Assorted internal and external URL fixes

This commit is contained in:
str4d
2013-02-06 01:55:33 +00:00
parent d5a8e1b958
commit b455e878c7
23 changed files with 80 additions and 77 deletions

View File

@@ -13,7 +13,7 @@ built applications on top of it to do more generic anonymous communication, such
static websites and message boards.
{%- endtrans %}</p>
<p>{% trans -%}
<p>{% trans tahoe='https://tahoe-lafs.org/trac/tahoe-lafs' -%}
Compared to I2P, Freenet offers some substantial benefits - it is a distributed data
store, while I2P is not, allowing people to retrieve the content published by others
even when the publisher is no longer online. In addition, it should be able to
@@ -22,7 +22,7 @@ this functionality. On the other hand, there is overlap for users who simply wa
communicate with each other anonymously through websites, message boards, file sharing
programs, etc. There have also been some attempts to develop a distributed data
store to run on top of I2P,
(most recently a port of <a href="http://tahoe-lafs.org/trac/tahoe-lafs">Tahoe-LAFS</a>)
(most recently a port of <a href="{{ tahoe }}">Tahoe-LAFS</a>)
but nothing is yet ready for general use.
{%- endtrans %}</p>

View File

@@ -23,8 +23,8 @@ You may contribute an analysis by entering a
<h2>Morphmix / Tarzan</h2>
<i><a href="http://www.tik.ee.ethz.ch/~morphmix/">[Morphmix]</a>
<a href="http://www.pdos.lcs.mit.edu/tarzan/">[Tarzan]</a></i>
<i><a href="https://home.zhaw.ch/~rer/projects/morphmix/">[Morphmix]</a>
<a href="http://pdos.csail.mit.edu/tarzan/">[Tarzan]</a></i>
<p>{% trans threatmodel=site_url('docs/how/threat-model') -%}
Morphmix and Tarzan are both fully distributed, peer to peer networks of
@@ -174,7 +174,7 @@ both Mixminion and Mixmaster take the directory based approach as well.
<h2>JAP</h2>
<i><a href="http://anon.inf.tu-dresden.de/index_en.html">[JAP]</a></i>
<p>{% trans -%}
<p>{% trans url='https://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm' -%}
JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,
and as such it has a few centralized nodes (participants in the cascade) that blend
and mix requests from clients through the sequence of nodes (the cascade) before
@@ -184,7 +184,7 @@ are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One
caution to note is that anyone under the jurisdiction of the German courts may want
to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has
successfully mounted an
<a href="http://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm">attack</a>
<a href="{{ url }}">attack</a>
on the network. Even though the method of this attack was later found to be illegal
in the German courts, the fact that the data was successfully collected is the
concern. Courts change their minds based upon circumstance, and this is evidence that
@@ -194,11 +194,11 @@ if it may be found inadmissible in some courts later)
<h2>MUTE / AntsP2P</h2>
<i><a href="http://mute-net.sourceforge.net/">[MUTE]</a>
<a href="http://www.myjavaserver.com/~gwren/home.jsp?page=custom&xmlName=ants">[AntsP2P]</a></i>
<a href="http://antsp2p.sourceforge.net/">[AntsP2P]</a></i>
<p>{% trans -%}
<p>{% trans antnet='http://citeseer.ist.psu.edu/57701.html' -%}
Both of these systems work through the same basic
<a href="http://citeseer.ist.psu.edu/57701.html">antnet</a> routing, providing some degree of
<a href="{{ antnet }}">antnet</a> routing, providing some degree of
anonymity based on the threat model of providing plausible deniability against a simple
non-colluding adversary. With the antnet routing, they first either do a random walk or a
broadcast search to find some peer with the data or identity desired, and then use a feedback