diff options
author | Roger Dingledine <arma@torproject.org> | 2005-09-12 10:31:33 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2005-09-12 10:31:33 +0000 |
commit | 2939b18935b63d344c0e747ce7ec300cb6bcdcbf (patch) | |
tree | 55eef136f1ca47278788f7d0d115648730381cb5 /doc/tor-doc.html | |
parent | 39e29738b18dbf9950a52872579dc3564ad4d550 (diff) | |
download | tor-2939b18935b63d344c0e747ce7ec300cb6bcdcbf.tar.gz tor-2939b18935b63d344c0e747ce7ec300cb6bcdcbf.zip |
put the last nail in tor-doc.html
svn:r5019
Diffstat (limited to 'doc/tor-doc.html')
-rw-r--r-- | doc/tor-doc.html | 82 |
1 files changed, 8 insertions, 74 deletions
diff --git a/doc/tor-doc.html b/doc/tor-doc.html index 3ab7b20f1e..8edb03f39e 100644 --- a/doc/tor-doc.html +++ b/doc/tor-doc.html @@ -12,84 +12,18 @@ <h1><a href="http://tor.eff.org/">Tor</a> documentation</h1> -<p>Tor provides a distributed network of servers ("onion routers"). Users -bounce their communications (web requests, IM, IRC, SSH, etc.) around -the routers. This makes it hard for recipients, observers, and even the -onion routers themselves to track the source of the stream.</p> +<p> +This document is obsolete. See the new <a +href="http://tor.eff.org/documentation.html">Tor documentation</a> page. +</p> <a name="why"></a> <h2>Why should I use Tor?</h2> -<p>Individuals need Tor for privacy: -<ul> -<li>Privacy in web browsing -- both from the remote website (so it can't -track and sell your behavior), and similarly from your local ISP. -<li>Safety in web browsing: if your local government doesn't approve -of its citizens visiting certain websites, they may monitor the sites -and put readers on a list of suspicious persons. -<li>Circumvention of local censorship: connect to resources (news -sites, instant messaging, etc.) that are restricted from your -ISP/school/company/government. -<li>Socially sensitive communication: chat rooms and web forums for -rape and abuse survivors, or people with illnesses. -</ul> - -<p>Journalists and NGOs need Tor for safety: -<ul> -<li>Allowing dissidents and whistleblowers to communicate more safely. -<li>Censorship-resistant publication, such as making available your -home-made movie anonymously via a Tor <a -href="http://tor.eff.org/doc/tor-hidden-service.html">hidden -service</a>; and reading, e.g. of news sites not permitted in some -countries. -<li>Allowing your workers to check back with your home website while -they're in a foreign country, without notifying everybody nearby that -they're working with your organization. -</ul> - -<p>Companies need Tor for business security: -<ul> -<li>Competitive analysis: browse the competition's website safely. -<li>Protecting collaborations of sensitive business units or partners. -<li>Protecting procurement suppliers or patterns. -<li>Putting the "P" back in "VPN": traditional VPNs reveal the exact -amount and frequency of communication. Which locations have employees -working late? Which locations have employees consulting job-hunting -websites? Which research groups are communicating with your company's -patent lawyers? -</ul> - -<p>Governments need Tor for traffic-analysis-resistant communication: -<ul> -<li>Open source intelligence gathering (hiding individual analysts is -not enough -- the organization itself may be sensitive). -<li>Defense in depth on open <em>and classified</em> networks -- networks -with a million users (even if they're all cleared) can't be made safe just -by hardening them to external threat. -<li>Dynamic and semi-trusted international coalitions: the network can -be shared without revealing the existence or amount of communication -between all parties. -<li>Networks partially under known hostile control: to block -communications, the enemy must take down the whole network. -<li>Politically sensitive negotiations. -<li>Road warriors. -<li>Protecting procurement patterns. -<li>Anonymous tips. -</ul> - -<p>Law enforcement needs Tor for safety: -<ul> -<li>Allowing anonymous tips or crime reporting -<li>Allowing agents to observe websites without notifying them that -they're being observed (or, more broadly, without having it be an -official visit from law enforcement). -<li>Surveillance and honeypots (sting operations) -</ul> - -<p>Does the idea of sharing the Tor network with -all of these groups bother you? It shouldn't -- <a -href="http://freehaven.net/doc/fc03/econymics.pdf">you need them for -your security</a>.</p> +<p>See the first section of the <a +href="http://tor.eff.org/overview.html">Tor Overview</a> to read about +the variety of users Tor has. +</p> <a name="installing"></a> <a name="client"></a> |