git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
09c148384
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
download
en
download.wml
update macros on download page too
Erinn Clark
commited
09c148384
at 2011-01-18 23:50:33
download.wml
Blame
History
Raw
## translation metadata # Revision: $Revision$ # Translation-Priority: 3-low #include "head.wmi" TITLE="Download Tor" CHARSET="UTF-8" ANNOUNCE_RSS="yes" <div id="content" class="clearfix"> <div id="breadcrumbs"><a href="<page index>">Home » </a><a href="<page download/download>">Download</a></div> <div id="maincol-left"> <h1>Download Tor</h1> <!-- BEGIN TEASER WARNING --> <div class="warning"> <h2>Want Tor to really work?</h2> <p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. Read the <a href="#warning">full list of warnings</a>. </p> </div> <!-- END TEASER WARNING --> <!-- START WINDOWS --> <table class="topforty"> <tr> <td class="nopad"><div class="title"><a name="Windows">Microsoft Windows</a></div></td> </tr> <tr> <td>The Tor Software for Windows comes bundled in three different ways: <ul> <li>The <strong>Tor Browser Bundle</strong> contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. <a href="<page projects/torbrowser>">Learn more »</a></li> <li>The <strong>Vidalia Bundle</strong> contains Tor, <a href="<page projects/vidalia>">Vidalia</a>, and Polipo for installation on your system. You need to configure your applications to use Tor.</li> <li>The <strong>Expert Package</strong> contains just Tor and nothing else. You'll need to configure Tor and all of your applications manually.</li> </ul> <p>There are two versions of each package, a stable and alpha release. Stable packages are released when we believe the features and code will not change for many months. Alpha or unstable packages are released so you can help us test new features and bugfixes. Even though they have a higher version number than the stable versions listed above, there is a much higher chance of serious reliability and security bugs in these downloads. Please be prepared to <a href="https://bugs.torproject.org/">report bugs</a>.</p> <p>The current stable version of Tor for Windows is <version-win32-stable>. The current alpha/unstable version of tor for Windows is <version-win32-alpha>.</p> </td> </tr> <tr class="gray"> <td><span class="windows"> Tor Browser Bundle version <version-torbrowserbundle>, <a href="../dist/torbrowser/tor-browser-<version-torbrowserbundle>_en-US.exe">Download</a> (<a href="../dist/torbrowser/tor-browser-<version-torbrowserbundle>_en-US.exe.asc">sig</a>) </span> </td> </tr> <tr> <td><span class="windows"> Tor Browser Instant Messaging Bundle version <version-torimbrowserbundle>, <a href="../dist/torbrowser/tor-im-browser-<version-torimbrowserbundle>_en-US.exe">Download</a> (<a href="../dist/torbrowser/tor-im-browser-<version-torimbrowserbundle>_en-US.exe.asc">sig</a>) </span> </td> </tr> <tr class="gray"> <td><span class="windows"> Tor Browser Bundle version <version-torbrowserbundle> source code, <a href="../dist/torbrowser/tor-browser-<version-torbrowserbundle>-src.tar.gz">Download Tarball</a> (<a href="../dist/torbrowser/tor-browser-<version-torbrowserbundle>-src.tar.gz.asc">sig</a>) </span> </td> </tr> <tr><td><span class="windows"> Stable Vidalia Bundle works with Windows 7, Vista, XP, 2003 Server, <a href="<package-win32-bundle-stable>">Download Stable</a> (<a href="<package-win32-bundle-stable>.asc">sig</a>) </span></td> </tr> <tr class="gray"><td><span class="windows">Unstable Vidalia Bundles works with Windows 7, Vista, XP, 2003 Server, <a href="<package-win32-bundle-alpha>">Download Unstable</a> (<a href="<package-win32-bundle-alpha>.asc">sig</a>)</span></td> </tr> <tr> <td><span class="windows">Stable Expert Bundle works with Windows 98SE, ME, Windows 7, Vista, XP, 2000, 2003 Server, <a href="../dist/win32/tor-<version-win32-stable>-win32.exe">Download Stable</a> (<a href="../dist/win32/tor-<version-win32-stable>-win32.exe.asc">sig</a>)</span></td> </tr> <tr class="gray"> <td><span class="windows">Unstable Expert Bundle works with Windows 98SE, ME, Windows 7, Vista, XP, 2000, 2003 Server, <a href="../dist/win32/tor-<version-win32-alpha>-win32.exe">Download Unstable</a> (<a href="../dist/win32/tor-<version-win32-alpha>-win32.exe.asc">sig</a>) </span></td> </tr> <tr> <td> <a href="<page docs/tor-doc-windows>">Documentation for Microsoft Windows clients</a> </td> </tr> </table> <!-- END WINDOWS --> <!-- START OS X --> <table class="topforty"> <tr> <td class="nopad"><div class="title"><a name="mac">Apple OS X</a></div></td> </tr> <tr> <td class="intro">The Tor Software for OS X comes bundled in two different ways: <ul> <li>The <strong>Tor Browser Bundle</strong> contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. <a href="<page projects/torbrowser>">Learn more »</a></li> <li>The <strong>Vidalia Bundle</strong> contains Tor, <a href="<page projects/vidalia>">Vidalia</a>, and Polipo for installation on your system. You need to configure your applications to use Tor.</li> </ul> <p>There are two versions of each package, a stable and alpha release. Stable packages are released when we believe the features and code will not change for many months. Alpha or unstable packages are released so you can help us test new features and bugfixes. Even though they have a higher version number than the stable versions listed above, there is a much higher chance of serious reliability and security bugs in these downloads. Please be prepared to <a href="https://bugs.torproject.org/">report bugs</a>.</p> <p>The current stable version of Tor for OS X is <version-osx-x86-stable>. The current alpha/unstable version of Tor for OS X is <version-osx-x86-alpha>.</p> </td> </tr> <tr class="gray"> <td><span class="mac">Tor Browser Bundle for OS X Intel (beta version), <a href="../dist/torbrowser/osx/TorBrowser-<version-torbrowserbundleosx>-dev-osx-i386-en-US.zip">Download</a> (<a href="../dist/torbrowser/osx/TorBrowser-<version-torbrowserbundleosx>-dev-osx-i386-en-US.zip.asc">sig</a>) </span> </td> </tr> <tr> <td><span class="mac">Stable Vidalia Bundle for OS X Intel, <a href="<package-osx-x86-bundle-stable>">Download Stable</a> (<a href="<package-osx-x86-bundle-stable>.asc">sig</a>)</span></td> </tr> <tr class="gray"> <td><span class="mac">Unstable Vidalia Bundle for OS X Intel, <a href="<package-osx-x86-bundle-alpha>">Download Unstable</a> (<a href="<package-osx-x86-bundle-alpha>.asc">sig</a>)</span></td> </tr> <tr> <td><span class="mac">Stable Vidalia Bundle for OS X PowerPC, <a href="<package-osx-ppc-bundle-stable>">Download Stable</a> (<a href="<package-osx-ppc-bundle-stable>.asc">sig</a>)</span></td> </tr> <tr class="gray"> <td><span class="mac">Unstable Vidalia Bundle for OS X PowerPC, <a href="<package-osx-ppc-bundle-alpha>">Download Unstable</a> (<a href="<package-osx-ppc-bundle-alpha>.asc">sig</a>)</span></td> </tr> <tr> <td><a href="<page docs/tor-doc-osx>">Documentation for Apple OS X clients</a>.</td> </tr> </table> <!-- END OS X --> <!-- START UNIX --> <table class="topforty"> <tr> <td class="nopad"><div class="title"><a name="linux">Linux/Unix</a></div></td></tr> <tr> <td class="intro">The Tor Software comes bundled in two different ways: <ul> <li>The <strong>Tor Browser Bundle</strong> contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. <a href="<page projects/torbrowser>">Learn more »</a></li> <li>Read how to use <a href="<page download/download-unix>">our repositories for the Tor software.</a>.</li> </ul> </td> </tr> <tr class="gray"> <td><span class="linux">Tor Browser Bundle for GNU/Linux (beta version) on i686, <a href="../dist/torbrowser/linux/tor-browser-gnu-linux-i686-<version-torbrowserbundlelinux32>-dev-en-US.tar.gz">Download</a> (<a href="../dist/torbrowser/linux/tor-browser-gnu-linux-i686-<version-torbrowserbundlelinux32>-dev-en-US.tar.gz.asc">sig</a>)</span></td> </tr> <tr> <td><span class="linux">Tor Browser Bundle for GNU/Linux (beta version) on x86_64, <a href="../dist/torbrowser/linux/tor-browser-gnu-linux-x86_64-<version-torbrowserbundlelinux64>-dev-en-US.tar.gz">Download</a> (<a href="../dist/torbrowser/linux/tor-browser-gnu-linux-x86_64-<version-torbrowserbundlelinux64>-dev-en-US.tar.gz.asc">sig</a>)</span></td> </tr> <tr class="gray"> <td><span class="linux">Use <a href="<page download/download-unix>">our repositories</a> for all other Tor-related software.</span></td> </tr> </table> <table class="topforty"> <tr> <td class="nopad"><div class="title"><a name="smartphones">Tor for Smartphones</a></div></td> </tr> <tr class="gray"> <td colspan="2">Android-based phones, tablets, computers</td> <td><a href="../dist/android/<version-androidbundle-tor>-orbot-<version-androidbundle-orbot>.apk">Android Bundle</a></td> <td><a href="<page docs/android>">Android Instructions</a></td> </tr> <tr> <td colspan="2">iPhone, iPod Touch, iPad</td> <td colspan="2"><span class="mac"><a href="http://sid77.slackware.it/iphone/">Test packages by Marco</a></span></td> </tr> <tr class="gray"> <td>Nokia Maemo/N900</td> <td></td> <td><span class="nokia"><a href="<page docs/N900>">Experimental instructions</a></span></td> <td></td> </tr> </table> <!-- END UNIX --> <!-- BEGIN SOURCE --> <table class="topforty"> <tr> <td class="nopad"><div class="title"><a name="source">Source Code</a></div></td> </tr> <tr> <td colspan="2">The current stable version of Tor is <version-stable>. Its <a href="https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog">release notes</a> are available.</td> <td colspan="2">The current unstable/alpha version of Tor is <version-alpha>. Its <a href="https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog">Changelog </a> is available.</td> </tr> <tr class="gray"> <td>Source Tarballs</td> <td>./configure && make && src/or/tor</td> <td><a href="../dist/tor-<version-stable>.tar.gz">Download Stable</a> (<a href="../dist/tor-<version-stable>.tar.gz.asc">sig</a>)</td> <td><a href="../dist/tor-<version-alpha>.tar.gz">Download Unstable</a> (<a href="../dist/tor-<version-alpha>.tar.gz.asc">sig</a>)</td> </tr> </table> <!-- END SOURCE --> <br> <!-- BEGIN WARNING --> <div class="warning"> <a name="warning"></a> <h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> <p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for: </p> <ol> <li> Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use <a href="http://www.mozilla.com/en-US/firefox/all-older.html">Firefox</a> with the <a href="<page torbutton/index>">Torbutton</a> extension. </li> <li> Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated into revealing your IP address. For example, that means Youtube is disabled. If you really need your Youtube, you can <a href="<page torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> to allow it; but be aware that you're opening yourself up to potential attack. Also, extensions like Google toolbar look up more information about the websites you type in: they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for non-Tor browsing). </li> <li> Beware of cookies: if you ever browse without Tor and a site gives you a cookie, that cookie could identify you even when you start using Tor again. Torbutton tries to handle your cookies safely. <a href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help protect any cookies you do not want to lose. </li> <li> Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but <a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it can't encrypt your traffic between the Tor network and its final destination.</a> If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites. </li> <li> While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity. </li> <li> Tor tries to prevent attackers from learning what destinations you connect to. It doesn't prevent somebody watching your traffic from learning that you're using Tor. You can mitigate (but not fully resolve) the risk by using a <a href="<page docs/bridges>">Tor bridge relay</a> rather than connecting directly to the public Tor network, but ultimately the best protection here is a social approach: the more Tor users there are near you and the more <a href="<page about/torusers>">diverse</a> their interests, the less dangerous it will be that you are one of them. </li> </ol> <br> <p> Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn't complete, and we need your help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting all the issues</a>. </p> </div> <!-- END WARNING --> </div> <!-- END MAINCOL --> <div id="sidecol-right"> <div class="img-shadow"> <div class="sidenav-sub"> <h2>Jump to:</h2> <ul> <li class="dropdown"><a href="#Windows">Microsoft Windows</a></li> <li class="dropdown"><a href="#mac">Apple OS X</a></li> <li class="dropdown"><a href="#linux">Linux/Unix</a></li> <li class="dropdown"><a href="#smartphones">Smartphones</a></li> <li class="dropdown"><a href="#source">Source Code</a></li> <li class="dropdown"><a href="<page donate/donate>">Please consider a donation</a></li> </ul> </div> </div> <!-- END SIDENAV --> <div class="img-shadow"> <div class="infoblock"> <h2>What is the (sig) link?</h2> <p>These are GPG signatures to allow you to verify that your downloaded file is really from The Tor Project and not an imposter.</p> <a href="<page docs/verifying-signatures>">Learn more »</a> </div> </div> <!-- END INFOBLOCK --> <div class="img-shadow"> <div class="sidenav-sub"> <h2>Having Trouble?</h2> <ul> <li class="dropdown"><a href="<page docs/documentation>">Read the fine manuals</a></li> </ul> </div> </div> <!-- END SIDENAV --> </div> <!-- END SIDECOL --> </div> <!-- END CONTENT --> #include <foot.wmi>