Include updated manual text
Harmony authored 9 years ago
|
8) </info>
9)
10) <title>About Tor Browser</title>
11)
12) <p>
13) Tor Browser uses the Tor network to protect your privacy and
14) anonymity. Using the Tor network has two main properties:
15) </p>
16) <list>
17) <item>
18) <p>
19) Your internet activity, including the names and addresses of
20) the websites you visit, will be hidden from your Internet
21) service provider and from anyone watching your connection
22) locally.
23) </p>
24) </item>
25) <item>
26) <p>
27) The operators of the websites and services that you use, and
28) anyone watching them, will see a connection coming from the
29) Tor network instead of your real Internet (IP) address, and
30) will not know who you are unless you explicitly identify
31) yourself.
32) </p>
33) </item>
34) </list>
35) <p>
36) In addition, Tor Browser is designed to prevent websites from
37) “fingerprinting” or identifying you based on your browser
38) configuration.
39) </p>
40) <p>
41) By default, Tor Browser does not keep any browsing history.
42) Cookies are only valid for a single session (until Tor Browser
43) is exited or a <link xref='managing-identities#new-identity'>New
44) Identity</link> is requested).
45) </p>
46)
47) <!-- XXX: ask Tor Browser team/mikeperry about things that are worth
48) adding here. -->
49)
50) <section id="how-tor-works">
51) <title>How Tor works</title>
52)
53) <p>
54) Tor is a network of virtual tunnels that allows you to improve your
55) privacy and security on the Internet. Tor works by sending your
56) traffic through three random servers (also known as <em>relays</em>)
57) in the Tor network. The last relay in the circuit (the “exit relay”)
58) then sends the traffic out onto the public Internet.
59) </p>
|