Andrew Lewman commited on 2010-09-27 22:31:47
Zeige 7 geänderte Dateien mit 76 Einfügungen und 221 Löschungen.
... | ... |
@@ -1,47 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision: 0 $ |
|
3 |
-# Translation-Priority: 2-medium |
|
4 |
- |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Future of Tor" CHARSET="UTF-8" <p> |
|
6 |
-<div id="content" class="clearfix"> |
|
7 |
- <div id="breadcrumbs"> |
|
8 |
- <a href="<page index>">Home » </a> |
|
9 |
- <a href="<page about/overview>">About » </a> |
|
10 |
- <a href="<page about/future>">The Future of Tor</a> |
|
11 |
- </div> |
|
12 |
- <div id="maincol"> |
|
13 |
- <h1>The future of Tor</a></h1> |
|
14 |
- |
|
15 |
- <p> |
|
16 |
- Providing a usable anonymizing network on the Internet today is an |
|
17 |
- ongoing challenge. We want software that meets users' needs. We also |
|
18 |
- want to keep the network up and running in a way that handles as many |
|
19 |
- users as possible. Security and usability don't have to be at odds: |
|
20 |
- As Tor's usability increases, it will attract more users, which will |
|
21 |
- increase the possible sources and destinations of each communication, |
|
22 |
- thus increasing security for everyone. |
|
23 |
- We're making progress, but we need your help. Please consider |
|
24 |
- <a href="<page docs/tor-doc-relay>">running a relay</a> |
|
25 |
- or <a href="<page getinvolved/volunteer>">volunteering</a> as a |
|
26 |
- <a href="<page docs/documentation>#Developers">developer</a>. |
|
27 |
- </p> |
|
28 |
- |
|
29 |
- <p> |
|
30 |
- Ongoing trends in law, policy, and technology threaten anonymity as never |
|
31 |
- before, undermining our ability to speak and read freely online. These |
|
32 |
- trends also undermine national security and critical infrastructure by |
|
33 |
- making communication among individuals, organizations, corporations, |
|
34 |
- and governments more vulnerable to analysis. Each new user and relay |
|
35 |
- provides additional diversity, enhancing Tor's ability to put control |
|
36 |
- over your security and privacy back into your hands. |
|
37 |
- </p> |
|
38 |
- </div> |
|
39 |
- <!-- END MAINCOL --> |
|
40 |
- <div id = "sidecol"> |
|
41 |
-#include "side.wmi" |
|
42 |
-#include "info.wmi" |
|
43 |
- </div> |
|
44 |
- <!-- END SIDECOL --> |
|
45 |
-</div> |
|
46 |
-<!-- END CONTENT --> |
|
47 |
-#include <foot.wmi> |
... | ... |
@@ -1,42 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision: 0 $ |
|
3 |
-# Translation-Priority: 2-medium |
|
4 |
- |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Staying Anonymous" CHARSET="UTF-8" <p> |
|
6 |
-<div id="content" class="clearfix"> |
|
7 |
- <div id="breadcrumbs"> |
|
8 |
- <a href="<page index>">Home » </a> |
|
9 |
- <a href="<page about/overview>">About » </a> |
|
10 |
- <a href="<page about/staying>">Staying Anonymous</a> |
|
11 |
- </div> |
|
12 |
- <div id="maincol"> |
|
13 |
- <h1>Staying anonymous</h1> |
|
14 |
- |
|
15 |
- <p> |
|
16 |
- Tor can't solve all anonymity problems. It focuses only on |
|
17 |
- protecting the transport of data. You need to use protocol-specific |
|
18 |
- support software if you don't want the sites you visit to see your |
|
19 |
- identifying information. For example, you can use web proxies such as |
|
20 |
- Poliipo while web browsing to block cookies and withhold information |
|
21 |
- about your browser type. |
|
22 |
- </p> |
|
23 |
- |
|
24 |
- <p> |
|
25 |
- Also, to protect your anonymity, be smart. Don't provide your name |
|
26 |
- or other revealing information in web forms. Be aware that, like all |
|
27 |
- anonymizing networks that are fast enough for web browsing, Tor does not |
|
28 |
- provide protection against end-to-end timing attacks: If your attacker |
|
29 |
- can watch the traffic coming out of your computer, and also the traffic |
|
30 |
- arriving at your chosen destination, he can use statistical analysis to |
|
31 |
- discover that they are part of the same circuit. |
|
32 |
- </p> |
|
33 |
- </div> |
|
34 |
- <!-- END MAINCOL --> |
|
35 |
- <div id = "sidecol"> |
|
36 |
-#include "side.wmi" |
|
37 |
-#include "info.wmi" |
|
38 |
- </div> |
|
39 |
- <!-- END SIDECOL --> |
|
40 |
-</div> |
|
41 |
-<!-- END CONTENT --> |
|
42 |
-#include <foot.wmi> |
... | ... |
@@ -1,66 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision: 0 $ |
|
3 |
-# Translation-Priority: 2-medium |
|
4 |
- |
|
5 |
-#include "head.wmi" TITLE="Why We Need Tor" CHARSET="UTF-8" <p> |
|
6 |
-<div id="content" class="clearfix"> |
|
7 |
- <div id="breadcrumbs"> |
|
8 |
- <a href="<page index>">Home » </a> |
|
9 |
- <a href="<page about/overview>">About » </a> |
|
10 |
- <a href="<page about/why>">Why We Need Tor</a> |
|
11 |
- </div> |
|
12 |
- <div id="maincol"> |
|
13 |
- <h1>Why We Need Tor</h1> |
|
14 |
- |
|
15 |
- <p> |
|
16 |
- Using Tor protects you against a common form of Internet surveillance |
|
17 |
- known as "traffic analysis." Traffic analysis can be used to infer |
|
18 |
- who is talking to whom over a public network. Knowing the source |
|
19 |
- and destination of your Internet traffic allows others to track your |
|
20 |
- behavior and interests. This can impact your checkbook if, for example, |
|
21 |
- an e-commerce site uses price discrimination based on your country or |
|
22 |
- institution of origin. It can even threaten your job and physical safety |
|
23 |
- by revealing who and where you are. For example, if you're travelling |
|
24 |
- abroad and you connect to your employer's computers to check or send mail, |
|
25 |
- you can inadvertently reveal your national origin and professional |
|
26 |
- affiliation to anyone observing the network, even if the connection |
|
27 |
- is encrypted. |
|
28 |
- </p> |
|
29 |
- |
|
30 |
- <p> |
|
31 |
- How does traffic analysis work? Internet data packets have two parts: |
|
32 |
- a data payload and a header used for routing. The data payload is |
|
33 |
- whatever is being sent, whether that's an email message, a web page, or an |
|
34 |
- audio file. Even if you encrypt the data payload of your communications, |
|
35 |
- traffic analysis still reveals a great deal about what you're doing and, |
|
36 |
- possibly, what you're saying. That's because it focuses on the header, |
|
37 |
- which discloses source, destination, size, timing, and so on. |
|
38 |
- </p> |
|
39 |
- |
|
40 |
- <p> |
|
41 |
- A basic problem for the privacy minded is that the recipient of your |
|
42 |
- communications can see that you sent it by looking at headers. So can |
|
43 |
- authorized intermediaries like Internet service providers, and sometimes |
|
44 |
- unauthorized intermediaries as well. A very simple form of traffic |
|
45 |
- analysis might involve sitting somewhere between sender and recipient on |
|
46 |
- the network, looking at headers. |
|
47 |
- </p> |
|
48 |
- |
|
49 |
- <p> |
|
50 |
- But there are also more powerful kinds of traffic analysis. Some |
|
51 |
- attackers spy on multiple parts of the Internet and use sophisticated |
|
52 |
- statistical techniques to track the communications patterns of many |
|
53 |
- different organizations and individuals. Encryption does not help against |
|
54 |
- these attackers, since it only hides the content of Internet traffic, not |
|
55 |
- the headers. |
|
56 |
- </p> |
|
57 |
- </div> |
|
58 |
- <!-- END MAINCOL --> |
|
59 |
- <div id = "sidecol"> |
|
60 |
-#include "side.wmi" |
|
61 |
-#include "info.wmi" |
|
62 |
- </div> |
|
63 |
- <!-- END SIDECOL --> |
|
64 |
-</div> |
|
65 |
-<!-- END CONTENT --> |
|
66 |
-#include <foot.wmi> |
... | ... |
@@ -7,73 +7,13 @@ |
7 | 7 |
<div id="breadcrumbs"><a href="<page index>">Home » </a><a href="<page download/download>">Download</a></div> |
8 | 8 |
<div id="maincol-left"> |
9 | 9 |
<h1>Download Tor</h1> |
10 |
- <!-- BEGIN WARNING --> |
|
10 |
+ <!-- BEGIN TEASER WARNING --> |
|
11 | 11 |
<div class="warning"> |
12 | 12 |
<h2>Want Tor to really work?</h2> |
13 |
-<p></p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for: |
|
14 |
-</p> |
|
15 |
- |
|
16 |
-<ol> |
|
17 |
-<li> |
|
18 |
-Tor only protects Internet applications that are configured to |
|
19 |
-send their traffic through Tor — it doesn't magically anonymize |
|
20 |
-all your traffic just because you install it. We recommend you |
|
21 |
-use <a href="http://www.mozilla.com/en-US/firefox/all-older.html">Firefox</a> with the <a |
|
22 |
-href="<page torbutton/index>">Torbutton</a> extension. |
|
23 |
-</li> |
|
24 |
- |
|
25 |
-<li> |
|
26 |
-Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, |
|
27 |
-Quicktime, Adobe's PDF plugin, and others: they can be manipulated |
|
28 |
-into revealing your IP address. For example, that means Youtube is |
|
29 |
-disabled. If you really need your Youtube, you can <a href="<page |
|
30 |
-torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> to allow it; but |
|
31 |
-be aware that you're opening yourself up to potential attack. Also, |
|
32 |
-extensions like Google toolbar look up more information about the |
|
33 |
-websites you type in: they may bypass Tor and/or broadcast sensitive |
|
34 |
-information. Some people prefer using two browsers (one for Tor, one |
|
35 |
-for unsafe browsing). |
|
36 |
-</li> |
|
37 |
- |
|
38 |
-<li> |
|
39 |
-Beware of cookies: if you ever browse without Tor and a site gives |
|
40 |
-you a cookie, that cookie could identify you even when you start |
|
41 |
-using Tor again. Torbutton tries to handle your cookies safely. <a |
|
42 |
-href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
|
43 |
-protect any cookies you do not want to lose. |
|
44 |
-</li> |
|
45 |
- |
|
46 |
-<li> |
|
47 |
-Tor anonymizes the origin of your traffic, and it encrypts everything |
|
48 |
-between you and the Tor network and everything inside the Tor network, |
|
49 |
-but <a |
|
50 |
-href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#SoImtotallyanonymousifIuseTor">it |
|
51 |
-can't encrypt your traffic between the Tor network and its final |
|
52 |
-destination.</a> If you are communicating sensitive information, you |
|
53 |
-should use as much care as you would on the normal scary Internet — |
|
54 |
-use HTTPS or other end-to-end encryption and authentication. |
|
55 |
-</li> |
|
56 |
- |
|
57 |
-<li> |
|
58 |
-While Tor blocks attackers on your local network from discovering |
|
59 |
-or influencing your destination, it opens new risks: malicious or |
|
60 |
-misconfigured Tor exit nodes can send you the wrong page, or even send |
|
61 |
-you embedded Java applets disguised as domains you trust. Be careful |
|
62 |
-opening documents or applications you download through Tor, unless you've |
|
63 |
-verified their integrity. |
|
64 |
-</li> |
|
65 |
-</ol> |
|
66 |
- |
|
67 |
-<br /> |
|
68 |
-<p> |
|
69 |
-Be smart and learn more. Understand what Tor does and does not offer. |
|
70 |
-This list of pitfalls isn't complete, and we need your |
|
71 |
-help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting |
|
72 |
-all the issues</a>. |
|
73 |
-</p> |
|
13 |
+<p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. Read the <a href="#warning">full list of warnings</a>. |
|
74 | 14 |
</p> |
75 | 15 |
</div> |
76 |
- <!-- END WARNING --> |
|
16 |
+ <!-- END TEASER WARNING --> |
|
77 | 17 |
<table class="topforty"> |
78 | 18 |
<tr> |
79 | 19 |
<td class="nopad" colspan="4"><div class="title"><a name="wim">Tor Browser Bundle</a></div></td> |
... | ... |
@@ -228,6 +168,75 @@ all the issues</a>. |
228 | 168 |
<td><a href="#">Source Tarballs</a></td> |
229 | 169 |
</tr> |
230 | 170 |
</table> |
171 |
+ |
|
172 |
+<!-- BEGIN WARNING --> |
|
173 |
+ <div class="warning"> |
|
174 |
+ <a name="warning"></a> |
|
175 |
+ <h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> |
|
176 |
+<p></p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for: |
|
177 |
+</p> |
|
178 |
+ |
|
179 |
+<ol> |
|
180 |
+<li> |
|
181 |
+Tor only protects Internet applications that are configured to |
|
182 |
+send their traffic through Tor — it doesn't magically anonymize |
|
183 |
+all your traffic just because you install it. We recommend you |
|
184 |
+use <a href="http://www.mozilla.com/en-US/firefox/all-older.html">Firefox</a> with the <a |
|
185 |
+href="<page torbutton/index>">Torbutton</a> extension. |
|
186 |
+</li> |
|
187 |
+ |
|
188 |
+<li> |
|
189 |
+Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, |
|
190 |
+Quicktime, Adobe's PDF plugin, and others: they can be manipulated |
|
191 |
+into revealing your IP address. For example, that means Youtube is |
|
192 |
+disabled. If you really need your Youtube, you can <a href="<page |
|
193 |
+torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> to allow it; but |
|
194 |
+be aware that you're opening yourself up to potential attack. Also, |
|
195 |
+extensions like Google toolbar look up more information about the |
|
196 |
+websites you type in: they may bypass Tor and/or broadcast sensitive |
|
197 |
+information. Some people prefer using two browsers (one for Tor, one |
|
198 |
+for unsafe browsing). |
|
199 |
+</li> |
|
200 |
+ |
|
201 |
+<li> |
|
202 |
+Beware of cookies: if you ever browse without Tor and a site gives |
|
203 |
+you a cookie, that cookie could identify you even when you start |
|
204 |
+using Tor again. Torbutton tries to handle your cookies safely. <a |
|
205 |
+href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
|
206 |
+protect any cookies you do not want to lose. |
|
207 |
+</li> |
|
208 |
+ |
|
209 |
+<li> |
|
210 |
+Tor anonymizes the origin of your traffic, and it encrypts everything |
|
211 |
+between you and the Tor network and everything inside the Tor network, |
|
212 |
+but <a |
|
213 |
+href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#SoImtotallyanonymousifIuseTor">it |
|
214 |
+can't encrypt your traffic between the Tor network and its final |
|
215 |
+destination.</a> If you are communicating sensitive information, you |
|
216 |
+should use as much care as you would on the normal scary Internet — |
|
217 |
+use HTTPS or other end-to-end encryption and authentication. |
|
218 |
+</li> |
|
219 |
+ |
|
220 |
+<li> |
|
221 |
+While Tor blocks attackers on your local network from discovering |
|
222 |
+or influencing your destination, it opens new risks: malicious or |
|
223 |
+misconfigured Tor exit nodes can send you the wrong page, or even send |
|
224 |
+you embedded Java applets disguised as domains you trust. Be careful |
|
225 |
+opening documents or applications you download through Tor, unless you've |
|
226 |
+verified their integrity. |
|
227 |
+</li> |
|
228 |
+</ol> |
|
229 |
+ |
|
230 |
+<br /> |
|
231 |
+<p> |
|
232 |
+Be smart and learn more. Understand what Tor does and does not offer. |
|
233 |
+This list of pitfalls isn't complete, and we need your |
|
234 |
+help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting |
|
235 |
+all the issues</a>. |
|
236 |
+</p> |
|
237 |
+ </p> |
|
238 |
+ </div> |
|
239 |
+ <!-- END WARNING --> |
|
231 | 240 |
</div> |
232 | 241 |
<!-- END MAINCOL --> |
233 | 242 |
<div id="sidecol-right"> |
... | ... |
@@ -39,7 +39,7 @@ |
39 | 39 |
<div class="col first"> |
40 | 40 |
<h4>About Tor</h4> |
41 | 41 |
<ul> |
42 |
- <li><a href="<page about/about>">What Tor Does</a></li> |
|
42 |
+ <li><a href="<page about/overview>">What Tor Does</a></li> |
|
43 | 43 |
<li><a href="<page about/torusers>">Users of Tor</a></li> |
44 | 44 |
<li><a href="<page about/corepeople>">Core Tor People</a></li> |
45 | 45 |
<li><a href="<page about/sponsors>">Sponsors</a></li> |
... | ... |
@@ -2,7 +2,8 @@ |
2 | 2 |
<div class="img-shadow"> |
3 | 3 |
<div class="infoblock"> |
4 | 4 |
<h2 class="bulb">Tor Tip</h2> |
5 |
- <p>Use Tor correctly or go away. NEED BETTER BLURB.</p> |
|
5 |
+ <p>Want to get the most out of Tor? Understand what Tor <a |
|
6 |
+href="<page download/download>#warning">does and does not do</a> to protect you!</p> |
|
6 | 7 |
</div> |
7 | 8 |
<!-- END INFOBLOCK --> |
8 | 9 |
</div> |