[or-cvs] r13011: Update who uses tor. Good enough for exposure to the world, (website/trunk/en)

phobos at seul.org phobos at seul.org
Tue Jan 1 03:09:22 UTC 2008


Author: phobos
Date: 2007-12-31 22:09:22 -0500 (Mon, 31 Dec 2007)
New Revision: 13011

Modified:
   website/trunk/en/torusers.wml
Log:
Update who uses tor.  Good enough for exposure to the world, if arma
agrees.


Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml	2008-01-01 02:35:02 UTC (rev 13010)
+++ website/trunk/en/torusers.wml	2008-01-01 03:09:22 UTC (rev 13011)
@@ -9,16 +9,28 @@
 
 <div class="main-column">
 <h1>Who uses Tor?</h1>
+<ul>
+<li><a href="<page torusers>#normalusers">Everyday, ordinary Internet users use Tor</a></li>
+<li><a href="<page torusers>#military">Militaries use Tor</a></li>
+<li><a href="<page torusers>#journalist">Journalists and their audience use Tor</a></li>
+<li><a href="<page torusers>#lawenforcement">Law enforcement officers use Tor</a></li>
+<li><a href="<page torusers>#activists">Activists &amp; Whistleblowers use Tor</a></li>
+<li><a href="<page torusers>#spotlight">Both high and low profile people use Tor</a></li>
+<li><a href="<page torusers>#executives">Business executives use Tor</a></li>
+<li><a href="<page torusers>#bloggers">Bloggers use Tor</a></li>
+</ul>
+<p>
 
+<h2>Inception</h2>
 <p>
 Tor was originally designed, implemented, and deployed as a third-generation
-<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>,
-and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
+<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>.
+It was originally developed by, and for, the U.S. Navy for the primary purpose of protecting government communications.
 Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend.
 </p>
 
 <a link="normalusers"></a>
-<h2>Everyday, ordinary Internet surfers use Tor</h2>
+<h2><a class="anchor" href="#normalusers">Everyday, ordinary Internet users use Tor</a></h2>
 <ul>
 <li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
 Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
@@ -30,7 +42,7 @@
 userid and even password information can still be part of this data.  In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
 </li>
 <li><strong> They protect their communications from irresponsible corporations.</strong>
-All over the net, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
+All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
 private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
 <a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
 your data is often not well protected by those you are supposed to trust to keep it safe.
@@ -43,14 +55,12 @@
 <li><strong>They research sensitive topics.</strong>
 There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
 <a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
-or world religions is behind a national firewall.  Or perhaps you are worried that if you research a particular set of
-symptoms, at some later date an insurance company might buy the logs of the websites you visited and establish that
-you had suspicions of a pre-existing condition.
+or world religions is behind a national firewall.  
 </li>
 </ul>
 
 <a link="military"></a>
-<h2>Militaries use Tor</h2>
+<h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
 <ul>
 
 <li>
@@ -58,7 +68,7 @@
 It is not difficult for insurgents to monitor internet traffic and
 discover all the hotels and other locations from which people are
 connecting to known military servers.
-Military field agents deployed away from home have used Tor to
+Military field agents deployed away from home use Tor to
 mask the sites they are visiting, protecting military interests and
 operations, as well as protecting themselves from physical harm.
 </li>
@@ -76,7 +86,7 @@
 </ul>
 
 <a link="journalist"></a>
-<h2>Journalists and their audience use Tor</h2>
+<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
 <ul>
 <li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
 tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
@@ -100,7 +110,7 @@
 </ul>
 
 <a link="lawenforcement"></a>
-<h2>Law enforcement officers use Tor</h2>
+<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
 <ul>
 <li><strong>Online surveillance:</strong>
 Tor allows officials to surf questionable web sites and services
@@ -113,7 +123,7 @@
 Similarly, anonymity allows law officers to engage in online
 &ldquo;undercover &rdquo; operations.  Regardless of how good an
 undercover officer's &ldquo;street cred&rdquo; may be, if the 
-communications include nypd.nyc.ny.state.us, the cover is blown.
+communications include IP ranges from police addresses, the cover is blown.
 </li>
 <li><strong>Truly anonymous tip lines:</strong>
 While online anonymous tip lines are popular, without anonymity
@@ -125,7 +135,7 @@
 </ul>
 
 <a link="activists"></a>
-<h2>Activists &amp; whistleblowers use Tor</h2>
+<h2><a class="anchor" href="#activists">Activists &amp; Whistleblowers use Tor</a></h2>
 <ul>
 <li><strong>Human rights activists use Tor to anonymously report abuses from
 danger zones.</strong>  Internationally, labor rights workers use Tor and other
@@ -191,7 +201,7 @@
 </ul>
 
 <a link="spotlight"></a>
-<h2>Both high and low profile people use Tor</h2>
+<h2><a class="anchor" href="#spotlight">Both high and low profile people use Tor</a></h2>
 <ul>
 <li>Does being in the public spotlight shut you off from having a private
 life, forever, online?  A rural lawyer in a New England state keeps
@@ -221,14 +231,13 @@
 </ul>
 
 <a link="executives"></a>
-<h2>Business executives use Tor</h2>
+<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
 <ul>
 <li><strong>Security breach information clearinghouses:</strong>
 Say a financial institution participates in a security clearinghouse
 of information on Internet attacks.  Such a repository requires members
 to report breaches to a central group, who correlates attacks to detect
-coordinated patterns and send out alerts.  But if a specific bank in
-St. Louis is breached, they don't want an attacker watching the incoming
+coordinated patterns and send out alerts.  But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
 traffic to such a repository to be able to track where information is
 coming from.  Even though every packet were encrypted, the IP
 address would betray the location of a compromised system.  Tor allows
@@ -258,7 +267,7 @@
 </ul>
 
 <a link="bloggers"></a>
-<h2>Bloggers use Tor</h2>
+<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
 <ul>
 <li>Every day we hear about bloggers who are
 <a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
@@ -293,6 +302,6 @@
 purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
 <a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
 you have better options than Tor. While not dismissing the potential abuses of Tor,
-this page shows a few of the many important ways anonymity is used today.</p>
+this page shows a few of the many important ways anonymity is used online today.</p>
 </div>
 #include <foot.wmi>



More information about the tor-commits mailing list