[prev in list] [next in list] [prev in thread] [next in thread]
List: tor-cvs
Subject: [or-cvs] r19188: {website} Updated faq question on how tor is different than others. (website/trunk
From: phobos () seul ! org
Date: 2009-03-30 16:35:33
Message-ID: 20090330163533.23E4F140726D () moria ! seul ! org
[Download RAW message or body]
Author: phobos
Date: 2009-03-30 12:35:32 -0400 (Mon, 30 Mar 2009)
New Revision: 19188
Modified:
website/trunk/en/faq.wml
Log:
Updated faq question on how tor is different than others.
Modified: website/trunk/en/faq.wml
===================================================================
--- website/trunk/en/faq.wml 2009-03-30 14:15:54 UTC (rev 19187)
+++ website/trunk/en/faq.wml 2009-03-30 16:35:32 UTC (rev 19188)
@@ -17,6 +17,7 @@
<p>General questions:</p>
<ul>
<li><a href="#WhatIsTor">What is Tor?</a></li>
+<li><a href="#Torisdifferent">How is Tor different from other proxies?</a></li>
<li><a href="#CompatibleApplications">What programs can I use with
Tor?</a></li>
<li><a href="#WhyCalledTor">Why is it called Tor?</a></li>
@@ -101,6 +102,21 @@
and develops the Tor software.
</p>
+<a id="Torisdifferent"></a>
+<h3><a class="anchor" href="#Torisdifferent">How is Tor different from other \
proxies?</a></h3> +<p>
+A typical proxy provider sets up a server somewhere on the Internet and allows you \
to use it to relay your traffic. This creates a simple, easy to maintain \
architecture. The users all enter and leave through the same server. The provider \
may charge for use of the proxy, or fund their costs through advertisements on the \
server. In the simplest configuration, you don't have to install anything. You just \
have to point your browser at their proxy server. Simple proxy providers are fine \
solutions if you do not want protections for your privacy and anonymity online and \
you trust the provider from doing bad things. Some simple proxy providers use SSL to \
secure your connection to them. This may protect you against local eavesdroppers, \
such as those at a cafe with free wifi Internet. +</p>
+<p>
+Simple proxy providers also create a single point of failure. The provider knows \
who you are and where you browse on the Internet. They can see your traffic as it \
passes through their server. In some cases, they can see your encrypted traffic as \
they relay it to your banking site or to ecommerce stores. You have to trust the \
provider isn't doing any number of things, such as watching your traffic, injecting \
their own advertisements into your traffic stream, and isn't recording your personal \
details. +</p>
+<p>
+Tor passes your traffic through at least 3 different servers before sending it on to \
the destination. Tor does not modify, or even know, what you are sending into it. \
It merely relays your traffic, completely encrypted through the Tor network and has \
it pop out somewhere else in the world, completely intact. The Tor client is \
required because we assume you trust your local computer. The Tor client manages the \
encryption and the path chosen through the network. The relays located all over the \
world merely pass encrypted packets between themselves.</p> +<p>
+<dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of three \
servers can see encrypted Tor traffic coming from your computer. It still doesn't \
know who you are and what you are doing over Tor. It merely sees "This IP address is \
using Tor". Tor is not illegal anywhere in the world, so using Tor by itself is \
fine. You are still protected from this node figuring out who you are and where you \
are going on the Internet.</dd> +<dt>Can't the third server see my \
traffic?</dt><dd>Possibly. A bad third of three servers can see the traffic you sent \
into Tor. It won't know who sent this traffic. If you're using encryption, such as \
visiting a bank or ecommerce website, or encrypted mail connections, etc, it will \
only know the destination. It won't be able to see the data inside the traffic \
stream. You are still protected from this node figuring out who you are and if using \
encryption, what data you're sending to the destination.</dd> +</p>
+
<a id="CompatibleApplications"></a>
<h3><a class="anchor" href="#CompatibleApplications">What programs can
I use with Tor?</a></h3>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic