+management scheme both to limit the network to paid subscribers and
+
+to allow persistent pseudonymous communication. (The Freedom Network
+
+was deployed from late 1999 till late 2001, when it was shut down
+
+because it was unable to acheive enough widespread acceptance to
+
+cover its costs.) 
+
+</P>
+
+<H2>1999:</H2>
+
+<P>Alan Berman Research Publication Award given for <A HREF="Publications.html#JSAC-1998">&quot;Anonymous
+
+Connections and Onion Routing&quot;</A>. This paper provides the most
+
+detailed specification published of generation 1 Onion Routing,
+
+although some features are added later. 
+
+</P>
+
+<P>Work on Onion Routing development is suspended. There is no new
+
+funding for it, plus most principals and all developers have left NRL
+
+for other pursuits. Nonetheless, research and analysis work
+
+continues. 
+
+</P>
+
+<H2>2000:</H2>
+
+<P>The generation 0 proof-of-concept network is shut down in January.
+
+</P>
+
+<P>During its operating period of roughly two years, over twenty
+
+million requests from more than sixty countries and all major US top
+
+level domains were processed by the initial prototype Onion Routing
+
+network. An average of over 50,000 hits per day occured during the
+
+final year. Peak reported load of 84,022 connections occured on
+
+12/31/98. 
+
+</P>
+
+<P>A <A HREF="Publications.html#WDIAU-2000">security analysis paper</A>
+
+is presented at the first Privacy Enhancing Technologies
+
+Workshop---where the seeds of future Tor development are unknowingly
+
+sown when Syverson meets Dingledine for the first time. (official
+
+title of the first workshop was <I>Design Issues in Anonymity and
+
+Unobservability</I> and the proceedings was titled <I>Designing
+
+Privacy Enhancing Technologies</I>). This paper is where the c^2/n^2
+
+analysis is set out. Analyses of strategies for picking route length
+
+and the effect on security are also made but not published in the
+
+final version of the paper. 
+
+</P>
+
+<P>Patent issued in July. 
+
+</P>
+
+<P><A HREF="http://anon.inf.tu-dresden.de/index_en.html">JAP</A>
+
+(Java Anon Proxy) Web Mixes goes online in autumn. This is a mix
+
+cascade based Web proxy organized through TU Dresden. Unlike the
+
+Freedom network mentioned above, this is not really a flavor of Onion
+
+Routing. The threat model and approach are more based on traffic from
+
+users in persistent groups and formal independence of mix operators,
+
+while Onion Routing includes elements of path and jurisdictional
+
+uncertainty on a per circuit basis. 
+
+</P>
+
+<H2>2001:</H2>
+
+<P>Work on OR development resumes, funded by DARPA under Fault
+
+Tolerant Networks Program with initial goal of making the generation
+
+1 code complete enough to run a beta network and the subsequent goal
+
+of adding fault tolerance and resource management. 
+
+</P>
+
+<P>Edison Invention Award presented to Paul Syverson for the
+
+invention of Onion Routing. 
+
+</P>
+
+<H2>2002:</H2>
+
+<P>Generation 1 code abandoned as too dated and crufty. Work on
+
+generation 2 (Tor) code begins building initially off of a codebase
+
+originally produced by Matej Pfajfar at Cambridge University for his
+
+undergraduate final-year project. However, by 2004, none of that code
+
+romains in the Tor codebase. 
+
+</P>
+
+<H2>2003:</H2>
+
+<P>Funding from ONR for generation 2 development and deployment,
+
+DARPA for building in resource management and fault tolerance, and
+
+NRL internal funding from ONR for building survivable hidden servers.
+
+</P>
+
+<P>In October, Tor network is deployed, and Tor code is released
+
+under the free and open 3-clause bsd license. Both the network and
+
+code development are managed through the original <A HREF="http://tor.freehaven.net/">Tor
+
+development site</A> on Roger Dingledine's freehaven project. By the
+
+end of 2003, the network has about a dozen volunteer nodes, mostly in
+
+the US with one in Germany.</P>
+
+<H2>2004:</H2>
+
+<P>Location hidden services are deployed in the spring when the
+
+hidden wiki is set up. 
+
+</P>
+
+<P>The <A HREF="Publications.html#tor-design">Tor design paper</A> is
+
+published at USENIX Security. 
+
+</P>
+
+<P>Funding from ONR and DARPA ends in Q4.<BR>Funding from EFF for
+
+continued Tor deployment and development begins. <BR>Internal NRL
+
+funding (from ONR) for work on location hidden servers continues. 
+
+</P>
+
+<P>The JAP team independently implements a client for Tor that
+
+functions with the Tor network. (see 2000) 
+
+</P>
+
+<P>By the end of 2004 there are over 100 Tor nodes on three
+
+continents.<BR>(As of mid May 2005, there are about 160 nodes on five
+
+continents. Sustained application traffic throughout the first half
+
+of 2005 is between five and ten megabytes/second from an
+
+indeterminate number of users estimated to be in the tens of
+
+thousands. [The network hides this information, even from us.]) 
+
+</P>
+
+<H2>2005:</H2>
+
+<P>In June, Tor is listed in PC World's Top 100 Products
+
+http://pcworld.com/article/id,120763-page,4/article.html</P>
+
+</BODY>
+
+#include <foot.wmi>

Modified: website/branches/Oct2006/en/pressawards.wml
===================================================================
--- website/branches/Oct2006/en/pressawards.wml	2007-01-07 03:15:30 UTC (rev 9293)
+++ website/branches/Oct2006/en/pressawards.wml	2007-01-07 04:06:58 UTC (rev 9294)
@@ -1,34 +1,63 @@
-## translation metadata
-# Revision: $Revision: 7935 $
-
-#include "head.wmi" TITLE="awards"
-
-<div class="main-column">
-
-<h2>Awards and Press</h2>
-<hr />
-
-<ul>
-<li> 	<a href="http://www.technologyreview.com/TR35/">TR35 - Technology Review</a></li>
-<p>Roger Dingledine, principal developer at the Tor Project, is honored as one of 35 significant innovators, globally, under 35 years of age.
-<i>Since 1999, the editors of Technology Review have honored the young innovators whose inventions and research we find most exciting; today that collection is the TR35, a list of technologists and scientists, all under the age of 35.</i></p>
-<li>PCWorld top 100 software applications of the Year 2005</li>
-<li><a href="http://sectools.org/">Top 100 Network Security Tools</a></li>
-<li>Runner up, Microsoft Privacy Award  http://petworkshop.org/award/</li>
-<li>original software Edison Invention Award (Paul Syverson, NRL, 2001)  </li>
-
-<h2>Recent Press</h2>
-<hr />
-<li> <a href="http://msnbc.msn.com/id/14800957/">Financial Times (and MSNBC, etc.)</a> </li>
-<li>  <a href="http://www.npr.org/templates/story/story.php?storyId=5670902">NPR</a></li>
-<li>  <a href="http://www.macworld.com/2006/09/secrets/octgeekfactor/index.php"> Mac World</a></li>
-<li>  <a href="http://www.worldprivacyforum.org/">World Privacy Forum</a></li>
-<li> recent interview Technology Review (unrelated to the TR35 story) yet to be published </li>
-</ul>
-
-<h2> old press </h2>
-<ul>
-<li> <a href="http://wiki.noreply.org/noreply/TheOnionRouter/"> Tor in The Media</a></li>
-  </div><!-- #main -->
-
-#include <foot.wmi>
+## translation metadata
+# Revision: $Revision: 7935 $
+
+#include "head.wmi" TITLE="awards"
+
+<div class="main-column">
+
+
+
+<h2>Awards and Press</h2>
+
+<hr />
+
+
+
+<ul>
+
+<li> 	<a href="http://www.technologyreview.com/TR35/">TR35 - Technology Review</a></li>
+
+<p>Roger Dingledine, principal developer at the Tor Project, is honored as one of 35 significant innovators, globally, under 35 years of age.
+
+<i>Since 1999, the editors of Technology Review have honored the young innovators whose inventions and research we find most exciting; today that collection is the TR35, a list of technologists and scientists, all under the age of 35.</i></p>
+
+<li>PCWorld top 100 software applications of the Year 2005</li>
+
+<li><a href="http://sectools.org/">Top 100 Network Security Tools</a></li>
+
+<li>Runner up, Microsoft Privacy Award  http://petworkshop.org/award/</li>
+
+<li>original software Edison Invention Award (Paul Syverson, NRL, 2001)  </li>
+
+
+
+<h2>Recent Press</h2>
+
+<hr />
+
+<li> <a href="http://msnbc.msn.com/id/14800957/">Financial Times (and MSNBC, etc.)</a> </li>
+
+<li>  <a href="http://www.npr.org/templates/story/story.php?storyId=5670902">NPR</a></li>
+
+<li>  <a href="http://www.macworld.com/2006/09/secrets/octgeekfactor/index.php"> Mac World</a></li>
+
+<li>  <a href="http://www.worldprivacyforum.org/">World Privacy Forum</a></li>
+
+<li> recent interview Technology Review (unrelated to the TR35 story) yet to be published </li>
+
+</ul>
+
+
+
+<h2> old press </h2>
+
+<ul>
+
+<li> <a href="http://wiki.noreply.org/noreply/TheOnionRouter/"> Tor in The Media</a></li>
+
+  </div><!-- #main -->
+
+
+
+#include <foot.wmi>
+

Modified: website/branches/Oct2006/en/whoususestor.wml
===================================================================
--- website/branches/Oct2006/en/whoususestor.wml	2007-01-07 03:15:30 UTC (rev 9293)
+++ website/branches/Oct2006/en/whoususestor.wml	2007-01-07 04:06:58 UTC (rev 9294)
@@ -1,182 +1,355 @@
-
-## translation metadata
# Revision: $Revision: 7935 $

#include "head.wmi" TITLE="Who uses Tor?"

<div class="main-column">
-
-<h1>Who uses Tor?</h1>
-<h2>	People like you use Tor every day to...</h2>
+
+
+## translation metadata
+# Revision: $Revision: 7935 $
+
+#include "head.wmi" TITLE="Who uses Tor?"
+
+<div class="main-column">
+
+
+
+<h1>Who uses Tor?</h1>
+
+<h2>	People like you use Tor every day to...</h2>
+
 <ul>
-<li>	...protect their privacy from marketers </li>
-
-<p>Anonymity helps defeat marketing that doesn't have your permissions.  There are all kinds of unscrupulous marketing techniques that track your activity through cookies, web bugs, and malware by using your IP address to build marketing databases, often selling your private information without your permission.  Tor helps defeat a number of these violations of your privacy.</p>
-
-<li>	...preserve their kids' safety online</li>
-
-<p>&ldquo;I'm proud my mom and dad let me stay alone at home now.&rdquo; You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply by not concealing their IP address from predators.  Increasingly, IP numbers can be literally mapped to street locations, and in the US the government is pushing to get this mapping closer and closer to your street address.  What if a predator heard your child was alone, and called up the satellite view of your address to find the best approach from the back of the property?</p>
-
-<li>	...research sensitive topics</li>
-
-<p>There's a wealth of information available online.   Perhaps, in your country, access to information on AIDS, birth control, Tibetan culture, or world religions may be restricted inside a national firewall.  Or perhaps are you afraid that if you research a particular set of symptoms, at some later date an insurance company could establish that you had suspicions of a pre-existing condition?  Want to research airline security statistics or animal rights without the risk that your national security authorities are going to think you are a terrorist? </p>
-
-
-<li>	...find out how other folks live</li>
-
-<p>Tor, in combination with Blossom, allows you to see the World Wide Web from a specific perspective.  Want to see Google come up in Polish?  If you ask to leave the Tor cloud at a Polish Tor server, you'll see what Poland sees online.  Want to check the differential pricing offered by an online retailer or wholesaler to folks in another country, compared to the pricing offered to you or your company?  Tor and Blossom can provide that window to the world, also.</p>
-</ul>
+<li>	...protect their privacy from marketers </li>
+
+
+
+<p>Anonymity helps defeat marketing that doesn't have your permissions.  There are all kinds of unscrupulous marketing techniques that track your activity through cookies, web bugs, and malware by using your IP address to build marketing databases, often selling your private information without your permission.  Tor helps defeat a number of these violations of your privacy.</p>
+
+
+
+<li>	...preserve their kids' safety online</li>
+
+
+
+<p>&ldquo;I'm proud my mom and dad let me stay alone at home now.&rdquo; You've told your kids they shouldn't share personally identifying information online, but they may be sharing their location simply by not concealing their IP address from predators.  Increasingly, IP numbers can be literally mapped to street locations, and in the US the government is pushing to get this mapping closer and closer to your street address.  What if a predator heard your child was alone, and called up the satellite view of your address to find the best approach from the back of the property?</p>
+
+
+
+<li>	...research sensitive topics</li>
+
+
+
+<p>There's a wealth of information available online.   Perhaps, in your country, access to information on AIDS, birth control, Tibetan culture, or world religions may be restricted inside a national firewall.  Or perhaps are you afraid that if you research a particular set of symptoms, at some later date an insurance company could establish that you had suspicions of a pre-existing condition?  Want to research airline security statistics or animal rights without the risk that your national security authorities are going to think you are a terrorist? </p>
+
+
+
+
+
+<li>	...find out how other folks live</li>
+
+
+
+<p>Tor, in combination with Blossom, allows you to see the World Wide Web from a specific perspective.  Want to see Google come up in Polish?  If you ask to leave the Tor cloud at a Polish Tor server, you'll see what Poland sees online.  Want to check the differential pricing offered by an online retailer or wholesaler to folks in another country, compared to the pricing offered to you or your company?  Tor and Blossom can provide that window to the world, also.</p>
+
+</ul>
+
 <h2>Journalists use Tor</h2>
 
-<ul>
-<li>Reporters without Borders</li>
-
-<p><ahref="www.rsf.org>Reporters without Borders </a> advises journalists, sources, bloggers, and dissidents online to use Tor to ensure their privacy.  RSF tracks internet prisoners of conscience and jailed or harmed journalists all over the world.</p>
-
-<li>	IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
-
-<p>IBB recommends Tor for Internet users in countries that can not get safe access to free media.  Tor not only protects freedom of expression, but preserves the ability of persons behind national firewalls or under the surveillance of repressive regimes to view information that gives a global perspective on democracy, economics, religion, and other vital topics to a full global perspective on culture.</p>
-
-<li>	MediaGiraffe</li>
-
+<ul>
+
+<li>Reporters without Borders</li>
+
+
+
+<p><ahref="www.rsf.org>Reporters without Borders </a> advises journalists, sources, bloggers, and dissidents online to use Tor to ensure their privacy.  RSF tracks internet prisoners of conscience and jailed or harmed journalists all over the world.</p>
+
+
+
+<li>	IBB/Voice of America/Radio Free Europe/Radio Free Asia</li>
+
+
+
+<p>IBB recommends Tor for Internet users in countries that can not get safe access to free media.  Tor not only protects freedom of expression, but preserves the ability of persons behind national firewalls or under the surveillance of repressive regimes to view information that gives a global perspective on democracy, economics, religion, and other vital topics to a full global perspective on culture.</p>
+
+
+
+<li>	MediaGiraffe</li>
+
+
+
 <p>A conference for people in the media &ldquo;willing to stick their necks out&rdquo; recently asked Tor executive director, Shava Nerad, to lead a discussion of identity and anonymity for journalists online, and profiled <a href="http://www.mediagiraffe.org/wiki/index.php/Shava_Nerad">here.</a></p>
-
-
-<li>	Reporters in sensitive locations</li>
-
-<p>Reporters in sensitive environments can use Tor to be more secure in filing their stories.</p>
-
-<li>	sources</li>
-
-<p>Journalists' sources often use Tor to report sensitive information, or to discuss items with journalists from sensitive locations.</p>
-
-<li>	whistleblowers</li>
-
-<p>Likewise, whistleblowers use Tor to safely leave tips on governmental and corporate malfeasance.
-
-<li>	citizen journalism</li>
-
-<p>Citizen journalists in China and &ldquo;other Internet black holes&rdquo; use Tor to write about local events and to encourage social change and political reform, more secure that there will not be a knock on their door at midnight.</p>
-</ul>
-<h2>Human rights workers use Tor</h2>
-
-<p>Reporting human rights violations from within their country of origin is a task for peaceful warriors.  It takes courage and a good eye to risk mitigation.  Human rights activists use Tor to anonymously report from danger zones.  Internationally, labor rights workers use Tor and other forms of online and offline anonymity to organize workers in accordance with the Universal Declaration of Human Rights.  Are they within the law?  But, does that mean they are safe?</p>
-
-<ul>
-<li>	Human Rights Watch</li>
+
+
+
+
+<li>	Reporters in sensitive locations</li>
+
+
+
+<p>Reporters in sensitive environments can use Tor to be more secure in filing their stories.</p>
+
+
+
+<li>	sources</li>
+
+
+
+<p>Journalists' sources often use Tor to report sensitive information, or to discuss items with journalists from sensitive locations.</p>
+
+
+
+<li>	whistleblowers</li>
+
+
+
+<p>Likewise, whistleblowers use Tor to safely leave tips on governmental and corporate malfeasance.
+
+
+
+<li>	citizen journalism</li>
+
+
+
+<p>Citizen journalists in China and &ldquo;other Internet black holes&rdquo; use Tor to write about local events and to encourage social change and political reform, more secure that there will not be a knock on their door at midnight.</p>
+
+</ul>
+
+<h2>Human rights workers use Tor</h2>
+
+
+
+<p>Reporting human rights violations from within their country of origin is a task for peaceful warriors.  It takes courage and a good eye to risk mitigation.  Human rights activists use Tor to anonymously report from danger zones.  Internationally, labor rights workers use Tor and other forms of online and offline anonymity to organize workers in accordance with the Universal Declaration of Human Rights.  Are they within the law?  But, does that mean they are safe?</p>
+
+
+
+<ul>
+
+<li>	Human Rights Watch</li>
+
 <p>In their report  	&ldquo;Race to the Bottom Corporate Complicity in Chinese Internet Censorship,&rdquo; a study co-author interviewed Roger Dingledine, Tor principal developer, on Tor use.  They cover Tor in the section on how to breach the  a href="http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395820">&ldquo;Great Firewall of China 	&rdquo;</a></p>
-
-<a href="http://hrw.org/doc/?t=internet">web site</a>
-
-<p>Human Rights Watch recommends Tor for human rights workers throughout the globe for &ldquo;secure browsing and communications.&rdquo;</p>
-
-<p>Tor has been invited to create a training for HRW field agents to be delivered this fall in NYC.</p>
-
-<li>	Amnesty International</li>
-
+
+
+<a href="http://hrw.org/doc/?t=internet">web site</a>
+
+
+
+<p>Human Rights Watch recommends Tor for human rights workers throughout the globe for &ldquo;secure browsing and communications.&rdquo;</p>
+
+
+
+<p>Tor has been invited to create a training for HRW field agents to be delivered this fall in NYC.</p>
+
+
+
+<li>	Amnesty International</li>
+
+
+
 <p>Tor has consulted and volunteered help to Amnesty International's recent corporate responsibility campaign, http://irrepressible.info/, see also their full report on China Internet issues at http://irrepressible.info/static/pdf/FOE-in-china-2006-lores.pdf</p>
-
-<li>	Global Voices</li>
-
+
+
+<li>	Global Voices</li>
+
+
+
 <p>Global Voices can't stop recommending Tor throughout their <a href="http://www.google.com/search?hl=en&lr=&rls=DVFC,DVFC:1970--2,DVFC:en&q=+site:www.globalvoicesonline.org+global+voices+tor"> web site.</a></p>
-
-
-<li>	10% for corruption</li>
-
-<p>A contact of ours who works with a public health nonprofit in Africa reports that his nonprofit must budget 10% to cover various sorts of corruption, mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can not afford to complain -- this is the point at which open objection can become dangerous.  So his nonprofit is trying to figure out how to use Tor to safely whistleblow on governmental corruption in order to continue their work more effectively and safely.</p>
-
-<li>	Labor organizers in the US and overseas</li>
-
-<p>At a recent conference a Tor staffer ran into a woman who came from a  	&ldquo;company town 	&rdquo; in a mountainous area of the eastern United States.  She was attempting to blog anonymously to rally local residents to urge reform on the company that dominated the towns economic and governmental affairs, fully cognizant that the kind of organizing she was doing could lead to harm or  	&ldquo;fatal accidents.&rdquo;</p>
-
-<p>In east Asia, some labor organizers use anonymity to reveal information regarding sweatshops that produce goods for western countries and to organize local labor.</p>
-</ul>
-<h2>People with high profile community roles use Tor</h2>
-
-<p>Does being in the public spotlight shut you off from having a private life, forever, online?  A rural lawyer in a small New England state keeps an anonymous blog because, with the diverse clientele at his prestigious law firm, his political beliefs are bound to offend someone.  Yet, he doesn't want to remain silent on issues he cares about.  Tor helps him feel secure that he can express his opinion without consequences to his public role.</p>
-
-
-<h2>	Poor people use Tor</h2>
-
-<p>People living in poverty often don't participate fully in civil society -- not out of ignorance or apathy, but out of fear.  If something you write were to get back to your boss, would you lose your job?  If your social worker read about your opinion of the system, would she treat you differently?  Anonymity gives a voice to the voiceless.</p>
-<ul>
-<li>	VISTA grant</li>
-
-<p>Tor has an open Americorps/VISTA position for 1/07-12/07.  This government grant will cover a full time stipend for a volunteer to create curricula to show low-income populations how to use anonymity online for safer civic engagement.  Although it's often said that the poor do not use online access for civic engagment, failing to act in their self-interests, it is our hypothesis (based on personal conversations and anecdotal information) that it is precisely the  	&ldquo;permanent record &rdquo; left online that keeps many of the poor from speaking out on the Internet.  Where speaking out on social programs or job related issues might seem in their enlightened self interest, they see things closer to home.  The boss or social worker or educational advisor virtually looking over their shoulder could put a fragile situation into a tailspin.</p>
-
-<p>We hope to show people how to more safely engage online, and then at the end of the year, evaluate how online and offline civic engagement has changed, and how the population sees this continuing in clear channels and anonymously into the future.</p>
-</ul>
-<h2>	People who care about privacy, in general, increasingly use Tor</h2>
-
-<p>In the section below on recent media mentions of Tor, it becomes clear that the recent revelation of users' browsing patterns by AOL has piqued the conscience of the everyday Internet surfer in more privacy.  All over the net, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of private data.</p>
-
-
-<h2>	Soldiers in the field use Tor</h2>
+
+
+
+
+<li>	10% for corruption</li>
+
+
+
+<p>A contact of ours who works with a public health nonprofit in Africa reports that his nonprofit must budget 10% to cover various sorts of corruption, mostly bribes and such.  When that percentage rises steeply, not only can they not afford the money, but they can not afford to complain -- this is the point at which open objection can become dangerous.  So his nonprofit is trying to figure out how to use Tor to safely whistleblow on governmental corruption in order to continue their work more effectively and safely.</p>
+
+
+
+<li>	Labor organizers in the US and overseas</li>
+
+
+
+<p>At a recent conference a Tor staffer ran into a woman who came from a  	&ldquo;company town 	&rdquo; in a mountainous area of the eastern United States.  She was attempting to blog anonymously to rally local residents to urge reform on the company that dominated the towns economic and governmental affairs, fully cognizant that the kind of organizing she was doing could lead to harm or  	&ldquo;fatal accidents.&rdquo;</p>
+
+
+
+<p>In east Asia, some labor organizers use anonymity to reveal information regarding sweatshops that produce goods for western countries and to organize local labor.</p>
+
+</ul>
+
+<h2>People with high profile community roles use Tor</h2>
+
+
+
+<p>Does being in the public spotlight shut you off from having a private life, forever, online?  A rural lawyer in a small New England state keeps an anonymous blog because, with the diverse clientele at his prestigious law firm, his political beliefs are bound to offend someone.  Yet, he doesn't want to remain silent on issues he cares about.  Tor helps him feel secure that he can express his opinion without consequences to his public role.</p>
+
+
+
+
+
+<h2>	Poor people use Tor</h2>
+
+
+
+<p>People living in poverty often don't participate fully in civil society -- not out of ignorance or apathy, but out of fear.  If something you write were to get back to your boss, would you lose your job?  If your social worker read about your opinion of the system, would she treat you differently?  Anonymity gives a voice to the voiceless.</p>
+
 <ul>
 
-<li>	Field agents</li>
-
-<p>How much, do you imagine, would the Iraqi insurgency pay to find out the location of every computer in Baghdad that logged into a military server in Maryland to read email?  Tor can protect military personnel in the field by hiding their location, and even by concealing the location of Command and Control servers.</p>
-
-<li>	Hidden services</li>
-</ul>
-<p>When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to reveal the geographic location of any server that is reachable online, however Tor's hidden services capacity allows military command and control to be physically secure from discovery and takedown.</p>
-
-<h2>	Law enforcement officers use Tor</h2>
-
-<p>Undercover officers use Tor to conceal their IP of origin during sting operations.   	&ldquo;Anonymous tip lines&rdquo; may still preserve a log of IP origins, if the informant isn't using Tor.</p>
-<ul>
-<li>	online surveillance</li>
-
-<p>Tor allows officials to surf questionable web sites and services without leaving tell-tale tracks.  If the system administrator of an illegal gambling site, for example, were to see multiple connections from governmental or law enforcement computers in usage logs, investigations would be hampered.</p>
-
-<li>	sting operations</li>
-
-<p>Similarly, anonymity allows law officers to engage in online  	&ldquo;undercover 	&rdquo; operations.  Regardless of how good an undercover officer's  	&ldquo;street cred&rdquo; may be, if his or her email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p>
-
-<li>	truly anonymous tip lines</li>
-</ul>
-<p>While online anonymous tip lines are popular, without anonymity software, they are far less useful.  Sophisticated sources understand that although a name or email address is not attached to information, server logs can identify them very quickly.  As a result, tip line web sites that do not encourage anonymity are limiting the sources of their tips.</p>
-
-<h2>	Whistleblowers use Tor</h2>
-
-<p>In the US, the Supreme Court recently stripped legal protections from government whistleblowers.  But whistleblowers working for governmental transparency or corporate accountability can use Tor to seek justice without personal repercussions.</p>
-
-<h2>	Bloggers use Tor</h2>
-
-<p>Every day we hear about bloggers who are sued or fired for saying perfectly legal things online, in their blog.  In addition to following the guidelines of EFF's Guide and RSF's guide, we recommend using Tor.</p>
-
-<h2>	Citizens of repressive regimes use Tor</h2>
-
-<p>Whether to read information on censored topics (such as AIDS, Tibet, or democracy), or to write about controversial topics, people inside oppressive regimes can risk life and livelihood.  Tor helps cover the tracks of dissidents, foreign nationals, or even just people who want free accesss to information most of us take for granted.</p>
-
-
-<h2>	People organizing for change use Tor</h2>
+<li>	VISTA grant</li>
+
+
+
+<p>Tor has an open Americorps/VISTA position for 1/07-12/07.  This government grant will cover a full time stipend for a volunteer to create curricula to show low-income populations how to use anonymity online for safer civic engagement.  Although it's often said that the poor do not use online access for civic engagment, failing to act in their self-interests, it is our hypothesis (based on personal conversations and anecdotal information) that it is precisely the  	&ldquo;permanent record &rdquo; left online that keeps many of the poor from speaking out on the Internet.  Where speaking out on social programs or job related issues might seem in their enlightened self interest, they see things closer to home.  The boss or social worker or educational advisor virtually looking over their shoulder could put a fragile situation into a tailspin.</p>
+
+
+
+<p>We hope to show people how to more safely engage online, and then at the end of the year, evaluate how online and offline civic engagement has changed, and how the population sees this continuing in clear channels and anonymously into the future.</p>
+
+</ul>
+
+<h2>	People who care about privacy, in general, increasingly use Tor</h2>
+
+
+
+<p>In the section below on recent media mentions of Tor, it becomes clear that the recent revelation of users' browsing patterns by AOL has piqued the conscience of the everyday Internet surfer in more privacy.  All over the net, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of private data.</p>
+
+
+
+
+
+<h2>	Soldiers in the field use Tor</h2>
+
 <ul>
-<li>	union organizers/labor activists</li>
-
-See mentions above
-
-<li>	democracy activists/dissidents</li>
-
-See mentions above
-
-<li>	peace/green activists</li>
-
-<p>When groups such as the Friends Service Committee and environmental groups are increasingly falling under surveillance in the United States under laws meant to protect against terrorism, many peaceful agents of change rely on Tor for basic privacy for legitimate activities.</p>
-</ul>
+
+<li>	Field agents</li>
+
+
+
+<p>How much, do you imagine, would the Iraqi insurgency pay to find out the location of every computer in Baghdad that logged into a military server in Maryland to read email?  Tor can protect military personnel in the field by hiding their location, and even by concealing the location of Command and Control servers.</p>
+
+
+
+<li>	Hidden services</li>
+
+</ul>
+
+<p>When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of local strikes.  However, some functions must be centralized, such as command and control sites.  It's the nature of the Internet protocols to reveal the geographic location of any server that is reachable online, however Tor's hidden services capacity allows military command and control to be physically secure from discovery and takedown.</p>
+
+
+
+<h2>	Law enforcement officers use Tor</h2>
+
+
+
+<p>Undercover officers use Tor to conceal their IP of origin during sting operations.   	&ldquo;Anonymous tip lines&rdquo; may still preserve a log of IP origins, if the informant isn't using Tor.</p>
+
+<ul>
+
+<li>	online surveillance</li>
+
+
+
+<p>Tor allows officials to surf questionable web sites and services without leaving tell-tale tracks.  If the system administrator of an illegal gambling site, for example, were to see multiple connections from governmental or law enforcement computers in usage logs, investigations would be hampered.</p>
+
+
+
+<li>	sting operations</li>
+
+
+
+<p>Similarly, anonymity allows law officers to engage in online  	&ldquo;undercover 	&rdquo; operations.  Regardless of how good an undercover officer's  	&ldquo;street cred&rdquo; may be, if his or her email headers include nypd.nyc.ny.state.us, his or her cover is blown.</p>
+
+
+
+<li>	truly anonymous tip lines</li>
+
+</ul>
+
+<p>While online anonymous tip lines are popular, without anonymity software, they are far less useful.  Sophisticated sources understand that although a name or email address is not attached to information, server logs can identify them very quickly.  As a result, tip line web sites that do not encourage anonymity are limiting the sources of their tips.</p>
+
+
+
+<h2>	Whistleblowers use Tor</h2>
+
+
+
+<p>In the US, the Supreme Court recently stripped legal protections from government whistleblowers.  But whistleblowers working for governmental transparency or corporate accountability can use Tor to seek justice without personal repercussions.</p>
+
+
+
+<h2>	Bloggers use Tor</h2>
+
+
+
+<p>Every day we hear about bloggers who are sued or fired for saying perfectly legal things online, in their blog.  In addition to following the guidelines of EFF's Guide and RSF's guide, we recommend using Tor.</p>
+
+
+
+<h2>	Citizens of repressive regimes use Tor</h2>
+
+
+
+<p>Whether to read information on censored topics (such as AIDS, Tibet, or democracy), or to write about controversial topics, people inside oppressive regimes can risk life and livelihood.  Tor helps cover the tracks of dissidents, foreign nationals, or even just people who want free accesss to information most of us take for granted.</p>
+
+
+
+
+
+<h2>	People organizing for change use Tor</h2>
+
+<ul>
+<li>	union organizers/labor activists</li>
+
+
+
+See mentions above
+
+
+
+<li>	democracy activists/dissidents</li>
+
+
+
+See mentions above
+
+
+
+<li>	peace/green activists</li>
+
+
+
+<p>When groups such as the Friends Service Committee and environmental groups are increasingly falling under surveillance in the United States under laws meant to protect against terrorism, many peaceful agents of change rely on Tor for basic privacy for legitimate activities.</p>
+
+</ul>
+
 <h2>	Business executives use Tor</h2>
-<ul>
-<li>	security breach information clearinghouses</li>
-
-<p>Say a financial institution participates in a security clearinghouse of information on Internet attacks.  Such a repository requires members to report breaches to a central group, who correlates attacks to detect coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming traffic to such a repository to be able to track where information is coming from.  Even though every packet were encrypted, the Internet address would betray the location of a compromised system.  Tor allows such repositories of sensitive information to resist compromises.</p>
-
-
-<li>	seeing your competition as your market does</li>
-
-<p>If you try to check out a competitor's pricing, you may find no information or misleading information on their web site.  This is because their web server may be keyed to detect connections from competitors, and block or spread disinformation to your staff.  Tor allows a business to view their sector as the general public would view it.</p>
-
-<li>	keeping strategies confidential</li>
-
-<p>An investment bank, for example, might not want industry snoopers to be able to track what web sites their analysts are watching.  The strategic importance of traffic patterns, and the vulnerability of the surveillance of such data, is starting to be more widely recognized in several areas of the business world.</p>
-
-<li>	accountability
-</ul>
+<ul>
+
+<li>	security breach information clearinghouses</li>
+
+
+
+<p>Say a financial institution participates in a security clearinghouse of information on Internet attacks.  Such a repository requires members to report breaches to a central group, who correlates attacks to detect coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming traffic to such a repository to be able to track where information is coming from.  Even though every packet were encrypted, the Internet address would betray the location of a compromised system.  Tor allows such repositories of sensitive information to resist compromises.</p>
+
+
+
+
+
+<li>	seeing your competition as your market does</li>
+
+
+
+<p>If you try to check out a competitor's pricing, you may find no information or misleading information on their web site.  This is because their web server may be keyed to detect connections from competitors, and block or spread disinformation to your staff.  Tor allows a business to view their sector as the general public would view it.</p>
+
+
+
+<li>	keeping strategies confidential</li>
+
+
+
+<p>An investment bank, for example, might not want industry snoopers to be able to track what web sites their analysts are watching.  The strategic importance of traffic patterns, and the vulnerability of the surveillance of such data, is starting to be more widely recognized in several areas of the business world.</p>
+
+
+
+<li>	accountability
+
+</ul>
+
 <p>In an age when irresponsible and unreported corporate activity has undermined multi-billion dollar businesses, an executive exercising true stewardship wants the whole staff to feel free to disclose internal malfeasance.  Tor facilitates internal accountability before it turns into whistleblowing.</p>
 
   #include <foot.wmi>
\ No newline at end of file



More information about the tor-commits mailing list