tor-doc.html 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
  2. <html>
  3. <head>
  4. <title>Tor Documentation</title>
  5. <meta name="Author" content="Roger Dingledine">
  6. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  7. <meta http-equiv="Content-Style-Type" content="text/css">
  8. <link rel="stylesheet" type="text/css" href="tor-doc.css">
  9. </head>
  10. <body>
  11. <h1><a href="http://tor.eff.org/">Tor</a> documentation</h1>
  12. <p>Tor provides a distributed network of servers ("onion routers"). Users
  13. bounce their communications (web requests, IM, IRC, SSH, etc.) around
  14. the routers. This makes it hard for recipients, observers, and even the
  15. onion routers themselves to track the source of the stream.</p>
  16. <a name="why"></a>
  17. <h2>Why should I use Tor?</h2>
  18. <p>Individuals need Tor for privacy:
  19. <ul>
  20. <li>Privacy in web browsing -- both from the remote website (so it can't
  21. track and sell your behavior), and similarly from your local ISP.
  22. <li>Safety in web browsing: if your local government doesn't approve
  23. of its citizens visiting certain websites, they may monitor the sites
  24. and put readers on a list of suspicious persons.
  25. <li>Circumvention of local censorship: connect to resources (news
  26. sites, instant messaging, etc.) that are restricted from your
  27. ISP/school/company/government.
  28. <li>Socially sensitive communication: chat rooms and web forums for
  29. rape and abuse survivors, or people with illnesses.
  30. </ul>
  31. <p>Journalists and NGOs need Tor for safety:
  32. <ul>
  33. <li>Allowing dissidents and whistleblowers to communicate more safely.
  34. <li>Censorship-resistant publication, such as making available your
  35. home-made movie anonymously via a Tor <a
  36. href="http://tor.eff.org/doc/tor-hidden-service.html">hidden
  37. service</a>; and reading, e.g. of news sites not permitted in some
  38. countries.
  39. <li>Allowing your workers to check back with your home website while
  40. they're in a foreign country, without notifying everybody nearby that
  41. they're working with your organization.
  42. </ul>
  43. <p>Companies need Tor for business security:
  44. <ul>
  45. <li>Competitive analysis: browse the competition's website safely.
  46. <li>Protecting collaborations of sensitive business units or partners.
  47. <li>Protecting procurement suppliers or patterns.
  48. <li>Putting the "P" back in "VPN": traditional VPNs reveal the exact
  49. amount and frequency of communication. Which locations have employees
  50. working late? Which locations have employees consulting job-hunting
  51. websites? Which research groups are communicating with your company's
  52. patent lawyers?
  53. </ul>
  54. <p>Governments need Tor for traffic-analysis-resistant communication:
  55. <ul>
  56. <li>Open source intelligence gathering (hiding individual analysts is
  57. not enough -- the organization itself may be sensitive).
  58. <li>Defense in depth on open <em>and classified</em> networks -- networks
  59. with a million users (even if they're all cleared) can't be made safe just
  60. by hardening them to external threat.
  61. <li>Dynamic and semi-trusted international coalitions: the network can
  62. be shared without revealing the existence or amount of communication
  63. between all parties.
  64. <li>Networks partially under known hostile control: to block
  65. communications, the enemy must take down the whole network.
  66. <li>Politically sensitive negotiations.
  67. <li>Road warriors.
  68. <li>Protecting procurement patterns.
  69. <li>Anonymous tips.
  70. </ul>
  71. <p>Law enforcement needs Tor for safety:
  72. <ul>
  73. <li>Allowing anonymous tips or crime reporting
  74. <li>Allowing agents to observe websites without notifying them that
  75. they're being observed (or, more broadly, without having it be an
  76. official visit from law enforcement).
  77. <li>Surveillance and honeypots (sting operations)
  78. </ul>
  79. <p>Does the idea of sharing the Tor network with
  80. all of these groups bother you? It shouldn't -- <a
  81. href="http://freehaven.net/doc/fc03/econymics.pdf">you need them for
  82. your security</a>.</p>
  83. <a name="installing"></a>
  84. <a name="client"></a>
  85. <h2>Installing and configuring Tor</h2>
  86. <p>See the <a href="tor-doc-win32.html">Windows</a>,
  87. <a href="tor-doc-osx.html">OS X</a>, and <a
  88. href="tor-doc-unix.html">Linux/BSD/Unix</a> documentation guides.
  89. <a name="client-or-server"></a>
  90. <a name="server"></a>
  91. <h2>Configuring a server</h2>
  92. <p>
  93. We've moved this section over to the new
  94. <a href="http://tor.eff.org/doc/tor-doc-server.html">Tor Server
  95. Configuration Guide</a>. Hope you like it.
  96. </p>
  97. <a name="hidden-service"></a>
  98. <h2>Configuring a hidden service</h2>
  99. <p>
  100. We've moved this section over to the new <a
  101. href="http://tor.eff.org/doc/tor-hidden-service.html">Tor Hidden Service
  102. Howto</a>. Hope you like it.
  103. </p>
  104. <a name="own-network"></a>
  105. <h2>Setting up your own network</h2>
  106. <p>
  107. See the <a
  108. href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#OwnTorNetwork">new
  109. FAQ entry</a> for how to set up your
  110. own Tor network.
  111. </p>
  112. </body>
  113. </html>