[or-cvs] r21120: {website} add a new question and answer about .onion domains. (website/trunk/en)

phobos at seul.org phobos at seul.org
Tue Dec 8 06:56:43 UTC 2009


Author: phobos
Date: 2009-12-08 01:56:43 -0500 (Tue, 08 Dec 2009)
New Revision: 21120

Modified:
   website/trunk/en/faq-abuse.wml
Log:
add a new question and answer about .onion domains.


Modified: website/trunk/en/faq-abuse.wml
===================================================================
--- website/trunk/en/faq-abuse.wml	2009-12-07 23:24:52 UTC (rev 21119)
+++ website/trunk/en/faq-abuse.wml	2009-12-08 06:56:43 UTC (rev 21120)
@@ -22,6 +22,7 @@
 <li><a href="<page faq-abuse>#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>
 <li><a href="<page faq-abuse>#Bans">I want to ban the Tor network from my service.</a></li>
 <li><a href="<page faq-abuse>#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>
+<li><a href="<page faq-abuse>#RemovingContent">I want some content removed from a .onion address.</a></li>
 <li><a href="<page faq-abuse>#LegalQuestions">I have legal questions about Tor abuse.</a></li>
 </ul>
 </div>
@@ -341,6 +342,23 @@
 analysis, sting operations, and other physical investigations.
 </p>
 
+<a id="ContentRemoval"></a>
+<h3><a class="anchor" href="#ContentRemoval">I want some content removed from a .onion address.</a></h3>
+<p>The Tor Project does not host, control, nor have the ability to
+discover the owner or location of a .onion address.  The .onion address is
+an address from <a href="<page docs/tor-hidden-service>">a hidden
+service</a>.  The name you see ending in .onion is a hidden service descriptor.
+It's an automatically generated name which can be located on any Tor
+relay or client anywhere on the Internet.  Hidden services are designed
+to protect both the user and service provider from discovering who they
+are and where they are from.  The design of hidden services means the
+owner and location of the .onion site is hidden even from us.</p>
+<p>But remember that this doesn't mean that hidden services are
+invulnerable. Traditional police techniques can still be very effective
+against them, such as interviewing suspects, surveillance and keyboard
+taps, writing style analysis, sting operations, and other physical
+investigations.</p>
+
 <a id="LegalQuestions"></a>
 <h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
 



More information about the tor-commits mailing list