Tor - Version 2.2.33-2

Tor is, at once, free software and open network that can defend against a form of network surveillance that threatens personal freedom and privacy, commercial activities, housing relations and security the state. This monitoring is known as traffic analysis.
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers around the world. It prevents somebody watching your Internet connection that can read the sites you visited. It also prevents the sites you visited to know your location. Tor works with many existing applications such as web browsers, instant messaging clients, remote login and other applications based on TCP.
Hundreds of thousands of people around the world use Tor for a variety of reasons: journalists and bloggers, human Rights, the law enforcement officers, soldiers, corporations, citizens of repressive governments or private citizens. See the page Who uses Tor? to see some examples of typical Tor users. See the overview for a more complete explanation of what Tor does and why the diversity of users is important.
Tor does not encrypt, like magic, all your internet activity. You should understand what Tor does and can not do for you.
Tor's security is growing especially as the number of users and volunteers to run a relay increases. (This is not as complicated as one might think, and this can improve your safety significantly.) If you do not want to run a relay, we need help on several points of the project and we need funds to continue making the Tor network faster and easier to use while maintaining good security.
Tor is a U.S. nonprofit 501 (c) (3) whose mission is to protect yourself from the analysis of your Internet traffic. Donate tax-free.


0 comments:

Post a Comment