git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
78a238b75
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
en
download.wml
say that torbutton is in the new osx stable bundles and say that it's torbutton-dev that's in the dev bundles.
Roger Dingledine
commited
78a238b75
at 2008-01-19 18:37:21
download.wml
Blame
History
Raw
## translation metadata # Revision: $Revision$ # Translation-Priority: 1-high #include "head.wmi" TITLE="Download" <div class="main-column"> <h2>Download current Tor version</h2> <hr /> <p> Tor is distributed as <a href="http://www.fsf.org/">Free Software</a> under the <a href="<svnsandbox>LICENSE">3-clause BSD license</a>. The bundles also include <a href="http://vidalia-project.net/">Vidalia</a> and <a href="http://www.privoxy.org/">Privoxy</a>, which are supporting applications distributed under the GNU GPL. </p> <p> There is no fee for installing Tor or using the Tor network, but if you want Tor to become faster and more usable please consider <a href="<page donate>">making a tax-deductible donation to The Tor Project</a>. </p> <table width="100%" border="1" cellspacing="0" cellpadding="2"> <thead> <tr> <th>Platform</th> <th>Package</th> </tr> </thead> <tr> <td>Windows<br /><a href="<page docs/tor-doc-win32>">Install & configure guide</a></td> <td> Tor & Privoxy & Vidalia & Torbutton bundle: <a href="<package-win32-bundle-stable>"><version-win32-bundle-stable></a> (<a href="<package-win32-bundle-stable-sig>">sig</a>) </td> </tr> <tr> <td> Mac OS X<br /> <a href="<page docs/tor-doc-osx>">Install & configure guide</a> </td> <td> Tor & Privoxy & Vidalia & Torbutton bundle:<br /> Universal Binary (OSX 10.4 & 10.5): <a href="<package-osx-bundle-stable>"><version-osx-bundle-stable></a> (<a href="<package-osx-bundle-stable-sig>">sig</a>) <br /> 10.3 (Panther): <a href="<package-oldosx-bundle-stable>"><version-oldosx-bundle-stable></a> (<a href="<package-oldosx-bundle-stable-sig>">sig</a>) </td> </tr> <tr> <td> Linux/Unix packages </td> <td><a href="<page download-unix>">Linux/Unix download page</a></td> </tr> </table> <br /> <a id="Warning"></a> <h2><a class="anchor" href="#Warning">Warning: Want Tor to really work?</a></h2> <p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for: </p> <ol> <li>Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension. </li> <li>Browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others can be manipulated into revealing your IP address. You should probably <a href="http://plugindoc.mozdev.org/faqs/uninstall.html">uninstall your plugins</a> (go to "about:plugins" to see what is installed), or investigate <a href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and <a href="http://noscript.net/">NoScript</a> if you really need them. Consider removing extensions that look up more information about the websites you type in (like Google toolbar), as they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for unsafe browsing). </li> <li>Beware of cookies: if you ever browse without Tor and Privoxy and a site gives you a cookie, that cookie could identify you even when you start using Tor again. You should clear your cookies frequently. <a href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help protect any cookies you do not want to lose. </li> <li>Tor anonymizes the origin of your traffic, and it encrypts everything inside the Tor network, but <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it can't encrypt your traffic between the Tor network and its final destination.</a> If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. </li> <li>While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. </li> </ol> <p>Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn't complete, and we need your help <a href="<page volunteer>#Documentation">identifying and documenting all the issues</a>. </p> <p> To keep informed of security advisories and new stable releases, subscribe to the <a href="http://archives.seul.org/or/announce/">or-announce mailing list</a> (you will be asked to confirm via email). You can also <a href="http://rss.gmane.org/gmane.network.onion-routing.announce">watch the list's RSS feed</a>. </p> <form action="http://freehaven.net/cgi-bin/majordomo.cgi"> <input type="hidden" name="mlist" value="or-announce"> <input type="hidden" name="subscribe" value="1"> <input type="hidden" name="host" value="freehaven.net"> <input name="email" size="15"> <input type="submit" value="subscribe to or-announce"> </form> <hr /> <a id="Dev"></a> <h2><a class="anchor" href="#Dev">Development releases, packages for experts, and source code</a></h2> <p> These development snapshots are released so you can help us test new features and bugfixes. Even though they have a higher version number than the stable versions listed above, there is a much higher chance of serious reliability and security bugs in these downloads. Please be prepared to <a href="https://bugs.torproject.org/">report bugs</a>. </p> <table width="100%" border="1" cellspacing="0" cellpadding="2"> <thead> <tr> <th>Platform</th> <th>Package</th> </tr> </thead> <tr> <td>Windows<br /><a href="<page docs/tor-doc-win32>">Install & configure guide</a></td> <td> Tor & Privoxy & Vidalia & <a href="https://torbutton.torproject.org/dev/">Torbutton-dev</a> bundle (recommended): <a href="<package-win32-bundle-alpha>"><version-win32-bundle-alpha></a> (<a href="<package-win32-bundle-alpha-sig>">sig</a>) <br /> Expert install: <a href="<package-win32-stable>"><version-win32-stable></a> (<a href="<package-win32-stable-sig>">sig</a>), <a href="<package-win32-alpha>"><version-win32-alpha></a> (<a href="<package-win32-alpha-sig>">sig</a>) </td> </tr> <tr> <td> Mac OS X<br /> <a href="<page docs/tor-doc-osx>">Install & configure guide</a> </td> <td> Tor & Privoxy & Vidalia & <a href="https://torbutton.torproject.org/dev/">Torbutton-dev</a> bundle (recommended):<br /> Universal Binary (10.4 & 10.5): <a href="<package-osx-bundle-alpha>"><version-osx-bundle-alpha></a> (<a href="<package-osx-bundle-alpha-sig>">sig</a>) <br /> 10.3 (Panther): <a href="<package-oldosx-bundle-alpha>"><version-oldosx-bundle-alpha></a> (<a href="<package-oldosx-bundle-alpha-sig>">sig</a>) <br /> Packages for experts: Tor & Privoxy only:<br /> Universal Binary (OSX 10.4 & 10.5): <a href="<package-osx-stable>"><version-osx-stable></a> (<a href="<package-osx-stable-sig>">sig</a>), <a href="<package-osx-alpha>"><version-osx-alpha></a> (<a href="<package-osx-alpha-sig>">sig</a>) <br /> 10.3 (Panther): <a href="<package-oldosx-stable>"><version-oldosx-stable></a> (<a href="<package-oldosx-stable-sig>">sig</a>), <a href="<package-oldosx-alpha>"><version-oldosx-alpha></a> (<a href="<package-oldosx-alpha-sig>">sig</a>) </td> </tr> <tr> <td> Linux/Unix packages </td> <td><a href="<page download-unix>">Linux/Unix download page</a></td> </tr> <tr> <td> Source tarballs<br /> <kbd>./configure && make && src/or/tor</kbd> </td> <td> Stable: <a href="<package-source-stable>"><version-stable></a> (<a href="<package-source-stable-sig>">sig</a>)<br /> Alpha: <a href="<package-source-alpha>"><version-alpha></a> (<a href="<package-source-alpha-sig>">sig</a>) </td> </tr> </table> <p> See our <a href="https://wiki.torproject.org/noreply/TheOnionRouter/VerifyingSignatures">FAQ entry on verifying package signatures</a>, which allows you to make sure you've downloaded the file we intended you to get. </p> <p> See the <a href="<page documentation>#Developers">developer documentation</a> for instructions on fetching Tor from SVN to get the very latest development version. You can also download the <a href="dist/">Privoxy source</a> or <a href="dist/vidalia-bundles/?C=M;O=D">Vidalia source</a>. </p> <p> If you have trouble downloading Tor from this site, here is a <a href="<page mirrors>">list of sites mirroring the Tor site</a>. </p> <a id="ChangeLog"></a> <a id="Stable"></a> <a id="Testing"></a> <p> For a list of what has changed in each stable Tor release, see the <a href="<svnsandbox>ReleaseNotes">ReleaseNotes</a>. For a list of changes in both stable and development versions, see the <a href="<svnsandbox>ChangeLog">ChangeLog</a>. </p> </div><!-- #main --> #include <foot.wmi>