7b1e3c6f253c0aeeb9bdedf11c664bc85915d073
Harmony Include updated manual text

Harmony authored 9 years ago

1) <page xmlns="http://projectmallard.org/1.0/"
2)       type="topic"
3)       id="about-tor-browser">
4) 
5)   <info>
Colin Childs Manually define ordering of...

Colin Childs authored 7 years ago

6)     <link type="guide" xref="index" group="one" />
Harmony Add screenshots/make change...

Harmony authored 9 years ago

7)     <desc>Learn what Tor Browser can do to protect your privacy and anonymity</desc>
Harmony Include updated manual text

Harmony authored 9 years ago

8)   </info>
9) 
10)   <title>About Tor Browser</title>
11) 
12)     <p>
13)       Tor Browser uses the Tor network to protect your privacy and
14)       anonymity. Using the Tor network has two main properties:
15)     </p>
16)     <list>
17)       <item>
18)         <p>
Colin Childs Clean up some phrasing base...

Colin Childs authored 8 years ago

19) 	  Your internet service provider, and anyone watching your connection
20) 	  locally, will not be able to track your internet activity, including
21) 	  the names and addresses of the websites you visit.
Harmony Include updated manual text

Harmony authored 9 years ago

22)         </p>
23)       </item>
24)       <item>
25)         <p>
26)           The operators of the websites and services that you use, and
27)           anyone watching them, will see a connection coming from the
28)           Tor network instead of your real Internet (IP) address, and
29)           will not know who you are unless you explicitly identify
30)           yourself.
31)         </p>
32)       </item>
33)     </list>
34)     <p>
35)       In addition, Tor Browser is designed to prevent websites from
36)       “fingerprinting” or identifying you based on your browser
37)       configuration.
38)     </p>
39)     <p>
40)       By default, Tor Browser does not keep any browsing history.
41)       Cookies are only valid for a single session (until Tor Browser
42)       is exited or a <link xref='managing-identities#new-identity'>New
43)       Identity</link> is requested).
44)     </p>
Colin Childs Clean up some phrasing base...

Colin Childs authored 8 years ago

45) 
Harmony Include updated manual text

Harmony authored 9 years ago

46)     <!-- XXX: ask Tor Browser team/mikeperry about things that are worth
47)     adding here. -->
48) 
49)   <section id="how-tor-works">
50)     <title>How Tor works</title>
51) 
52)     <p>
53)       Tor is a network of virtual tunnels that allows you to improve your
54)       privacy and security on the Internet. Tor works by sending your
55)       traffic through three random servers (also known as <em>relays</em>)
56)       in the Tor network. The last relay in the circuit (the “exit relay”)
57)       then sends the traffic out onto the public Internet.
58)     </p>
Harmony Add screenshots/make change...

Harmony authored 9 years ago

59)     <media type="image" width="600" src="media/how-tor-works.png" />
Harmony Include updated manual text

Harmony authored 9 years ago

60)     <p>
61)       The image above illustrates a user browsing to different websites
Colin Childs Clean up some phrasing base...

Colin Childs authored 8 years ago

62)       over Tor. The green middle computers represent relays in the Tor
63)       network, while the three keys represent the layers of encryption
64)       between the user and each relay.