[tor-commits] r26374: {website} strip trailing whitespace (no changes) (website/trunk/about/en)

Roger Dingledine arma at torproject.org
Wed Oct 2 17:26:38 UTC 2013


Author: arma
Date: 2013-10-02 17:26:38 +0000 (Wed, 02 Oct 2013)
New Revision: 26374

Modified:
   website/trunk/about/en/overview.wml
Log:
strip trailing whitespace (no changes)


Modified: website/trunk/about/en/overview.wml
===================================================================
--- website/trunk/about/en/overview.wml	2013-10-02 01:24:56 UTC (rev 26373)
+++ website/trunk/about/en/overview.wml	2013-10-02 17:26:38 UTC (rev 26374)
@@ -24,7 +24,7 @@
       </ul>
     </div>
     <!-- END SIDEBAR -->
-    
+
     <hr>
 
     <a name="inception"></a>
@@ -39,7 +39,7 @@
     for a wide variety of purposes by normal people, the military,
     journalists, law enforcement officers, activists, and many
     others. </p>
-    
+
     <a name="overview"></a>
     <h3><a class="anchor" href="#overview">Overview</a></h3>
 
@@ -52,7 +52,7 @@
     to share information over public networks without compromising their
     privacy.
     </p>
-    
+
     <p>
     Individuals use Tor to keep websites from tracking them and their family
     members, or to connect to news sites, instant messaging services, or the
@@ -63,7 +63,7 @@
     communication: chat rooms and web forums for rape and abuse survivors,
     or people with illnesses.
     </p>
-    
+
     <p>
     Journalists use Tor to communicate more safely with whistleblowers and
     dissidents. Non-governmental organizations (NGOs) use Tor to allow their
@@ -71,7 +71,7 @@
     country, without notifying everybody nearby that they're working with
     that organization.
     </p>
-    
+
     <p>
     Groups such as Indymedia recommend Tor for safeguarding their members'
     online privacy and security. Activist groups like the Electronic Frontier
@@ -84,7 +84,7 @@
     consulting job-hunting websites? Which research divisions are communicating
     with the company's patent lawyers?
     </p>
-    
+
     <p>
     A branch of the U.S. Navy uses Tor for open source intelligence
     gathering, and one of its teams used Tor while deployed in the Middle
@@ -92,7 +92,7 @@
     web sites without leaving government IP addresses in their web logs,
     and for security during sting operations.
     </p>
-    
+
     <p>
     The variety of people who use Tor is actually <a
     href="http://freehaven.net/doc/fc03/econymics.pdf">part of what makes
@@ -101,10 +101,10 @@
     so the more populous and diverse the user base for Tor is, the more your
     anonymity will be protected.
     </p>
-    
+
     <a name="whyweneedtor"></a>
     <h3><a class="anchor" href="#whyweneedtor">Why we need Tor</a></h3>
-    
+
     <p>
     Using Tor protects you against a common form of Internet surveillance
     known as "traffic analysis."  Traffic analysis can be used to infer
@@ -119,7 +119,7 @@
     affiliation to anyone observing the network, even if the connection
     is encrypted.
     </p>
-    
+
     <p>
     How does traffic analysis work?  Internet data packets have two parts:
     a data payload and a header used for routing.  The data payload is
@@ -129,7 +129,7 @@
     possibly, what you're saying.  That's because it focuses on the header,
     which discloses source, destination, size, timing, and so on.
     </p>
-    
+
     <p>
     A basic problem for the privacy minded is that the recipient of your
     communications can see that you sent it by looking at headers.  So can
@@ -138,7 +138,7 @@
     analysis might involve sitting somewhere between sender and recipient on
     the network, looking at headers.
     </p>
-    
+
     <p>
     But there are also more powerful kinds of traffic analysis.  Some
     attackers spy on multiple parts of the Internet and use sophisticated
@@ -147,11 +147,11 @@
     these attackers, since it only hides the content of Internet traffic, not
     the headers.
     </p>
-    
+
     <a name="thesolution"></a>
     <h3><a class="anchor" href="#thesolution">The solution: a distributed, anonymous network</a></h3>
     <img src="$(IMGROOT)/htw1.png" alt="How Tor works">
-    
+
     <p>
     Tor helps to reduce the risks of both simple and sophisticated traffic
     analysis by distributing your transactions over several places on the
@@ -163,7 +163,7 @@
     through several relays that cover your tracks so no observer at any
     single point can tell where the data came from or where it's going.
     </p>
-    
+
     <p>
     To create a private network pathway with Tor, the user's software or
     client incrementally builds a circuit of encrypted connections through
@@ -174,9 +174,9 @@
     separate set of encryption keys for each hop along the circuit to ensure
     that each hop can't trace these connections as they pass through.
     </p>
-    
+
     <p><img alt="Tor circuit step two"  src="$(IMGROOT)/htw2.png"></p>
-    
+
     <p>
     Once a circuit has been established, many kinds of data can be exchanged
     and several different sorts of software applications can be deployed
@@ -186,20 +186,20 @@
     only works for TCP streams and can be used by any application with SOCKS
     support.
     </p>
-    
+
     <p>
     For efficiency, the Tor software uses the same circuit for connections
     that happen within the same ten minutes or so.  Later requests are given a
     new circuit, to keep people from linking your earlier actions to the new
     ones.
     </p>
-    
+
     <p><img alt="Tor circuit step three" src="$(IMGROOT)/htw3.png"></p>
-    
-    
+
+
     <a name="hiddenservices"></a>
     <h3><a class="anchor" href="#hiddenservices">Hidden services</a></h3>
-    
+
     <p>
     Tor also makes it possible for users to hide their locations while
     offering various kinds of services, such as web publishing or an instant
@@ -213,10 +213,10 @@
     hidden services</a> and how the <a href="<page docs/hidden-services>">hidden
     service protocol</a> works.
     </p>
-    
+
     <a name="stayinganonymous"></a>
     <h3><a class="anchor" href="#stayinganonymous">Staying anonymous</a></h3>
-    
+
     <p>
     Tor can't solve all anonymity problems.  It focuses only on
     protecting the transport of data.  You need to use protocol-specific
@@ -225,7 +225,7 @@
     while browsing the web to withhold some information about your computer's
     configuration.
     </p>
-    
+
     <p>
     Also, to protect your anonymity, be smart.  Don't provide your name
     or other revealing information in web forms.  Be aware that, like all
@@ -235,10 +235,10 @@
     arriving at your chosen destination, he can use statistical analysis to
     discover that they are part of the same circuit.
     </p>
-    
+
     <a name="thefutureoftor"></a>
     <h3><a class="anchor" href="#thefutureoftor">The future of Tor</a></h3>
-    
+
     <p>
     Providing a usable anonymizing network on the Internet today is an
     ongoing challenge. We want software that meets users' needs. We also
@@ -252,7 +252,7 @@
     or <a href="<page getinvolved/volunteer>">volunteering</a> as a
     <a href="<page docs/documentation>#Developers">developer</a>.
     </p>
-    
+
     <p>
     Ongoing trends in law, policy, and technology threaten anonymity as never
     before, undermining our ability to speak and read freely online. These
@@ -262,7 +262,7 @@
     provides additional diversity, enhancing Tor's ability to put control
     over your security and privacy back into your hands.
     </p>
-    
+
   </div>
   <!-- END MAINCOL -->
   <div id = "sidecol">
@@ -272,4 +272,4 @@
   <!-- END SIDECOL -->
 </div>
 <!-- END CONTENT -->
-#include <foot.wmi> 
+#include <foot.wmi>



More information about the tor-commits mailing list