git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
49b732be3
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
en
download.wml
add a 0.2.0[12]-alpha blurb, and reenable the #Testing section
Roger Dingledine
commited
49b732be3
at 2007-06-04 06:08:38
download.wml
Blame
History
Raw
## translation metadata # Revision: $Revision$ #include "head.wmi" TITLE="Download" <div class="main-column"> <h2>Tor: Packages and source</h2> <hr /> <p>Tor is distributed as <a href="http://www.fsf.org/">Free Software</a> under the <a href="<svnsandbox>LICENSE">3-clause BSD license</a>. </p> <p>If you want Tor to become faster and more usable, please consider <a href="<page donate>">making a donation to the Tor project</a>. </p> <p>The latest stable release is <b><version-stable></b>, and the latest development release is <b><version-alpha></b>.</p> <p><b>Subscribe</b> to the <a href="http://archives.seul.org/or/announce/">or-announce mailing list</a> to keep informed of security advisories and new stable releases (you will need to confirm via email):</p> <form action="http://freehaven.net/cgi-bin/majordomo.cgi"> <input type="hidden" name="mlist" value="or-announce"> <input type="hidden" name="subscribe" value="1"> <input type="hidden" name="host" value="freehaven.net"> <input name="email" size="15"> <input type="submit" value="subscribe"> </form> <p>There is also an <a href="http://rss.gmane.org/gmane.network.onion-routing.announce">RSS feed</a> of the or-announce list at <a href="http://gmane.org">gmane.org</a>.</p> <hr /> <a id="Warning"></a> <h2><a class="anchor" href="#Warning">Warning: Want Tor to really work?</a></h2> <p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <b>NOT</b> all you need to maintain your anonymity. There are several major pitfalls to watch out for. </p> <p>First, Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension. <!-- , and follow <a href="comingsoon">other recommendations for other supported applications</a>. --> </p> <p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others can be manipulated into revealing your IP address. You should probably uninstall your plugins (go to "about:plugins" to see what is installed), or investigate <a href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and <a href="http://noscript.net/">NoScript</a> if you really need them. Consider removing extensions that look up more information about the websites you type in (like Google toolbar), as they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for unsafe browsing). <!-- You may even want to use a text browser, such as <a href="http://lynx.browser.org/">lynx</a> when you are using Tor. --> <!-- You may also find <a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. --> </p> <p>Third, beware of cookies: if you ever browse without Tor and Privoxy and a site gives you a cookie, that cookie could identify you even when you start using Tor again. You should clear your cookies frequently. <a href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help protect any cookies you do not want to lose. </p> <p>Fourth, Tor anonymizes the origin of your traffic, and it encrypts everything inside the Tor network, but <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it can't encrypt your traffic between the Tor network and its final destination.</a> If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use SSL or other end-to-end encryption and authentication. </p> <p>Fifth, while Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. </p> <p>Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn't complete, and we need your help <a href="<page volunteer>#Documentation">identifying and documenting all the issues</a>. </p> <table border="1" cellspacing="0" cellpadding="2"> <thead> <tr> <th>Platform</th> <th>Package</th> <th>Setup info</th> </tr> </thead> <tr> <td>Windows</td> <td>Tor & Privoxy & Vidalia bundle: <a href="<package-win32-bundle-stable>"><version-win32-bundle-stable></a> (<a href="<package-win32-bundle-stable-sig>">sig</a>), <a href="<package-win32-bundle-alpha>"><version-win32-bundle-alpha></a> (<a href="<package-win32-bundle-alpha-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-win32>">Windows instructions</a></td> </tr> <tr> <td>Windows packages for experts</td> <td><a href="<page download-windows>">Windows download page</a></td> <td><a href="<page docs/tor-doc-win32>">Windows instructions</a></td> </tr> <tr> <td>Mac OS X 10.4 (Tiger) Universal Binary</td> <td>Tor & Privoxy & Vidalia bundle: <a href="<package-osx-bundle-stable>"><version-osx-bundle-stable></a> (<a href="<package-osx-bundle-stable-sig>">sig</a>), <a href="<package-osx-bundle-alpha>"><version-osx-bundle-alpha></a> (<a href="<package-osx-bundle-alpha-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-osx>">OS X instructions</a></td> </tr> <tr> <td>Mac OS X 10.3 (Panther)</td> <td>Tor & Privoxy & Vidalia bundle: <a href="<package-oldosx-bundle-stable>"><version-oldosx-bundle-stable></a> (<a href="<package-oldosx-bundle-stable-sig>">sig</a>), <a href="<package-oldosx-bundle-alpha>"><version-oldosx-bundle-alpha></a> (<a href="<package-oldosx-bundle-alpha-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-osx>">OS X instructions</a></td> </tr> <tr> <td>Mac OS X packages for experts</td> <td><a href="<page download-osx>">OS X download page</a></td> <td><a href="<page docs/tor-doc-osx>">OS X instructions</a></td> </tr> <tr> <td>Linux/Unix packages</td> <td><a href="<page download-unix>">Linux/Unix download page</a></td> <td> <a href="<page docs/tor-doc-unix>">Linux/Unix instructions</a> </td> </tr> <tr> <td>Source tarballs</td> <td> <a href="<package-source-stable>"><version-stable></a> (<a href="<package-source-stable-sig>">sig</a>), <a href="<package-source-alpha>"><version-alpha></a> (<a href="<package-source-alpha-sig>">sig</a>). </td> <td><kbd>./configure && make && src/or/tor</kbd></td> </tr> </table> <br /> <h2>More Information</h2> <ul> <li>Here is a <a href="<page mirrors>">list of sites mirroring the Tor site</a>. Here is a <a href="http://opensource.depthstrike.com/?category=tor">page with torrents for each download above</a>. You can also download the <a href="dist/">Privoxy source</a> or <a href="dist/vidalia-bundles/">Vidalia source</a>.</li> <li>See our <a href="http://wiki.noreply.org/noreply/TheOnionRouter/VerifyingSignatures">FAQ entry on verifying package signatures</a>, which allows you to make sure you've downloaded the file we intended you to get.</li> <li>See the <a href="<page documentation>#Developers">developer documentation</a> for instructions on fetching Tor from SVN to get the latest development version. Note that this version may not work or even compile!</li> </ul> <hr /> <a id="Testing"></a> <h2><a class="anchor" href="#Testing">Testing releases</a></h2> <p>2007-06-02: Tor 0.2.0.1-alpha and 0.2.0.2-alpha <a href="http://archives.seul.org/or/talk/Jun-2007/msg00026.html">provide new features for people running Tor as both a client and a server (check out the new RelayBandwidth config options); let Tor run as a DNS proxy; and generally move us forward on a lot of fronts</a>. </p> <hr /> <a id="Stable"></a> <h2><a class="anchor" href="#Stable">Stable releases</a></h2> <p>2007-05-25: Tor 0.1.2.14 <a href="http://archives.seul.org/or/announce/May-2007/msg00000.html">changes the addresses of two directory authorities (this change especially affects those who serve or use hidden services), and fixes several other crash- and security-related bugs</a>. </p> <p>2007-04-23: Tor 0.1.2.13 features <a href="http://archives.seul.org/or/announce/Apr-2007/msg00000.html"> some major anonymity fixes, such as safer path selection; better client performance; faster bootstrapping, better address detection, and better DNS support for servers; write limiting as well as read limiting to make servers easier to run; and a huge pile of other features and bug fixes</a>. The bundles also ship with Vidalia 0.0.11. </p> <p>2006-12-14: Tor 0.1.1.26 fixes <a href="http://archives.seul.org/or/announce/Dec-2006/msg00000.html"> a serious privacy bug for people who have set the HttpProxyAuthenticator config option</a>. </p> <hr /> <a id="ChangeLog"></a> <p>You can read the <a href="<svnsandbox>ChangeLog">ChangeLog</a> for more details.</p> </div><!-- #main --> #include <foot.wmi>