fix up the info blurb, update navigation for about links, remove 3 pages replaced by the general overview, fix up download warning.
Andrew Lewman

Andrew Lewman commited on 2010-09-27 22:31:47
Zeige 7 geänderte Dateien mit 76 Einfügungen und 221 Löschungen.

... ...
@@ -1,47 +0,0 @@
1
-## translation metadata
2
-# Revision: $Revision: 0 $
3
-# Translation-Priority: 2-medium
4
-
5
-#include "head.wmi" TITLE="Tor Project: Future of Tor" CHARSET="UTF-8" <p>
6
-<div id="content" class="clearfix">
7
-  <div id="breadcrumbs">
8
-    <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page about/overview>">About &raquo; </a>
10
-    <a href="<page about/future>">The Future of Tor</a>
11
-  </div>
12
-  <div id="maincol">
13
-    <h1>The future of Tor</a></h1>
14
-    
15
-    <p>
16
-    Providing a usable anonymizing network on the Internet today is an
17
-    ongoing challenge. We want software that meets users' needs. We also
18
-    want to keep the network up and running in a way that handles as many
19
-    users as possible. Security and usability don't have to be at odds:
20
-    As Tor's usability increases, it will attract more users, which will
21
-    increase the possible sources and destinations of each communication,
22
-    thus increasing security for everyone.
23
-    We're making progress, but we need your help.  Please consider
24
-    <a href="<page docs/tor-doc-relay>">running a relay</a>
25
-    or <a href="<page getinvolved/volunteer>">volunteering</a> as a
26
-    <a href="<page docs/documentation>#Developers">developer</a>.
27
-    </p>
28
-    
29
-    <p>
30
-    Ongoing trends in law, policy, and technology threaten anonymity as never
31
-    before, undermining our ability to speak and read freely online. These
32
-    trends also undermine national security and critical infrastructure by
33
-    making communication among individuals, organizations, corporations,
34
-    and governments more vulnerable to analysis. Each new user and relay
35
-    provides additional diversity, enhancing Tor's ability to put control
36
-    over your security and privacy back into your hands.
37
-    </p>
38
-  </div>
39
-  <!-- END MAINCOL -->
40
-  <div id = "sidecol">
41
-#include "side.wmi"
42
-#include "info.wmi"
43
-  </div>
44
-  <!-- END SIDECOL -->
45
-</div>
46
-<!-- END CONTENT -->
47
-#include <foot.wmi>
... ...
@@ -1,42 +0,0 @@
1
-## translation metadata
2
-# Revision: $Revision: 0 $
3
-# Translation-Priority: 2-medium
4
-
5
-#include "head.wmi" TITLE="Tor Project: Staying Anonymous" CHARSET="UTF-8" <p>
6
-<div id="content" class="clearfix">
7
-  <div id="breadcrumbs">
8
-    <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page about/overview>">About &raquo; </a>
10
-    <a href="<page about/staying>">Staying Anonymous</a>
11
-  </div>
12
-  <div id="maincol">
13
-    <h1>Staying anonymous</h1> 
14
-    
15
-    <p>
16
-    Tor can't solve all anonymity problems.  It focuses only on
17
-    protecting the transport of data.  You need to use protocol-specific
18
-    support software if you don't want the sites you visit to see your
19
-    identifying information. For example, you can use web proxies such as
20
-    Poliipo while web browsing to block cookies and withhold information
21
-    about your browser type.
22
-    </p>
23
-    
24
-    <p>
25
-    Also, to protect your anonymity, be smart.  Don't provide your name
26
-    or other revealing information in web forms.  Be aware that, like all
27
-    anonymizing networks that are fast enough for web browsing, Tor does not
28
-    provide protection against end-to-end timing attacks: If your attacker
29
-    can watch the traffic coming out of your computer, and also the traffic
30
-    arriving at your chosen destination, he can use statistical analysis to
31
-    discover that they are part of the same circuit.
32
-    </p> 
33
-  </div>
34
-  <!-- END MAINCOL -->
35
-  <div id = "sidecol">
36
-#include "side.wmi"
37
-#include "info.wmi"
38
-  </div>
39
-  <!-- END SIDECOL -->
40
-</div>
41
-<!-- END CONTENT -->
42
-#include <foot.wmi> 
... ...
@@ -1,66 +0,0 @@
1
-## translation metadata
2
-# Revision: $Revision: 0 $
3
-# Translation-Priority: 2-medium
4
-
5
-#include "head.wmi" TITLE="Why We Need Tor" CHARSET="UTF-8" <p>
6
-<div id="content" class="clearfix">
7
-  <div id="breadcrumbs">
8
-    <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page about/overview>">About &raquo; </a>
10
-    <a href="<page about/why>">Why We Need Tor</a>
11
-  </div>
12
-  <div id="maincol">
13
-    <h1>Why We Need Tor</h1>  
14
-    
15
-    <p>
16
-    Using Tor protects you against a common form of Internet surveillance
17
-    known as "traffic analysis."  Traffic analysis can be used to infer
18
-    who is talking to whom over a public network.  Knowing the source
19
-    and destination of your Internet traffic allows others to track your
20
-    behavior and interests.  This can impact your checkbook if, for example,
21
-    an e-commerce site uses price discrimination based on your country or
22
-    institution of origin.  It can even threaten your job and physical safety
23
-    by revealing who and where you are. For example, if you're travelling
24
-    abroad and you connect to your employer's computers to check or send mail,
25
-    you can inadvertently reveal your national origin and professional
26
-    affiliation to anyone observing the network, even if the connection
27
-    is encrypted.
28
-    </p>
29
-    
30
-    <p>
31
-    How does traffic analysis work?  Internet data packets have two parts:
32
-    a data payload and a header used for routing.  The data payload is
33
-    whatever is being sent, whether that's an email message, a web page, or an
34
-    audio file.  Even if you encrypt the data payload of your communications,
35
-    traffic analysis still reveals a great deal about what you're doing and,
36
-    possibly, what you're saying.  That's because it focuses on the header,
37
-    which discloses source, destination, size, timing, and so on.
38
-    </p>
39
-    
40
-    <p>
41
-    A basic problem for the privacy minded is that the recipient of your
42
-    communications can see that you sent it by looking at headers.  So can
43
-    authorized intermediaries like Internet service providers, and sometimes
44
-    unauthorized intermediaries as well.  A very simple form of traffic
45
-    analysis might involve sitting somewhere between sender and recipient on
46
-    the network, looking at headers.
47
-    </p>
48
-    
49
-    <p>
50
-    But there are also more powerful kinds of traffic analysis.  Some
51
-    attackers spy on multiple parts of the Internet and use sophisticated
52
-    statistical techniques to track the communications patterns of many
53
-    different organizations and individuals.  Encryption does not help against
54
-    these attackers, since it only hides the content of Internet traffic, not
55
-    the headers.
56
-    </p> 
57
-  </div>
58
-  <!-- END MAINCOL -->
59
-  <div id = "sidecol">
60
-#include "side.wmi"
61
-#include "info.wmi"
62
-  </div>
63
-  <!-- END SIDECOL -->
64
-</div>
65
-<!-- END CONTENT -->
66
-#include <foot.wmi> 
... ...
@@ -7,73 +7,13 @@
7 7
 			<div id="breadcrumbs"><a href="<page index>">Home &raquo; </a><a href="<page download/download>">Download</a></div>
8 8
     	<div id="maincol-left">
9 9
       	<h1>Download Tor</h1>
10
-        <!-- BEGIN WARNING -->
10
+        <!-- BEGIN TEASER WARNING -->
11 11
       	<div class="warning">
12 12
           <h2>Want Tor to really work?</h2>
13
-<p></p>...then please don't just install it and go on.  You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for:
14
-</p>
15
-
16
-<ol>
17
-<li>
18
-Tor only protects Internet applications that are configured to
19
-send their traffic through Tor &mdash; it doesn't magically anonymize
20
-all your traffic just because you install it.  We recommend you
21
-use <a href="http://www.mozilla.com/en-US/firefox/all-older.html">Firefox</a> with the <a
22
-href="<page torbutton/index>">Torbutton</a> extension.
23
-</li>
24
-
25
-<li>
26
-Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer,
27
-Quicktime, Adobe's PDF plugin, and others: they can be manipulated
28
-into revealing your IP address. For example, that means Youtube is
29
-disabled. If you really need your Youtube, you can <a href="<page
30
-torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> to allow it; but
31
-be aware that you're opening yourself up to potential attack. Also,
32
-extensions like Google toolbar look up more information about the
33
-websites you type in: they may bypass Tor and/or broadcast sensitive
34
-information. Some people prefer using two browsers (one for Tor, one
35
-for unsafe browsing).
36
-</li>
37
-
38
-<li>
39
-Beware of cookies: if you ever browse without Tor and a site gives
40
-you a cookie, that cookie could identify you even when you start
41
-using Tor again. Torbutton tries to handle your cookies safely. <a
42
-href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help
43
-protect any cookies you do not want to lose.
44
-</li>
45
-
46
-<li>
47
-Tor anonymizes the origin of your traffic, and it encrypts everything
48
-between you and the Tor network and everything inside the Tor network,
49
-but <a
50
-href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#SoImtotallyanonymousifIuseTor">it
51
-can't encrypt your traffic between the Tor network and its final
52
-destination.</a> If you are communicating sensitive information, you
53
-should use as much care as you would on the normal scary Internet &mdash;
54
-use HTTPS or other end-to-end encryption and authentication.
55
-</li>
56
-
57
-<li>
58
-While Tor blocks attackers on your local network from discovering
59
-or influencing your destination, it opens new risks: malicious or
60
-misconfigured Tor exit nodes can send you the wrong page, or even send
61
-you embedded Java applets disguised as domains you trust. Be careful
62
-opening documents or applications you download through Tor, unless you've
63
-verified their integrity.
64
-</li>
65
-</ol>
66
-
67
-<br />
68
-<p>
69
-Be smart and learn more. Understand what Tor does and does not offer.
70
-This list of pitfalls isn't complete, and we need your
71
-help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting
72
-all the issues</a>.
73
-</p>
13
+<p>...then please don't just install it and go on.  You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. Read the <a href="#warning">full list of warnings</a>.
74 14
 </p>
75 15
         </div>
76
-        <!-- END WARNING -->
16
+        <!-- END TEASER WARNING -->
77 17
         <table class="topforty">
78 18
         	<tr>
79 19
           	<td class="nopad" colspan="4"><div class="title"><a name="wim">Tor Browser Bundle</a></div></td>
... ...
@@ -228,6 +168,75 @@ all the issues</a>.
228 168
                 <td><a href="#">Source Tarballs</a></td>
229 169
               </tr>
230 170
         </table>
171
+
172
+<!-- BEGIN WARNING -->
173
+      	<div class="warning">
174
+	<a name="warning"></a>
175
+          <h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
176
+<p></p>...then please don't just install it and go on.  You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for:
177
+</p>
178
+
179
+<ol>
180
+<li>
181
+Tor only protects Internet applications that are configured to
182
+send their traffic through Tor &mdash; it doesn't magically anonymize
183
+all your traffic just because you install it.  We recommend you
184
+use <a href="http://www.mozilla.com/en-US/firefox/all-older.html">Firefox</a> with the <a
185
+href="<page torbutton/index>">Torbutton</a> extension.
186
+</li>
187
+
188
+<li>
189
+Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer,
190
+Quicktime, Adobe's PDF plugin, and others: they can be manipulated
191
+into revealing your IP address. For example, that means Youtube is
192
+disabled. If you really need your Youtube, you can <a href="<page
193
+torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> to allow it; but
194
+be aware that you're opening yourself up to potential attack. Also,
195
+extensions like Google toolbar look up more information about the
196
+websites you type in: they may bypass Tor and/or broadcast sensitive
197
+information. Some people prefer using two browsers (one for Tor, one
198
+for unsafe browsing).
199
+</li>
200
+
201
+<li>
202
+Beware of cookies: if you ever browse without Tor and a site gives
203
+you a cookie, that cookie could identify you even when you start
204
+using Tor again. Torbutton tries to handle your cookies safely. <a
205
+href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help
206
+protect any cookies you do not want to lose.
207
+</li>
208
+
209
+<li>
210
+Tor anonymizes the origin of your traffic, and it encrypts everything
211
+between you and the Tor network and everything inside the Tor network,
212
+but <a
213
+href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#SoImtotallyanonymousifIuseTor">it
214
+can't encrypt your traffic between the Tor network and its final
215
+destination.</a> If you are communicating sensitive information, you
216
+should use as much care as you would on the normal scary Internet &mdash;
217
+use HTTPS or other end-to-end encryption and authentication.
218
+</li>
219
+
220
+<li>
221
+While Tor blocks attackers on your local network from discovering
222
+or influencing your destination, it opens new risks: malicious or
223
+misconfigured Tor exit nodes can send you the wrong page, or even send
224
+you embedded Java applets disguised as domains you trust. Be careful
225
+opening documents or applications you download through Tor, unless you've
226
+verified their integrity.
227
+</li>
228
+</ol>
229
+
230
+<br />
231
+<p>
232
+Be smart and learn more. Understand what Tor does and does not offer.
233
+This list of pitfalls isn't complete, and we need your
234
+help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting
235
+all the issues</a>.
236
+</p>
237
+          </p>
238
+        </div>
239
+        <!-- END WARNING -->
231 240
       </div>
232 241
       <!-- END MAINCOL -->
233 242
       <div id="sidecol-right">
... ...
@@ -39,7 +39,7 @@
39 39
       <div class="col first">
40 40
       	<h4>About Tor</h4>
41 41
         <ul>
42
-          <li><a href="<page about/about>">What Tor Does</a></li>
42
+          <li><a href="<page about/overview>">What Tor Does</a></li>
43 43
           <li><a href="<page about/torusers>">Users of Tor</a></li>
44 44
           <li><a href="<page about/corepeople>">Core Tor People</a></li>
45 45
           <li><a href="<page about/sponsors>">Sponsors</a></li>
... ...
@@ -2,7 +2,8 @@
2 2
 <div class="img-shadow">
3 3
   <div class="infoblock">
4 4
     <h2 class="bulb">Tor Tip</h2>
5
-    <p>Use Tor correctly or go away. NEED BETTER BLURB.</p>
5
+    <p>Want to get the most out of Tor?  Understand what Tor <a
6
+href="<page download/download>#warning">does and does not do</a> to protect you!</p>
6 7
   </div>
7 8
   <!-- END INFOBLOCK -->              
8 9
 </div>
... ...
@@ -8,7 +8,7 @@
8 8
     # path                              link text
9 9
     my @navigation = (
10 10
         'home'                        , 'Home',
11
-        'about/about'                 , 'About Tor',
11
+        'about/overview'                 , 'About Tor',
12 12
         'docs/documentation'          , 'Documentation',
13 13
         'projects/projects'           , 'Projects',
14 14
         'press/'                      , 'Press',
15 15