社区团队已经为 Tor 的有关术语整理了词汇表
杀毒软件用于防止，检测和删除恶意软件。 杀毒软件可能会干扰计算机上运行的 Tor。 如果您不知道如何允许 Tor，就可能需要查阅杀毒软件的文档。
Atlas 是一个了解当前运行中的 Tor 中继的 Web 应用。
指纹是收集设备或服务的信息来对其身份或特征进行有根据的猜测的方法。 独立的行为或响应可以被用于辨认设备和分析服务。 Tor 浏览器阻止指纹追踪。
Checksums are hashvalues of files. If you have downloaded the software without errors, the given checksum and the checksum of your downloaded file will be identical.
Compass 是一个可用于了解当前批量运行的Tor中继的 Web 应用程序。
A cryptographic signature proves the authenticity of a message or file. It is created by the holder of the private portion of a public key cryptography key pair and can be verified by the corresponding public key. If you download software from torproject.org, you will find it as signature files (.asc). These are PGP signatures, so you can verify that the file you have downloaded is exactly the one that we intended you to get. For more information about how you can verify signatures, please see here.
The last relay in the Tor circuit which sends traffic out onto the public Internet. The service you are connecting to (website, chat service, email provider, etc..) will see the IP address of the exit.
The ExoneraTor service maintains a database of relay IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date. This service is often useful when dealing with law enforcement.
Mozilla Firefox 是一个由 Mozilla 基金会及其子公司 Mozilla 公司开发的免费且开源的 浏览器 。 Tor 浏览器 是基于 Firefox ESR（扩展支持版本）的修改版本构建的。 Firefox is available for Windows, macOS and Linux operating systems, with its mobile version (fennec) available for Android.
FTE (format-transforming encryption) is a pluggable transport that disguises Tor traffic as ordinary web (HTTP) traffic.
It is a service that automatically responds to messages (Email, XMPP, Twitter) with links to the latest version of Tor Browser, hosted at a variety of locations, such as Dropbox, Google Drive and GitHub.
The Tor Project participates in the Google Summer of Code, which is a summer program for university students.
A cryptographic hash value is the result of a mathematical algorithm that maps data to a bit string of a fixed size. It's designed as one-way-function which means the value is easy to calculate in one direction but infeasible to invert. Hash values serve to verify the integrity of data.
The Hypertext Transfer Protocol (HTTP) is a channel used to send files and data between devices on a network. Originally used to transfer only web pages, it is now relied upon to deliver many forms of data and communication.
安全超文本传输协议 (Hypertext Transfer Protocol Secure, HTTPS) 是用于在网络中的设备之间传输文件和数据的 HTTP 通道的加密版本。
互联网协议地址（IP地址）是一个数字标签（在IPv6的情况下是字母-数字组合标签），分配给每一个连接到计算机网络并通过网络协议通讯的设备（例如：电脑，打印机）。 IP地址是设备的网络位置的地址，就像是一个物理位置的地址一样。 Tor Browser obscures your location by making it look like your traffic is coming from an IP address that is not your own.
"little-t tor" is one way of referring to tor the network daemon, as opposed to Tor Browser or Tor Project.
These pluggable transports all make it look like you are browsing a major web site instead of using Tor. Meek-amazon makes it look like you are using Amazon Web Services; meek-azure makes it look like you are using a Microsoft web site; and meek-google makes it look like you are using Google search.
New Identity is a Tor Browser feature if you want to prevent your subsequent browser activity from being linkable to what you were doing before. 选择该选项将关闭所有已经打开的浏览器标签页与窗口，清除所有个人信息，例如cookies和browsing history，并且对于所有连接使用新的Tor circuits。 Tor 浏览器会警告你所有活动与下载将被停止，所以在点击“新身份”前请考虑这一点。 新的身份也可以帮助判断Tor 浏览器是否会在连接一个特定网站时出现问题，类似于"New Tor Circuit for this Site"。
为此站点使用新 Tor 线路
This option is useful if the exit you are using is unable to connect to the website you require, or is not loading it properly. Selecting it will cause the currently active tab or window to be reloaded over a new Tor circuit. Other open tabs and windows from the same website will use the new circuit as well once they are reloaded. This option does not clear any private information or unlink your activity, nor does it affect your current connections to other websites.
The anonymizing relay monitor (formerly arm, now nyx) is a terminal status monitor for Tor, intended for command-line usage. This is a tool for monitoring the core Tor process on a system, often useful for relay operators.
Obfs4 is a pluggable transport that makes Tor traffic look random like obfs3, and also prevents censors from finding bridges by Internet scanning. Obfs4 bridges are less likely to be blocked than obfs3 bridges.
A standardized internet domain name used by onion services that ends in .onion and is designed to be self-authenticating.
一个开源、使用 Tor 路由、并由工作和Tor项目密切相关的一些人开发的 iOS 应用。 了解更多关于 Onion Browser
Onionoo is a web-based protocol to learn about currently running Tor relays and bridges. Onionoo provides the data for other applications and websites(compass, atlas, etc..) which in turn present Tor network status information to humans.
洋葱站点是洋葱服务的另一个名字，但是只用于称呼网站。 这些网站使用 .onion 顶级域名（TLD）。
The main system software that manages computer hardware and software resources and provides common services for computer programs. The most used desktop operating systems are Windows, macOS and Linux. Android and iOS are the dominant mobile operating systems.
Orfox is free app from The Guardian Project built from the same source code as Tor Browser which is built upon Firefox, but with a few minor modifications to the privacy enhancing features to make them compatible with Firefox for Android and the Android operating system.
Tools that Tor can use to disguise the traffic it sends out. This can be useful in situations where an Internet Service Provider (ISP) or other authority is actively blocking connections to the Tor network.
The private portion of a public/private key pair. This is the key that must be kept private, and not disseminated to others.
代理是介于客户端（例如浏览器）和服务端（例如网页服务器）之间的中间人。 Instead of connecting directly to the service, a client sends the message to the proxy. The proxy makes the request on behalf of the client, and passes the response back to the client. The service only communicates with and sees the proxy.
The public portion of a public/private key pair. 这是一个可以被传递给他人的密钥。
公钥加密系统使用成对的数学密钥。 公钥public key会被广泛地传递，而它所属的私钥private key仅被这对密钥的所属者所知晓。 任何人都可以使用接收者的公钥加密信息，但只有拥有私钥的接收者才能解密信息。 Additionally, the private key can be used to create a signature to proof the identity of the creator of a message or other files. 可以通过公钥验证此签名。
It is an add-on for the Chrome or Chromium browsers that allows you to download several security and privacy programs, including Tor Browser, from different sources. You can Install Satori from the Chrome Web Store.
The specialized address format of onion addresses is self-authenticating. The format automatically guarantees that the onion address is bound to the key used to protect connections to the onionsite. Ordinary internet domain names require site owners to trust and be approved by a Certificate Authority (CA) for this binding, and they are subject to hijack by the CA and typically by many other parties as well.
single onion service
A single onion service is an onion service that can be configured for services that do not require anonymity, but want to offer it for clients connecting to their service. Single onion services use only three hops in the circuit rather than the typical six hops for onion services.
Stem is a Python (programming language) controller library for core Tor. If you want to control core Tor with python, this is for you.
The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating a large number of identities, and using them to gain a disproportionately large influence in the network.
The Tor Project
The Tor Project can refer to either The Tor Project Inc, a 501(c)3 US nonprofit responsible for maintaining the Tor software, or the Tor Project community made up of thousands of volunteers from all over the world who help create Tor.
Most websites use numerous third-party services, including advertising and analytics trackers, which collect data about your IP address, web browser, system and your browsing behavior itself, all of which can link your activity across different sites. Tor Browser prevents a lot of this activity from happening.
Tor / Tor 网络/ Tor 核心
Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. Sometimes the software associated with this network is called Core Tor, and sometimes "little-t tor". The way most people use Tor is with Tor Browser which is a version of Firefox that fixes many privacy issues.
Tor Browser uses the Tor network to protect your privacy and anonymity. Your internet activity, including the names and addresses of the websites you visit, will be hidden from your Internet Service Provider (ISP) and from anyone watching your connection locally. The operators of the websites and services that you use, and anyone watching them, will see a connection coming from the Tor network instead of your real Internet (IP) address, and will not know who you are unless you explicitly identify yourself. In addition, Tor Browser is designed to prevent websites from “fingerprinting” or identifying you based on your browser configuration. Tor 浏览器默认不保留任何浏览记录。 Cookies are only valid for a single session (until Tor Browser is exited or a New Identity is requested).
"Tor log" is an automatically-generated list of Tor’s activity that can help diagnose problems. When something goes wrong with Tor, you may see an option with the error message to "copy Tor log to clipboard". If you don't see this option and you have Tor Browser open, you can navigate to the Torbutton (on the top left of the browser, to the left of the URL bar). Click the Tor button, then open Tor Network Settings. You should see an option at the bottom to copy the log to your clipboard, which you can then paste to a document to show whoever is helping you troubleshoot.
Tor Messenger was a cross-platform chat program that aimed to be secure by default and send all of its traffic over Tor. Tor Messenger 已经不再继续开发。 It supported Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others; enabled Off-the-Record (OTR) Messaging automatically; and had an easy-to-use graphical user interface localized into multiple languages.
TPI是The Tor Project, Inc的首字母缩写。
People on IRC often use
tpo to abbreviate
torproject.org when writing hostnames. For example,
trac.tpo is an abbreviation for
Web 浏览器（通常称为浏览器）是用于在万维网上检索，呈现和遍历信息资源的软件应用程序。 主流 Web 浏览器包括 Firefox、Chrome、Internet Explorer 和 Safari。
网站镜像是网站的完整副本，您可以在其他网址下找到该副本。 最近可用的 torproject.org 镜像列表可以在 https://www.torproject.org/getinvolved/mirrors.html.en 中找到。