Changes between Version 48 and Version 49 of org/teams/CommunityTeam/Support


Ignore:
Timestamp:
Jul 19, 2017, 8:03:49 PM (20 months ago)
Author:
alison
Comment:

editing on onions and malware piece

Legend:

Unmodified
Added
Removed
Modified
  • org/teams/CommunityTeam/Support

    v48 v49  
    332332=== Onions ===
    333333==== I've heard about websites that are only accessible over Tor. What are these websites, and how can I access them? ====
     334Websites that are only accessible over Tor are called "onions" and end in the TLD .onion. For example, the DuckDuckGoOnion is https://3g2upl4pq6kufc4m.onion. You can access these websites by using Tor Browser. The addresses must be shared with you by the website host, as onions are not indexed in search engines in the typical way that vanilla websites are.
    334335==== What is the difference between a single and standard onion service? ====
    335 Over the past several years, we've collaborated with many large scale service providers such as Facebook and Riseup, organizations that deployed Onion Services to improve their performance.
    336 
    337 Onion services are great because they offer both anonymity on the service and the client side. However, there are cases where the onion service does not require anonymity. The main example of this is when the service provider does not need to hide the location of its servers.
    338 
    339 As a reminder, an onion service connection between a client and a service goes through 6 hops, while a regular connection with Tor is 3 hops. Onion services are much slower than regular Tor connections because of this. With single onion services, a service can now specify in its configuration file that it does not need anonymity, thus cutting the 3 hops between the service and its Rendezvous Point and speeding up the connection.
     336Standard onion services offer both anonymity on the service and the client side. However, there are cases where the onion service does not require anonymity -- like when the service provider does not need to hide the location of its servers -- and may prefer to have a little bit better speed. In these cases, the provider can set up a single onion service instead of a standard onion service.
     337
     338A standard onion service connection between a client and a service goes through 6 hops, while a regular connection with Tor is 3 hops. Standard onion services are much slower than regular Tor connections because of this. With single onion services, a service can now specify in its configuration file that it does not need anonymity, thus cutting the 3 hops between the service and its Rendezvous Point and speeding up the connection.
    340339
    341340[IMAGES FROM https://blog.torproject.org/blog/whats-new-tor-0298]
     
    352351=== Misc ===
    353352==== Can I use Tor with bittorrent? ====
    354 Using Tor with bittorrent is not recommended or supported. For further details,
    355 please see our blog post on the subject at https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea.
    356 
    357 ==== Why did you infect my computer with malware? (CryptoLocker) ====
    358 You have been infected with malware. The Tor Project did not create this malware.
    359 
    360 The Tor Project writes software that is used every day for a wide variety of purposes  by the [https://www.torproject.org/about/torusers.html.en military, journalists, law enforcement officers, activists, and many others].  Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors.
    361 
    362 The Tor Project does not endorse, support or condone the use of our software in this way. However, we are not able to assist directly with these cases as we did not write the malware that you have been infected with.
     353Using Tor with bittorrent is not recommended or supported. For further details, please see our blog post on the subject at https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea.
     354
     355==== The files on my computer have been locked, and someone is demanding I download Tor Browser to pay a ransom for my files! ====
     356We are so sorry, but you have been infected with malware. The Tor Project did not create this malware. The malware authors are asking you to download Tor Browser presumably to contact them anonymously with the ransom they're demanding from you.
     357
     358If this is your first introduction to Tor Browser, we understand that you might think we're bad people who enable even worse people. But please consider that our software is used every day for a wide variety of purposes by [https://www.torproject.org/about/torusers.html.en the military, journalists, domestic violence survivors, whistleblowers, law enforcement officers, activists, and many others]. Unfortunately, the protection that our software can provide to these groups of people can also be abused by criminals and malware authors. The Tor Project does not endorse, support or condone the use of our software for malicious purposes.
    363359
    364360==== Does Tor keep logs? ====
    365 Tor doesn't keep any longs that could identify a particular user. We do take some measurements of how the network functions, which you can check out here: metrics.torproject.org.
     361Tor doesn't keep any longs that could identify a particular user. We do take some safe measurements of how the network functions, which you can check out here: metrics.torproject.org.
    366362
    367363====  Does Tor Project offer xmpp/email/some other privacy-enhancing technologies? ====
     
    381377
    382378==== Can I change the number of hops Tor uses? ====
    383 Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a ".exit" address it could be 4.
     379Right now the path length is hard-coded at 3 plus the number of nodes in your path that are sensitive. That is, in normal cases it's 3, but for example if you're accessing an onion service or a ".exit" address it could be more.
    384380
    385381We don't want to encourage people to use paths longer than this as it increases load on the network without (as far as we can tell) providing any more security. Also, using paths longer than 3 could harm anonymity, first because it makes [http://freehaven.net/anonbib/#ccs07-doa "denial of security"] attacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.