社区团队已经为 Tor 的有关术语整理了词汇表
杀毒软件用于防止，检测和删除恶意软件。 杀毒软件可能会干扰计算机上运行的Tor。 如果您不知道如何允许Tor，就可能需要查阅杀毒软件的文档。
Like ordinary Tor relays, bridges are run by volunteers; unlike ordinary relays, however, they are not listed publicly, so an adversary cannot identify them easily. Pluggable transports are a type of bridge that help disguise the fact that you are using Tor.
指纹是收集设备或服务的信息来对其身份或特征进行有根据的猜测的方法。 独立的行为或响应可以被用于辨认设备和分析服务。 Tor浏览器阻止指纹.
Checksums are hashvalues of files. If you have downloaded the software without errors, the given checksum and the checksum of your downloaded file will be identical.
A cryptographic signature proves the authenticity of a message or file. It is created by the holder of the private portion of a public key cryptography key pair and can be verified by the corresponding public key. If you download software from torproject.org, you will find it as signature files (.asc). These are PGP signatures, so you can verify that the file you have downloaded is exactly the one that we intended you to get. For more information about how you can verify signatures, please see here.
从起始到终点 加密 传输数据叫做端到端加密。
The last relay in the Tor circuit which sends traffic out onto the public Internet. The service you are connecting to (website, chat service, email provider, etc..) will see the IP address of the exit.
The ExoneraTor service maintains a database of relay IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date. This service is often useful when dealing with law enforcement.
Mozilla Firefox 是一个由 Mozilla 基金会及其子公司 Mozilla 公司开发的免费且开源的 浏览器 。 Tor 浏览器 是基于 Firefox ESR（扩展支持版本）的修改版本构建的。 Firefox is available for Windows, macOS and Linux operating systems, with its mobile version (fennec) available for Android.
FTE (format-transforming encryption) is a pluggable transport that disguises Tor traffic as ordinary web (HTTP) traffic.
It is a service that automatically responds to messages (Email, XMPP, Twitter) with links to the latest version of Tor Browser, hosted at a variety of locations, such as Dropbox, Google Drive and GitHub.
The Tor Project participates in the Google Summer of Code, which is a summer program for university students.
A cryptographic hash value is the result of a mathematical algorithm that maps data to a bit string of a fixed size. It's designed as one-way-function which means the value is easy to calculate in one direction but infeasible to invert. Hash values serve to verify the integrity of data.
The Hypertext Transfer Protocol (HTTP) is a channel used to send files and data between devices on a network. Originally used to transfer only web pages, it is now relied upon to deliver many forms of data and communication.
安全超文本传输协议 (Hypertext Transfer Protocol Secure, HTTPS) 是用于在网络中的设备之间传输文件和数据的 HTTP 通道的加密版本。
An Internet service provider (ISP) is an organization that provides services for accessing and using the Internet. When using Tor Browser, your ISP cannot see what websites you're visiting.
An Internet Protocol address (IP address) is a numerical (or alpha-numeric in the case of IPv6) label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. The IP address is the location address of the device, similar to the addresses of physical locations. Tor Browser obscures your location by making it look like your traffic is coming from an IP address that is not your own.
"little-t tor" is one way of referring to tor the network daemon, as opposed to Tor Browser or Tor Project.
These pluggable transports all make it look like you are browsing a major web site instead of using Tor. Meek-amazon makes it look like you are using Amazon Web Services; meek-azure makes it look like you are using a Microsoft web site; and meek-google makes it look like you are using Google search.
New Identity is a Tor Browser feature if you want to prevent your subsequent browser activity from being linkable to what you were doing before. Selecting it will close all your open tabs and windows, clear all private information such as cookies and browsing history, and use New Tor circuits for all connections. Tor Browser will warn you that all activity and downloads will be stopped, so take this into account before clicking “New Identity”. New Identity can also help if Tor Browser is having trouble connecting to a particular site, similarly to "New Tor Circuit for this Site".
为此站点使用新 Tor 线路
This option is useful if the exit you are using is unable to connect to the website you require, or is not loading it properly. Selecting it will cause the currently active tab or window to be reloaded over a new Tor circuit. Other open tabs and windows from the same website will use the new circuit as well once they are reloaded. This option does not clear any private information or unlink your activity, nor does it affect your current connections to other websites.
Sometimes the direct access to the Tor network is blocked by your Internet Service Provider (ISP) or by a government. Tor Browser includes some circumvention tools for getting around these blocks, including bridges, pluggable transports, and GetTor.
The anonymizing relay monitor (formerly arm, now nyx) is a terminal status monitor for Tor, intended for command-line usage. This is a tool for monitoring the core Tor process on a system, often useful for relay operators.
Obfs4 is a pluggable transport that makes Tor traffic look random like obfs3, and also prevents censors from finding bridges by Internet scanning. Obfs4 bridges are less likely to be blocked than obfs3 bridges.
A standardized internet domain name used by onion services that ends in .onion and is designed to be self-authenticating.
一个开源，使用Tor路由，并由工作近似于Tor项目的某些人开发的iOS应用。 了解更多关于Onion Browser
Onionoo is a web-based protocol to learn about currently running Tor relays and bridges. Onionoo provides the data for other applications and websites(compass, atlas, etc..) which in turn present Tor network status information to humans.
onionsite是 洋葱服务的另一个名字，但是只用于称呼网站。 这些网站使用.onion顶级域名(TLD)。
The main system software that manages computer hardware and software resources and provides common services for computer programs. The most used desktop operating systems are Windows, macOS and Linux. Android and iOS are the dominant mobile operating systems.
Orfox is free app from The Guardian Project built from the same source code as Tor Browser which is built upon Firefox, but with a few minor modifications to the privacy enhancing features to make them compatible with Firefox for Android and the Android operating system.
Tools that Tor can use to disguise the traffic it sends out. This can be useful in situations where an Internet Service Provider (ISP) or other authority is actively blocking connections to the Tor network.
The private portion of a public/private key pair. This is the key that must be kept private, and not disseminated to others.
代理是介于客户端 (例如浏览器) 和服务端 (例如网页服务器) 之间的中间人. Instead of connecting directly to the service, a client sends the message to the proxy. The proxy makes the request on behalf of the client, and passes the response back to the client. The service only communicates with and sees the proxy.
The public portion of a public/private key pair. This is the key that can be disseminated to others.
公钥加密系统使用成对的数学密钥。 The public key can be disseminated widely while its belonging private key is known only by the owner of the key pair. 任何人都可以使用接收者的公钥加密信息，但只有拥有私钥的接收者才能解密信息。 Additionally, the private key can be used to create a signature to proof the identity of the creator of a message or other files. 可以通过公钥验证此签名。
It is an add-on for the Chrome or Chromium browsers that allows you to download several security and privacy programs, including Tor Browser, from different sources. You can Install Satori from the Chrome Web Store.
Scramblesuit is similar to obfs4 but has a different set of bridges.
Elements used for offering dynamic/interactive content via websites.
The specialized address format of onion addresses is self-authenticating. The format automatically guarantees that the onion address is bound to the key used to protect connections to the onionsite. Ordinary internet domain names require site owners to trust and be approved by a Certificate Authority (CA) for this binding, and they are subject to hijack by the CA and typically by many other parties as well.
A device on a network which offers a service, such as file and web page storage, email or chat.
single onion service
A single onion service is an onion service that can be configured for services that do not require anonymity, but want to offer it for clients connecting to their service. Single onion services use only three hops in the circuit rather than the typical six hops for onion services.
Stem is a Python (programming language) controller library for core Tor. If you want to control core Tor with python, this is for you.
The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating a large number of identities, and using them to gain a disproportionately large influence in the network.
The Tor Project
The Tor Project can refer to either The Tor Project Inc, a 501(c)3 US nonprofit responsible for maintaining the Tor software, or the Tor Project community made up of thousands of volunteers from all over the world who help create Tor.
Most websites use numerous third-party services, including advertising and analytics trackers, which collect data about your IP address, web browser, system and your browsing behavior itself, all of which can link your activity across different sites. Tor Browser prevents a lot of this activity from happening.
Tor / Tor 网络/ Tor 核心
Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues.
Tor Browser uses the Tor network to protect your privacy and anonymity. Your internet activity, including the names and addresses of the websites you visit, will be hidden from your Internet Service Provider (ISP) and from anyone watching your connection locally. The operators of the websites and services that you use, and anyone watching them, will see a connection coming from the Tor network instead of your real Internet (IP) address, and will not know who you are unless you explicitly identify yourself. In addition, Tor Browser is designed to prevent websites from “fingerprinting” or identifying you based on your browser configuration. Tor 浏览器默认不保留任何浏览记录。 Cookies are only valid for a single session (until Tor Browser is exited or a New Identity is requested).
"Tor log" is an automatically-generated list of Tor’s activity that can help diagnose problems. When something goes wrong with Tor, you may see an option with the error message to "copy Tor log to clipboard". If you don't see this option and you have Tor Browser open, you can navigate to the Torbutton (on the top left of the browser, to the left of the URL bar). Click the Tor button, then open Tor Network Settings. You should see an option at the bottom to copy the log to your clipboard, which you can then paste to a document to show whoever is helping you troubleshoot.
Tor Messenger was a cross-platform chat program that aimed to be secure by default and send all of its traffic over Tor. Tor Messenger 已经不再继续开发。 It supported Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others; enabled Off-the-Record (OTR) Messaging automatically; and had an easy-to-use graphical user interface localized into multiple languages.
The core Tor configuration file.
Torsocks allows you to use many applications in a safer way with Tor. It ensures that DNS requests are handled safely and explicitly rejects any traffic other than TCP from the application you're using.
TPI is an acronym for The Tor Project, Inc.
People on IRC often use
tpo to abbreviate
torproject.org when writing hostnames. For example,
trac.tpo is an abbreviation for
Web浏览器（通常称为浏览器）是用于在万维网上检索，呈现和遍历信息资源的软件应用程序。 主流Web浏览器包括Firefox, Chrome, Internet Explorer, 和Safari.
网站镜像是网站的一比一副本，您可以在其他网址下找到该副本。 最近可用的 torproject.org 镜像列表可以在 https://www.torproject.org/getinvolved/mirrors.html.en 中找到。