123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133 |
- <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
- <html>
- <head>
- <title>Tor Documentation</title>
- <meta name="Author" content="Roger Dingledine">
- <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
- <meta http-equiv="Content-Style-Type" content="text/css">
- <link rel="stylesheet" type="text/css" href="tor-doc.css">
- </head>
- <body>
- <h1><a href="http://tor.eff.org/">Tor</a> documentation</h1>
- <p>Tor provides a distributed network of servers ("onion routers"). Users
- bounce their communications (web requests, IM, IRC, SSH, etc.) around
- the routers. This makes it hard for recipients, observers, and even the
- onion routers themselves to track the source of the stream.</p>
- <a name="why"></a>
- <h2>Why should I use Tor?</h2>
- <p>Individuals need Tor for privacy:
- <ul>
- <li>Privacy in web browsing -- both from the remote website (so it can't
- track and sell your behavior), and similarly from your local ISP.
- <li>Safety in web browsing: if your local government doesn't approve
- of its citizens visiting certain websites, they may monitor the sites
- and put readers on a list of suspicious persons.
- <li>Circumvention of local censorship: connect to resources (news
- sites, instant messaging, etc.) that are restricted from your
- ISP/school/company/government.
- <li>Socially sensitive communication: chat rooms and web forums for
- rape and abuse survivors, or people with illnesses.
- </ul>
- <p>Journalists and NGOs need Tor for safety:
- <ul>
- <li>Allowing dissidents and whistleblowers to communicate more safely.
- <li>Censorship-resistant publication, such as making available your
- home-made movie anonymously via a Tor <a
- href="http://tor.eff.org/doc/tor-hidden-service.html">hidden
- service</a>; and reading, e.g. of news sites not permitted in some
- countries.
- <li>Allowing your workers to check back with your home website while
- they're in a foreign country, without notifying everybody nearby that
- they're working with your organization.
- </ul>
- <p>Companies need Tor for business security:
- <ul>
- <li>Competitive analysis: browse the competition's website safely.
- <li>Protecting collaborations of sensitive business units or partners.
- <li>Protecting procurement suppliers or patterns.
- <li>Putting the "P" back in "VPN": traditional VPNs reveal the exact
- amount and frequency of communication. Which locations have employees
- working late? Which locations have employees consulting job-hunting
- websites? Which research groups are communicating with your company's
- patent lawyers?
- </ul>
- <p>Governments need Tor for traffic-analysis-resistant communication:
- <ul>
- <li>Open source intelligence gathering (hiding individual analysts is
- not enough -- the organization itself may be sensitive).
- <li>Defense in depth on open <em>and classified</em> networks -- networks
- with a million users (even if they're all cleared) can't be made safe just
- by hardening them to external threat.
- <li>Dynamic and semi-trusted international coalitions: the network can
- be shared without revealing the existence or amount of communication
- between all parties.
- <li>Networks partially under known hostile control: to block
- communications, the enemy must take down the whole network.
- <li>Politically sensitive negotiations.
- <li>Road warriors.
- <li>Protecting procurement patterns.
- <li>Anonymous tips.
- </ul>
- <p>Law enforcement needs Tor for safety:
- <ul>
- <li>Allowing anonymous tips or crime reporting
- <li>Allowing agents to observe websites without notifying them that
- they're being observed (or, more broadly, without having it be an
- official visit from law enforcement).
- <li>Surveillance and honeypots (sting operations)
- </ul>
- <p>Does the idea of sharing the Tor network with
- all of these groups bother you? It shouldn't -- <a
- href="http://freehaven.net/doc/fc03/econymics.pdf">you need them for
- your security</a>.</p>
- <a name="installing"></a>
- <a name="client"></a>
- <h2>Installing and configuring Tor</h2>
- <p>See the <a href="tor-doc-win32.html">Windows</a>,
- <a href="tor-doc-osx.html">OS X</a>, and <a
- href="tor-doc-unix.html">Linux/BSD/Unix</a> documentation guides.
- <a name="client-or-server"></a>
- <a name="server"></a>
- <h2>Configuring a server</h2>
- <p>
- We've moved this section over to the new
- <a href="http://tor.eff.org/doc/tor-doc-server.html">Tor Server
- Configuration Guide</a>. Hope you like it.
- </p>
- <a name="hidden-service"></a>
- <h2>Configuring a hidden service</h2>
- <p>
- We've moved this section over to the new <a
- href="http://tor.eff.org/doc/tor-hidden-service.html">Tor Hidden Service
- Howto</a>. Hope you like it.
- </p>
- <a name="own-network"></a>
- <h2>Setting up your own network</h2>
- <p>
- See the <a
- href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#OwnTorNetwork">new
- FAQ entry</a> for how to set up your
- own Tor network.
- </p>
- </body>
- </html>
|