summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2005-09-12 10:31:33 +0000
committerRoger Dingledine <arma@torproject.org>2005-09-12 10:31:33 +0000
commit2939b18935b63d344c0e747ce7ec300cb6bcdcbf (patch)
tree55eef136f1ca47278788f7d0d115648730381cb5
parent39e29738b18dbf9950a52872579dc3564ad4d550 (diff)
downloadtor-2939b18935b63d344c0e747ce7ec300cb6bcdcbf.tar.gz
tor-2939b18935b63d344c0e747ce7ec300cb6bcdcbf.zip
put the last nail in tor-doc.html
svn:r5019
-rw-r--r--doc/tor-doc.html82
1 files changed, 8 insertions, 74 deletions
diff --git a/doc/tor-doc.html b/doc/tor-doc.html
index 3ab7b20f1e..8edb03f39e 100644
--- a/doc/tor-doc.html
+++ b/doc/tor-doc.html
@@ -12,84 +12,18 @@
<h1><a href="http://tor.eff.org/">Tor</a> documentation</h1>
-<p>Tor provides a distributed network of servers ("onion routers"). Users
-bounce their communications (web requests, IM, IRC, SSH, etc.) around
-the routers. This makes it hard for recipients, observers, and even the
-onion routers themselves to track the source of the stream.</p>
+<p>
+This document is obsolete. See the new <a
+href="http://tor.eff.org/documentation.html">Tor documentation</a> page.
+</p>
<a name="why"></a>
<h2>Why should I use Tor?</h2>
-<p>Individuals need Tor for privacy:
-<ul>
-<li>Privacy in web browsing -- both from the remote website (so it can't
-track and sell your behavior), and similarly from your local ISP.
-<li>Safety in web browsing: if your local government doesn't approve
-of its citizens visiting certain websites, they may monitor the sites
-and put readers on a list of suspicious persons.
-<li>Circumvention of local censorship: connect to resources (news
-sites, instant messaging, etc.) that are restricted from your
-ISP/school/company/government.
-<li>Socially sensitive communication: chat rooms and web forums for
-rape and abuse survivors, or people with illnesses.
-</ul>
-
-<p>Journalists and NGOs need Tor for safety:
-<ul>
-<li>Allowing dissidents and whistleblowers to communicate more safely.
-<li>Censorship-resistant publication, such as making available your
-home-made movie anonymously via a Tor <a
-href="http://tor.eff.org/doc/tor-hidden-service.html">hidden
-service</a>; and reading, e.g. of news sites not permitted in some
-countries.
-<li>Allowing your workers to check back with your home website while
-they're in a foreign country, without notifying everybody nearby that
-they're working with your organization.
-</ul>
-
-<p>Companies need Tor for business security:
-<ul>
-<li>Competitive analysis: browse the competition's website safely.
-<li>Protecting collaborations of sensitive business units or partners.
-<li>Protecting procurement suppliers or patterns.
-<li>Putting the "P" back in "VPN": traditional VPNs reveal the exact
-amount and frequency of communication. Which locations have employees
-working late? Which locations have employees consulting job-hunting
-websites? Which research groups are communicating with your company's
-patent lawyers?
-</ul>
-
-<p>Governments need Tor for traffic-analysis-resistant communication:
-<ul>
-<li>Open source intelligence gathering (hiding individual analysts is
-not enough -- the organization itself may be sensitive).
-<li>Defense in depth on open <em>and classified</em> networks -- networks
-with a million users (even if they're all cleared) can't be made safe just
-by hardening them to external threat.
-<li>Dynamic and semi-trusted international coalitions: the network can
-be shared without revealing the existence or amount of communication
-between all parties.
-<li>Networks partially under known hostile control: to block
-communications, the enemy must take down the whole network.
-<li>Politically sensitive negotiations.
-<li>Road warriors.
-<li>Protecting procurement patterns.
-<li>Anonymous tips.
-</ul>
-
-<p>Law enforcement needs Tor for safety:
-<ul>
-<li>Allowing anonymous tips or crime reporting
-<li>Allowing agents to observe websites without notifying them that
-they're being observed (or, more broadly, without having it be an
-official visit from law enforcement).
-<li>Surveillance and honeypots (sting operations)
-</ul>
-
-<p>Does the idea of sharing the Tor network with
-all of these groups bother you? It shouldn't -- <a
-href="http://freehaven.net/doc/fc03/econymics.pdf">you need them for
-your security</a>.</p>
+<p>See the first section of the <a
+href="http://tor.eff.org/overview.html">Tor Overview</a> to read about
+the variety of users Tor has.
+</p>
<a name="installing"></a>
<a name="client"></a>