|  | @@ -12,84 +12,18 @@
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <h1><a href="http://tor.eff.org/">Tor</a> documentation</h1>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<p>Tor provides a distributed network of servers ("onion routers"). Users
 | 
	
		
			
				|  |  | -bounce their communications (web requests, IM, IRC, SSH, etc.) around
 | 
	
		
			
				|  |  | -the routers. This makes it hard for recipients, observers, and even the
 | 
	
		
			
				|  |  | -onion routers themselves to track the source of the stream.</p>
 | 
	
		
			
				|  |  | +<p>
 | 
	
		
			
				|  |  | +This document is obsolete. See the new <a
 | 
	
		
			
				|  |  | +href="http://tor.eff.org/documentation.html">Tor documentation</a> page.
 | 
	
		
			
				|  |  | +</p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <a name="why"></a>
 | 
	
		
			
				|  |  |  <h2>Why should I use Tor?</h2>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -<p>Individuals need Tor for privacy:
 | 
	
		
			
				|  |  | -<ul>
 | 
	
		
			
				|  |  | -<li>Privacy in web browsing -- both from the remote website (so it can't
 | 
	
		
			
				|  |  | -track and sell your behavior), and similarly from your local ISP.
 | 
	
		
			
				|  |  | -<li>Safety in web browsing: if your local government doesn't approve
 | 
	
		
			
				|  |  | -of its citizens visiting certain websites, they may monitor the sites
 | 
	
		
			
				|  |  | -and put readers on a list of suspicious persons.
 | 
	
		
			
				|  |  | -<li>Circumvention of local censorship: connect to resources (news
 | 
	
		
			
				|  |  | -sites, instant messaging, etc.) that are restricted from your
 | 
	
		
			
				|  |  | -ISP/school/company/government.
 | 
	
		
			
				|  |  | -<li>Socially sensitive communication: chat rooms and web forums for
 | 
	
		
			
				|  |  | -rape and abuse survivors, or people with illnesses.
 | 
	
		
			
				|  |  | -</ul>
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -<p>Journalists and NGOs need Tor for safety:
 | 
	
		
			
				|  |  | -<ul>
 | 
	
		
			
				|  |  | -<li>Allowing dissidents and whistleblowers to communicate more safely.
 | 
	
		
			
				|  |  | -<li>Censorship-resistant publication, such as making available your
 | 
	
		
			
				|  |  | -home-made movie anonymously via a Tor <a
 | 
	
		
			
				|  |  | -href="http://tor.eff.org/doc/tor-hidden-service.html">hidden
 | 
	
		
			
				|  |  | -service</a>; and reading, e.g. of news sites not permitted in some
 | 
	
		
			
				|  |  | -countries.
 | 
	
		
			
				|  |  | -<li>Allowing your workers to check back with your home website while
 | 
	
		
			
				|  |  | -they're in a foreign country, without notifying everybody nearby that
 | 
	
		
			
				|  |  | -they're working with your organization.
 | 
	
		
			
				|  |  | -</ul>
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -<p>Companies need Tor for business security:
 | 
	
		
			
				|  |  | -<ul>
 | 
	
		
			
				|  |  | -<li>Competitive analysis: browse the competition's website safely.
 | 
	
		
			
				|  |  | -<li>Protecting collaborations of sensitive business units or partners.
 | 
	
		
			
				|  |  | -<li>Protecting procurement suppliers or patterns.
 | 
	
		
			
				|  |  | -<li>Putting the "P" back in "VPN": traditional VPNs reveal the exact
 | 
	
		
			
				|  |  | -amount and frequency of communication. Which locations have employees
 | 
	
		
			
				|  |  | -working late? Which locations have employees consulting job-hunting
 | 
	
		
			
				|  |  | -websites? Which research groups are communicating with your company's
 | 
	
		
			
				|  |  | -patent lawyers?
 | 
	
		
			
				|  |  | -</ul>
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -<p>Governments need Tor for traffic-analysis-resistant communication:
 | 
	
		
			
				|  |  | -<ul>
 | 
	
		
			
				|  |  | -<li>Open source intelligence gathering (hiding individual analysts is
 | 
	
		
			
				|  |  | -not enough -- the organization itself may be sensitive).
 | 
	
		
			
				|  |  | -<li>Defense in depth on open <em>and classified</em> networks -- networks
 | 
	
		
			
				|  |  | -with a million users (even if they're all cleared) can't be made safe just
 | 
	
		
			
				|  |  | -by hardening them to external threat.
 | 
	
		
			
				|  |  | -<li>Dynamic and semi-trusted international coalitions: the network can
 | 
	
		
			
				|  |  | -be shared without revealing the existence or amount of communication
 | 
	
		
			
				|  |  | -between all parties.
 | 
	
		
			
				|  |  | -<li>Networks partially under known hostile control: to block
 | 
	
		
			
				|  |  | -communications, the enemy must take down the whole network.
 | 
	
		
			
				|  |  | -<li>Politically sensitive negotiations.
 | 
	
		
			
				|  |  | -<li>Road warriors.
 | 
	
		
			
				|  |  | -<li>Protecting procurement patterns.
 | 
	
		
			
				|  |  | -<li>Anonymous tips.
 | 
	
		
			
				|  |  | -</ul>
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -<p>Law enforcement needs Tor for safety:
 | 
	
		
			
				|  |  | -<ul>
 | 
	
		
			
				|  |  | -<li>Allowing anonymous tips or crime reporting
 | 
	
		
			
				|  |  | -<li>Allowing agents to observe websites without notifying them that
 | 
	
		
			
				|  |  | -they're being observed (or, more broadly, without having it be an
 | 
	
		
			
				|  |  | -official visit from law enforcement).
 | 
	
		
			
				|  |  | -<li>Surveillance and honeypots (sting operations)
 | 
	
		
			
				|  |  | -</ul>
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -<p>Does the idea of sharing the Tor network with
 | 
	
		
			
				|  |  | -all of these groups bother you? It shouldn't -- <a
 | 
	
		
			
				|  |  | -href="http://freehaven.net/doc/fc03/econymics.pdf">you need them for
 | 
	
		
			
				|  |  | -your security</a>.</p>
 | 
	
		
			
				|  |  | +<p>See the first section of the <a
 | 
	
		
			
				|  |  | +href="http://tor.eff.org/overview.html">Tor Overview</a> to read about
 | 
	
		
			
				|  |  | +the variety of users Tor has.
 | 
	
		
			
				|  |  | +</p>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  <a name="installing"></a>
 | 
	
		
			
				|  |  |  <a name="client"></a>
 |