Browse code

point people to https everywhere rather than just tell them to use https.

Andrew Lewman authored on 12/12/2010 14:29:19
Showing 1 changed files
... ...
@@ -199,7 +199,7 @@ be aware that you're opening yourself up to potential attack. Also,
199 199
 extensions like Google toolbar look up more information about the
200 200
 websites you type in: they may bypass Tor and/or broadcast sensitive
201 201
 information. Some people prefer using two browsers (one for Tor, one
202
-for unsafe browsing).
202
+for non-Tor browsing).
203 203
 </li>
204 204
 
205 205
 <li>
... ...
@@ -217,7 +217,11 @@ but <a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it
217 217
 can't encrypt your traffic between the Tor network and its final
218 218
 destination.</a> If you are communicating sensitive information, you
219 219
 should use as much care as you would on the normal scary Internet &mdash;
220
-use HTTPS or other end-to-end encryption and authentication.
220
+use HTTPS or other end-to-end encryption and authentication.  <a
221
+href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> is a
222
+Firefox extension produced as a collaboration between The Tor Project
223
+and the Electronic Frontier Foundation. It encrypts your communications
224
+with a number of major websites.
221 225
 </li>
222 226
 
223 227
 <li>
... ...
@@ -239,9 +243,7 @@ protection here is a social approach: the more Tor users there are near
239 243
 you and the more <a href="<page about/torusers>">diverse</a> their interests,
240 244
 the less dangerous it will be that you are one of them.
241 245
 </li>
242
-
243 246
 </ol>
244
-
245 247
 <br>
246 248
 <p>
247 249
 Be smart and learn more. Understand what Tor does and does not offer.