[tor-commits] r24558: {website} Update abuse FAQ and re-add the ToC. (website/trunk/docs/en)
Mike Perry
mikeperry-svn at fscked.org
Mon Apr 4 21:05:06 UTC 2011
Author: mikeperry
Date: 2011-04-04 21:05:05 +0000 (Mon, 04 Apr 2011)
New Revision: 24558
Modified:
website/trunk/docs/en/faq-abuse.wml
Log:
Update abuse FAQ and re-add the ToC.
Modified: website/trunk/docs/en/faq-abuse.wml
===================================================================
--- website/trunk/docs/en/faq-abuse.wml 2011-04-04 19:53:25 UTC (rev 24557)
+++ website/trunk/docs/en/faq-abuse.wml 2011-04-04 21:05:05 UTC (rev 24558)
@@ -12,6 +12,7 @@
<div id="maincol">
<!-- PUT CONTENT AFTER THIS TAG -->
<h1>Abuse FAQ</h1>
+ <hr>
#<!-- BEGIN SIDEBAR -->
#<div class="sidebar-left">
#<h3>Questions</h3>
@@ -30,7 +31,21 @@
#</ul>
#</div>
#<!-- END SIDEBAR -->
- #<hr>
+ <h3>Questions</h3>
+ <ul>
+ <li><a href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li>
+ <li><a href="#DDoS">What about distributed denial of service attacks?</a></li>
+ <li><a href="#WhatAboutSpammers">What about spammers?</a></li>
+ <li><a href="#HowMuchAbuse">Does Tor get much abuse?</a></li>
+ <li><a href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></li>
+ <li><a href="#IrcBans">Tor is banned from the IRC network I want to use.</a></li>
+ <li><a href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>
+ <li><a href="#Bans">I want to ban the Tor network from my service.</a></li>
+ <li><a href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>
+ <li><a href="#RemoveContent">I want some content removed from a .onion address.</a></li>
+ <li><a href="#LegalQuestions">I have legal questions about Tor abuse.</a></li>
+ </ul>
+ <hr>
<a id="WhatAboutCriminals"></a>
<h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3>
@@ -157,6 +172,13 @@
Template</a>, which explains why your ISP can probably ignore
the notice without any liability. [Arbitrary ports]</li>
</ul>
+
+ <p>For a complete set of template responses to different abuse complaint
+ types, see <a
+ href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates
+ on the Tor wiki</a>. You can also proactively reduce the amount of abuse you
+ get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips
+ for running an exit node with minimal harassment</a>.
<p>You might also find that your Tor relay's IP is blocked from accessing
some Internet sites/services. This might happen regardless of your exit
@@ -338,14 +360,27 @@
to ensure their anonymity (identity theft, compromising computers and
using them as bounce points, etc).
</p>
-
+
<p>
+ This ultimately means that it is the responsibility of site owners to protect
+ themselves against compromise and security issues that can come from
+ anywhere. This is just part of signing up for the benefits of the
+ Internet. You must be prepared to secure yourself against the bad elements,
+ wherever they may come from. Tracking and increased surveillance are not
+ the answer to preventing abuse.
+ </p>
+
+ <p>
But remember that this doesn't mean that Tor is invulnerable. Traditional
police techniques can still be very effective against Tor, such as
- interviewing suspects, surveillance and keyboard taps, writing style
- analysis, sting operations, and other physical investigations.
+ investigating means, motive, and opportunity, interviewing suspects,
+ writing style analysis, technical analysis of the content itself, sting operations,
+ keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone
+ including law enforcement groups to train them how to use the Tor software to safely conduct
+ investigations or anonymized activities online.
</p>
-
+
+
<a id="RemoveContent"></a>
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
<p>The Tor Project does not host, control, nor have the ability to
@@ -359,15 +394,21 @@
owner and location of the .onion site is hidden even from us.</p>
<p>But remember that this doesn't mean that hidden services are
invulnerable. Traditional police techniques can still be very effective
- against them, such as interviewing suspects, surveillance and keyboard
- taps, writing style analysis, sting operations, and other physical
- investigations.</p>
+ against them, such as interviewing suspects, writing style analysis,
+ technical analysis of the content itself, sting operations, keyboard taps,
+ and other physical investigations.</p>
+
<p>If you have a complaint about child pornography, you may wish to report
it to the National Center for Missing and Exploited Children, which serves
as a national coordination point for investigation of child pornography:
<a href="http://www.missingkids.com/">http://www.missingkids.com/</a>.
We do not view links you report.</p>
-
+
+ <p>The Tor Project also encourages the use of Tor by law enforcement in
+ the investigation, stings, and infiltration of child pornography rings.
+ Please contact us for information on Tor trainings.
+ </p>
+
<a id="LegalQuestions"></a>
<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
More information about the tor-commits
mailing list