原文地址:http://www.theonionrouter.com/about/overview.html.en#overview

概述

“The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.”

Tor网络由一组自运行服务器组成,满足了人们提升网络隐私和安全等级的需要。与传统直连不同,tor用户通过连接一系列虚拟隧道来访问网络。这样一来,机构和个人都不在需要以妥协隐私为代价来进行公共网络活动。同时,tor也是一款优秀的避开审查制度的工具。使用者可以访问本被禁止的地址或内容。它还在一些时候被软件开发者们内置于带隐私功能的通讯类软件。

“Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's onion services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.”

个人用户可通过tor摆脱网站的跟踪、访问当地运营商禁掉的新闻站点和网络服务。Tor提供的“洋葱服务”允许用户在不暴露真实地址的情况下发布网站以及提供服务!个人用户同样可以用其交流一些较敏感的话题。如:

“Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.”

新闻工作者可以用其保证自身不遭受打击报复。NGO的工作人员可以通过Tor在异国访问组织的网站。并且不需要暴露自己和该组织的关系。

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

如Indymedia之类的团体出于保护其成员的网络隐私和安全也建议成员使用Tor。激进主义团体如EFF也推荐使用Tor作为一种维护网络自由的机制。大型集团经常使用Tor来防止被监听,以确保能安全地实施竞争调查以及保护敏感的采购规律。Tor也被用于替代传统虚拟代理,其能够显示准确的通讯时间和通讯量。哪个地区的员工加班晚?那个地区的雇员在找猎头公司?哪家调查机构和公司的专利律师有联络?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

一直美国海军部队使用Tor公开招募智囊,其中一支小队在最近的中东部署中也用到了Tor。一些执法机关用Tor访问监控站点而不会在其网络日志中留下政府的IP地址,这也保证了钓鱼执法的安全有效。

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

用户多样性是保证Tor安全性中的重要一环。Tor让你隐藏在网络的其他用户之中。因此,Tor的用户群体越大越多样,你的隐匿性就会越发得到保护。

为什么需要Tor?

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

使用Tor能让你有效避免一种叫做“流量分析”的东东。流量分析可以被用于找出公共网络上哪两个人在通信。通过了解你的源和目的地址,其他人可以由此分析你的行为规律和喜好。这很大程度上会影响你的决策,比如说,一个电商网站可以根据你的人所在国家以及机构制定价格歧视策略。说得严重一些,它甚至有可能暴露你的实际地理位置,从而对你的现实人身安全造成威胁。比如说,如果你出国了然后你连了你雇主的计算机查发邮件,这个时候其实你已经一不小心就把你的国籍和单位信息暴露给了这个监听这个网络的人,就算链接是加密的也不例外。

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.

流量分析是怎么回事?网络数据包分两部分:用户数据和用来路由的数据包头。数据部分就是你真正要发送的部分,可能是一封电邮,一个网页,或者一个音频文件。即使你在通信过程中对数据部分进行了加密,数据分析仍然还是能分析出一大部分你正在干的事儿或者你正在说的话。那是因为它主要分析数据包头,包头里包含有源、目的、大小、时间以及其他种种信息。

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

从隐私的角度来说,有一个基础的问题要解决,就是接收方可以通过数据包头部信息知道是你发送了这些数据。被授权的网络中间方也可以看到,例如,运营商们。更可怕的是,有的时候,甚至未被授权的人也能查看这些信息。

But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

而流量分析的手段还远不止于此。有些攻击者监听着互联网的多个部分,并利用一些复杂的技术来跟踪许多不同机构或个人的通信规律。加密对于这种攻击者来说束手无策,因为它只能帮你隐藏数据内容,而包头部信息则赤裸裸地暴露在攻击者面前。

本文为纯翻译,不带有个人观点。有不当的地方请指正。

什么是TOR 官方文档相关推荐

  1. OpenCV-Python官方文档学习笔记(上)

    整理自OpenCV-Python官方文档 一. OpenCV-Python Tutorials 1 安装及验证 2 图片读写,展示 3 视频读写,展示 4 绘图功能(绘制几何形状:线.圆.椭圆.矩形. ...

  2. Ant Design 入门-参照官方文档使用组件

    微信小程序开发交流qq群   173683895    承接微信小程序开发.扫码加微信. 先来一个按钮组件使用的对比,官方文档的(不能直接用)和实际能用的. 官网demo: import { Tabl ...

  3. 坑爹的微软官方文档:SQL无人值守安装

    我在部署项目的时候,需要用批处理无人值守安装SQLserver,.Net等组件. 于是查了微软官方文档,其中一项内容如下: http://msdn.microsoft.com/zh-cn/librar ...

  4. Tomcat官方文档关于数据源配置的内容

    虽然有网上有网友自己总结的文章,但说明得总是不够清晰,还是参考官方文档理解得比较透彻: http://tomcat.apache.org/tomcat-7.0-doc/jdbc-pool.html h ...

  5. python-66:BS4实例--下载BS4官方文档

    2019独角兽企业重金招聘Python工程师标准>>> 前面已经对BS4有了简单的认识和讲解,该讲的都讲了,原本也已经想好了一个实例,但是现在想往后推一推,因为我实在受不了了,我们前 ...

  6. k8s多master建议用几个_Kubernetes 教程之跟着官方文档从零搭建 K8S

    前言 本文将带领读者一起, 参照者 Kubernetes 官方文档, 对其安装部署进行讲解. Kubernetes 更新迭代很快, 书上.网上等教程可能并不能适用于新版本, 但官方文档能. 阅读这篇文 ...

  7. 文件标识符必须为双精度类型的整数值标量_【翻译】VTK官方文档 - vtk文件格式

    本文翻译自vtk官方文档:vtk_file_format 文末有链接 VTK提供了许多源对象和编写器对象,用于读取和写入流行的数据文件格式,此外,VTK也提供了自己的文件格式.创建一种数据文件格式的主 ...

  8. 深入理解Java 8 Lambda表达式(Oracle官方文档版)

    Java 8 问世三年了,9马上也要问世了,所以,嗯,我要开始学8了-- 官方文档:http://docs.oracle.com/javase/tutorial/java/javaOO/lambdae ...

  9. 《Redis官方文档》用Redis构建分布式锁

    <Redis官方文档>用Redis构建分布式锁 用Redis构建分布式锁 在不同进程需要互斥地访问共享资源时,分布式锁是一种非常有用的技术手段. 有很多三方库和文章描述如何用Redis实现 ...

最新文章

  1. Python命令行参数解析模块------argparse
  2. 计算机的应用范围归纳起来主要有,计算机应用基础知识概述.doc
  3. Qt写ini配置文件
  4. AI:2020年6月21日北京智源大会演讲分享之15:15-15:40黄萱菁教授《自然语言处理中的表示学习》
  5. 关于Flex-Mvc的几个框架的简单介绍
  6. centos网络隔一段时间就断_“路由器隔一段时间就上不了网,断一下电又能用了,这是什么原因...
  7. UVA1374 Power Calcilus快速幂计算
  8. 关于Fiori application里取Account image的Odata request是否会阻塞UI的问题讨论
  9. java完数流程图_编程基本功训练:流程图画法及练习
  10. php http 类,php写的http请求封装类
  11. mysql stop salve_MySQL主从切换
  12. 暗黑3 外挂开发资料
  13. MyEclipse9.0 XJad的配置
  14. Springboot网络微小说的设计与实现毕业设计源码031758
  15. vue 自定义marquee横向无缝滚动组件
  16. Ray Dalio:经济机器是怎样运行的 (时长30分钟)
  17. java模拟新浪微博用户注册
  18. MyTime类表示时间(小时+分钟)JAVA
  19. matlab pinv 实现_matlab:inv,pinv逆与伪逆
  20. Leetcode 1024 - 视频拼接

热门文章

  1. Unity Run Time Gizmos
  2. hive-create table
  3. bioperl 自动化下载genbank 中的序列
  4. 风险投资(VC)私募股权投资(PE)30问答
  5. 老夫带你深度剖析Redisson实现分布式锁的原理
  6. 2007世界大学学术排名(上海交大)
  7. 计算机cpu频率时钟周期,关于cpu:什么是时钟周期和时钟速度?
  8. YOLOV4垃圾检测召回率提升
  9. 喜讯丨zCloud 首批通过中国信通院数据库管理平台基础能力专项评测
  10. WIN7 64位 配置JDK1.7的环境变量(百度上那么多坑爹货,乱搞真浪费时间)