[or-cvs] r13011: Update who uses tor. Good enough for exposure to the world, (website/trunk/en)
phobos at seul.org
phobos at seul.org
Tue Jan 1 03:09:22 UTC 2008
Author: phobos
Date: 2007-12-31 22:09:22 -0500 (Mon, 31 Dec 2007)
New Revision: 13011
Modified:
website/trunk/en/torusers.wml
Log:
Update who uses tor. Good enough for exposure to the world, if arma
agrees.
Modified: website/trunk/en/torusers.wml
===================================================================
--- website/trunk/en/torusers.wml 2008-01-01 02:35:02 UTC (rev 13010)
+++ website/trunk/en/torusers.wml 2008-01-01 03:09:22 UTC (rev 13011)
@@ -9,16 +9,28 @@
<div class="main-column">
<h1>Who uses Tor?</h1>
+<ul>
+<li><a href="<page torusers>#normalusers">Everyday, ordinary Internet users use Tor</a></li>
+<li><a href="<page torusers>#military">Militaries use Tor</a></li>
+<li><a href="<page torusers>#journalist">Journalists and their audience use Tor</a></li>
+<li><a href="<page torusers>#lawenforcement">Law enforcement officers use Tor</a></li>
+<li><a href="<page torusers>#activists">Activists & Whistleblowers use Tor</a></li>
+<li><a href="<page torusers>#spotlight">Both high and low profile people use Tor</a></li>
+<li><a href="<page torusers>#executives">Business executives use Tor</a></li>
+<li><a href="<page torusers>#bloggers">Bloggers use Tor</a></li>
+</ul>
+<p>
+<h2>Inception</h2>
<p>
Tor was originally designed, implemented, and deployed as a third-generation
-<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>,
-and was originally developed by and for the U.S. Navy for the primary purpose of protecting government communications.
+<a href="http://www.onion-router.net/">onion routing project of the Naval Research Laboratory</a>.
+It was originally developed by, and for, the U.S. Navy for the primary purpose of protecting government communications.
Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others. Here are some of the specific uses we've seen or recommend.
</p>
<a link="normalusers"></a>
-<h2>Everyday, ordinary Internet surfers use Tor</h2>
+<h2><a class="anchor" href="#normalusers">Everyday, ordinary Internet users use Tor</a></h2>
<ul>
<li><strong>They protect their privacy from unscrupulous marketers and identity thieves.</strong>
Internet Service Providers (ISPs) <a href="http://seekingalpha.com/article/29449-compete-ceo-isps-sell-clickstreams-for-5-a-month">
@@ -30,7 +42,7 @@
userid and even password information can still be part of this data. In addition to your ISP, the websites (<a href="http://www.google.com/privacy_faq.html">and search engines</a>) you visit have their own logs, containing the same or more information.
</li>
<li><strong> They protect their communications from irresponsible corporations.</strong>
-All over the net, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
+All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of
private data. From <a href="http://www.securityfocus.com/news/11048">lost backup tapes</a>, to
<a href="http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090">giving away the data to researchers</a>,
your data is often not well protected by those you are supposed to trust to keep it safe.
@@ -43,14 +55,12 @@
<li><strong>They research sensitive topics.</strong>
There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
<a href="http://www.cbsnews.com/stories/2002/12/03/tech/main531567.shtml">Tibetan culture</a>,
-or world religions is behind a national firewall. Or perhaps you are worried that if you research a particular set of
-symptoms, at some later date an insurance company might buy the logs of the websites you visited and establish that
-you had suspicions of a pre-existing condition.
+or world religions is behind a national firewall.
</li>
</ul>
<a link="military"></a>
-<h2>Militaries use Tor</h2>
+<h2><a class="anchor" href="#military">Militaries use Tor</a></h2>
<ul>
<li>
@@ -58,7 +68,7 @@
It is not difficult for insurgents to monitor internet traffic and
discover all the hotels and other locations from which people are
connecting to known military servers.
-Military field agents deployed away from home have used Tor to
+Military field agents deployed away from home use Tor to
mask the sites they are visiting, protecting military interests and
operations, as well as protecting themselves from physical harm.
</li>
@@ -76,7 +86,7 @@
</ul>
<a link="journalist"></a>
-<h2>Journalists and their audience use Tor</h2>
+<h2><a class="anchor" href="#journalist">Journalists and their audience use Tor</a></h2>
<ul>
<li><strong><a href="http://www.rsf.org/">Reporters without Borders</a></strong>
tracks internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
@@ -100,7 +110,7 @@
</ul>
<a link="lawenforcement"></a>
-<h2>Law enforcement officers use Tor</h2>
+<h2><a class="anchor" href="#lawenforcement">Law enforcement officers use Tor</a></h2>
<ul>
<li><strong>Online surveillance:</strong>
Tor allows officials to surf questionable web sites and services
@@ -113,7 +123,7 @@
Similarly, anonymity allows law officers to engage in online
“undercover ” operations. Regardless of how good an
undercover officer's “street cred” may be, if the
-communications include nypd.nyc.ny.state.us, the cover is blown.
+communications include IP ranges from police addresses, the cover is blown.
</li>
<li><strong>Truly anonymous tip lines:</strong>
While online anonymous tip lines are popular, without anonymity
@@ -125,7 +135,7 @@
</ul>
<a link="activists"></a>
-<h2>Activists & whistleblowers use Tor</h2>
+<h2><a class="anchor" href="#activists">Activists & Whistleblowers use Tor</a></h2>
<ul>
<li><strong>Human rights activists use Tor to anonymously report abuses from
danger zones.</strong> Internationally, labor rights workers use Tor and other
@@ -191,7 +201,7 @@
</ul>
<a link="spotlight"></a>
-<h2>Both high and low profile people use Tor</h2>
+<h2><a class="anchor" href="#spotlight">Both high and low profile people use Tor</a></h2>
<ul>
<li>Does being in the public spotlight shut you off from having a private
life, forever, online? A rural lawyer in a New England state keeps
@@ -221,14 +231,13 @@
</ul>
<a link="executives"></a>
-<h2>Business executives use Tor</h2>
+<h2><a class="anchor" href="#executives">Business executives use Tor</a></h2>
<ul>
<li><strong>Security breach information clearinghouses:</strong>
Say a financial institution participates in a security clearinghouse
of information on Internet attacks. Such a repository requires members
to report breaches to a central group, who correlates attacks to detect
-coordinated patterns and send out alerts. But if a specific bank in
-St. Louis is breached, they don't want an attacker watching the incoming
+coordinated patterns and send out alerts. But if a specific bank in St. Louis is breached, they don't want an attacker watching the incoming
traffic to such a repository to be able to track where information is
coming from. Even though every packet were encrypted, the IP
address would betray the location of a compromised system. Tor allows
@@ -258,7 +267,7 @@
</ul>
<a link="bloggers"></a>
-<h2>Bloggers use Tor</h2>
+<h2><a class="anchor" href="#bloggers">Bloggers use Tor</a></h2>
<ul>
<li>Every day we hear about bloggers who are
<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
@@ -293,6 +302,6 @@
purposes (e.g. the majority of Tor relays do not support smtp in order to prevent anonymous email spamming), or if you're one of the
<a href="http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Four Horsemen of the Information Apocalypse</a>,
you have better options than Tor. While not dismissing the potential abuses of Tor,
-this page shows a few of the many important ways anonymity is used today.</p>
+this page shows a few of the many important ways anonymity is used online today.</p>
</div>
#include <foot.wmi>
More information about the tor-commits
mailing list