Mike Perry commited on 2011-12-24 23:23:40
Zeige 2 geänderte Dateien mit 105 Einfügungen und 71 Löschungen.
Also add suggestions from velope and arma.
... | ... |
@@ -25,7 +25,8 @@ |
25 | 25 |
<!-- BEGIN TEASER WARNING --> |
26 | 26 |
<div class="warning-top"> |
27 | 27 |
<h2>Want Tor to really work?</h2> |
28 |
- <p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. Read the <a href="#warning">full list of warnings</a>. |
|
28 |
+ <p>You need to change some of your habits, as some things won't work exactly as |
|
29 |
+you are used to. Please read the <a href="#warning">full list of warnings</a> for details. |
|
29 | 30 |
</p> |
30 | 31 |
</div> |
31 | 32 |
<!-- END TEASER WARNING --> |
... | ... |
@@ -143,12 +144,14 @@ |
143 | 144 |
<a name="warning"></a> |
144 | 145 |
<a name="Warning"></a> |
145 | 146 |
<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> |
146 |
-<p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for: |
|
147 |
-</p> |
|
147 |
+ <p>You need to change some of your habits, as some things won't work exactly as |
|
148 |
+you are used to. </p> |
|
148 | 149 |
|
149 | 150 |
<ol> |
150 | 151 |
|
151 |
-<li> |
|
152 |
+<li><b>Use the Tor Browser</b> |
|
153 |
+ |
|
154 |
+<p> |
|
152 | 155 |
|
153 | 156 |
Tor only protects Internet applications that are configured to send their |
154 | 157 |
traffic through Tor — it doesn't magically anonymize all of your traffic |
... | ... |
@@ -156,60 +159,77 @@ just because you install it. We strongly recommend you use the <a href="<page |
156 | 159 |
projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect |
157 | 160 |
your privacy and anonymity on the web as long as you're browsing with Tor |
158 | 161 |
Browser itself. Almost any other web browser configuration is likely to be |
159 |
-unsafe. Similarly, we do not recommend installing additional addons into the |
|
160 |
-Tor Browser, as these may bypass Tor or otherwise impede your anonymity. |
|
162 |
+unsafe. |
|
163 |
+ |
|
164 |
+</p> |
|
161 | 165 |
|
162 | 166 |
</li> |
163 | 167 |
|
164 |
-<li> |
|
168 |
+<li><b>Don't enable or install browser plugins</b> |
|
169 |
+ |
|
170 |
+<p> |
|
165 | 171 |
|
166 | 172 |
The Tor Browser will block browser plugins such as Java, Flash, ActiveX, |
167 | 173 |
RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated |
168 |
-into revealing your IP address. For example, that means Youtube is disabled by |
|
169 |
-default. Youtube provides an experimental <a |
|
170 |
-href="https://www.youtube.com/html5">non-Flash HTML5 mode</a> that works for |
|
171 |
-many videos, but you you must vist that link opt-in manually. Youtube's |
|
172 |
-support for the HTML5 feaure is buggy and incomplete, so we are also working |
|
174 |
+into revealing your IP address. Similarly, we do not recommend installing |
|
175 |
+additional addons or plugins into the Tor Browser, as these may bypass Tor or |
|
176 |
+otherwise impede your anonymity. This means Youtube is disabled by default. |
|
177 |
+Youtube provides an experimental |
|
178 |
+<a href="https://www.youtube.com/html5">non-Flash HTML5 mode</a> that works for |
|
179 |
+many videos, but you you must visit that link opt-in manually. Youtube's |
|
180 |
+support for the HTML5 feature is buggy and incomplete, so we are also working |
|
173 | 181 |
to provide a safe way to temporarily enable Flash in future Tor Browser |
174 | 182 |
versions. |
175 | 183 |
|
176 |
-</li> |
|
177 |
- |
|
178 |
-<li> |
|
179 |
- |
|
180 |
-Similarly, Tor Browser will warn you before automatically opening |
|
181 |
-documents that are handled by external applications. <b>DO NOT IGNORE THIS |
|
182 |
-WARNING</b>. You should be very careful when downloading documents via Tor |
|
183 |
-(especially DOC and PDF files) as these documents can contain Internet |
|
184 |
-resources that will be downloaded outside of Tor by the application that |
|
185 |
-opens them. These documents can be modified by malicious exit nodes, or by |
|
186 |
-someone who is trying to trick you into revealing your non-Tor IP address. If |
|
187 |
-you must work with DOC and/or PDF files, we strongly recommend using a |
|
188 |
-disconnected computer, a <a href="https://www.virtualbox.org/">VirtualBox</a> |
|
189 |
-free <a href="http://virtualboxes.org/">image</a> with networking disabled, or |
|
190 |
-<a href="http://tails.boum.org/">Tails</a>. |
|
184 |
+</p> |
|
191 | 185 |
|
192 | 186 |
</li> |
193 | 187 |
|
194 |
-<li> |
|
188 |
+<li><b>Use HTTPS versions of websites</b> |
|
195 | 189 |
|
190 |
+<p> |
|
196 | 191 |
Tor anonymizes the origin of your traffic, and it encrypts everything between |
197 | 192 |
you and the Tor network and everything inside the Tor network, but |
198 | 193 |
<a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it can't encrypt your traffic |
199 | 194 |
between the Tor network and its final destination.</a> To help ensure |
200 |
-privacy for this last leg, the Tor Browser Bundle includes |
|
201 |
-<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to encrypt |
|
202 |
-your communications with a number of major websites, but you should still |
|
195 |
+privacy for the last leg, the Tor Browser Bundle includes |
|
196 |
+<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force |
|
197 |
+the use of HTTPS with a number of major websites, but you should still |
|
203 | 198 |
watch the browser URL bar to ensure that websites you provide sensitive information |
204 | 199 |
to display a |
205 | 200 |
<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or |
206 | 201 |
green validation</a>, include <b>https://</b> in the URL bar, |
207 | 202 |
and display the proper name for the current website. |
203 |
+</p> |
|
208 | 204 |
|
209 | 205 |
</li> |
210 | 206 |
|
211 |
-<li> |
|
207 |
+<li><b>Don't open documents downloaded through Tor while online</b> |
|
208 |
+ |
|
209 |
+<p> |
|
212 | 210 |
|
211 |
+The Tor Browser will warn you before automatically opening documents |
|
212 |
+that are handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>. |
|
213 |
+You should be very careful when downloading documents via Tor (especially DOC |
|
214 |
+and PDF files) as these documents can contain Internet resources that will be |
|
215 |
+downloaded outside of Tor by the application that opens them. These documents |
|
216 |
+can be modified by malicious exit nodes, or by a website who is trying to trick |
|
217 |
+you into revealing your non-Tor IP address. If you must work with DOC and/or |
|
218 |
+PDF files, we strongly recommend using a disconnected computer, a |
|
219 |
+<a href="https://www.virtualbox.org/">VirtualBox</a> free |
|
220 |
+<a href="http://virtualboxes.org/">image</a> with networking disabled, or |
|
221 |
+<a href="http://tails.boum.org/">Tails</a>. Under no circumstances is it safe to |
|
222 |
+use <a |
|
223 |
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
224 |
+and Tor</a> together. |
|
225 |
+ |
|
226 |
+</p> |
|
227 |
+ |
|
228 |
+</li> |
|
229 |
+ |
|
230 |
+<li><b>Use bridges and/or find company</b> |
|
231 |
+ |
|
232 |
+<p> |
|
213 | 233 |
Tor tries to prevent attackers from learning what destinations you connect |
214 | 234 |
to. It doesn't prevent somebody watching your traffic from learning that |
215 | 235 |
you're using Tor. You can mitigate (but not fully resolve) the risk |
... | ... |
@@ -218,12 +238,8 @@ connecting directly to the public Tor network, but ultimately the best |
218 | 238 |
protection here is a social approach: the more Tor users there are near |
219 | 239 |
you and the more <a href="<page about/torusers>">diverse</a> their interests, |
220 | 240 |
the less dangerous it will be that you are one of them. |
241 |
+</p> |
|
221 | 242 |
|
222 |
-</li> |
|
223 |
- |
|
224 |
-<li> Do not use <a |
|
225 |
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
226 |
-and Tor</a> together. |
|
227 | 243 |
</li> |
228 | 244 |
</ol> |
229 | 245 |
<br> |
... | ... |
@@ -281,11 +281,14 @@ |
281 | 281 |
<a name="warning"></a> |
282 | 282 |
<a name="Warning"></a> |
283 | 283 |
<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> |
284 |
-<p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for: |
|
284 |
+ <p>You need to change some of your habits, as some things won't work exactly as |
|
285 |
+you are used to. Please read the <a href="#warning">full list of warnings</a> for details. |
|
285 | 286 |
</p> |
286 | 287 |
|
287 | 288 |
<ol> |
288 |
-<li> |
|
289 |
+<li><b>Use the Tor Browser</b> |
|
290 |
+ |
|
291 |
+<p> |
|
289 | 292 |
|
290 | 293 |
Tor only protects Internet applications that are configured to send their |
291 | 294 |
traffic through Tor — it doesn't magically anonymize all of your traffic |
... | ... |
@@ -293,60 +296,77 @@ just because you install it. We strongly recommend you use the <a href="<page |
293 | 296 |
projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect |
294 | 297 |
your privacy and anonymity on the web as long as you're browsing with Tor |
295 | 298 |
Browser itself. Almost any other web browser configuration is likely to be |
296 |
-unsafe. Similarly, we do not recommend installing additional addons into the |
|
297 |
-Tor Browser, as these may bypass Tor or otherwise impede your anonymity. |
|
299 |
+unsafe. |
|
300 |
+ |
|
301 |
+</p> |
|
298 | 302 |
|
299 | 303 |
</li> |
300 | 304 |
|
301 |
-<li> |
|
305 |
+<li><b>Don't enable or install browser plugins</b> |
|
306 |
+ |
|
307 |
+<p> |
|
302 | 308 |
|
303 | 309 |
The Tor Browser will block browser plugins such as Java, Flash, ActiveX, |
304 | 310 |
RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated |
305 |
-into revealing your IP address. For example, that means Youtube is disabled by |
|
306 |
-default. Youtube provides an experimental <a |
|
307 |
-href="https://www.youtube.com/html5">non-Flash HTML5 mode</a> that works for |
|
308 |
-many videos, but you you must vist that link opt-in manually. Youtube's |
|
309 |
-support for the HTML5 feaure is buggy and incomplete, so we are also working |
|
311 |
+into revealing your IP address. Similarly, we do not recommend installing |
|
312 |
+additional addons or plugins into the Tor Browser, as these may bypass Tor or |
|
313 |
+otherwise impede your anonymity. This means Youtube is disabled by default. |
|
314 |
+Youtube provides an experimental |
|
315 |
+<a href="https://www.youtube.com/html5">non-Flash HTML5 mode</a> that works for |
|
316 |
+many videos, but you you must visit that link opt-in manually. Youtube's |
|
317 |
+support for the HTML5 feature is buggy and incomplete, so we are also working |
|
310 | 318 |
to provide a safe way to temporarily enable Flash in future Tor Browser |
311 | 319 |
versions. |
312 | 320 |
|
313 |
-</li> |
|
314 |
- |
|
315 |
-<li> |
|
316 |
- |
|
317 |
-Similarly, Tor Browser will warn you before automatically opening |
|
318 |
-documents that are handled by external applications. <b>DO NOT IGNORE THIS |
|
319 |
-WARNING</b>. You should be very careful when downloading documents via Tor |
|
320 |
-(especially DOC and PDF files) as these documents can contain Internet |
|
321 |
-resources that will be downloaded outside of Tor by the application that |
|
322 |
-opens them. These documents can be modified by malicious exit nodes, or by |
|
323 |
-someone who is trying to trick you into revealing your non-Tor IP address. If |
|
324 |
-you must work with DOC and/or PDF files, we strongly recommend using a |
|
325 |
-disconnected computer, a <a href="https://www.virtualbox.org/">VirtualBox</a> |
|
326 |
-free <a href="http://virtualboxes.org/">image</a> with networking disabled, or |
|
327 |
-<a href="http://tails.boum.org/">Tails</a>. |
|
321 |
+</p> |
|
328 | 322 |
|
329 | 323 |
</li> |
330 | 324 |
|
331 |
-<li> |
|
325 |
+<li><b>Use HTTPS versions of websites</b> |
|
332 | 326 |
|
327 |
+<p> |
|
333 | 328 |
Tor anonymizes the origin of your traffic, and it encrypts everything between |
334 | 329 |
you and the Tor network and everything inside the Tor network, but |
335 | 330 |
<a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it can't encrypt your traffic |
336 | 331 |
between the Tor network and its final destination.</a> To help ensure |
337 |
-privacy for this last leg, the Tor Browser Bundle includes |
|
338 |
-<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to encrypt |
|
339 |
-your communications with a number of major websites, but you should still |
|
332 |
+privacy for the last leg, the Tor Browser Bundle includes |
|
333 |
+<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force |
|
334 |
+the use of HTTPS with a number of major websites, but you should still |
|
340 | 335 |
watch the browser URL bar to ensure that websites you provide sensitive information |
341 | 336 |
to display a |
342 | 337 |
<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or |
343 | 338 |
green validation</a>, include <b>https://</b> in the URL bar, |
344 | 339 |
and display the proper name for the current website. |
340 |
+</p> |
|
341 |
+ |
|
342 |
+</li> |
|
343 |
+ |
|
344 |
+<li><b>Don't open documents downloaded through Tor while online</b> |
|
345 |
+ |
|
346 |
+<p> |
|
347 |
+ |
|
348 |
+The Tor Browser will warn you before automatically opening documents |
|
349 |
+that are handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>. |
|
350 |
+You should be very careful when downloading documents via Tor (especially DOC |
|
351 |
+and PDF files) as these documents can contain Internet resources that will be |
|
352 |
+downloaded outside of Tor by the application that opens them. These documents |
|
353 |
+can be modified by malicious exit nodes, or by a website who is trying to trick |
|
354 |
+you into revealing your non-Tor IP address. If you must work with DOC and/or |
|
355 |
+PDF files, we strongly recommend using a disconnected computer, a |
|
356 |
+<a href="https://www.virtualbox.org/">VirtualBox</a> free |
|
357 |
+<a href="http://virtualboxes.org/">image</a> with networking disabled, or |
|
358 |
+<a href="http://tails.boum.org/">Tails</a>. Under no circumstances is it safe to |
|
359 |
+use <a |
|
360 |
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
361 |
+and Tor</a> together. |
|
362 |
+ |
|
363 |
+</p> |
|
345 | 364 |
|
346 | 365 |
</li> |
347 | 366 |
|
348 |
-<li> |
|
367 |
+<li><b>Use bridges and/or find company</b> |
|
349 | 368 |
|
369 |
+<p> |
|
350 | 370 |
Tor tries to prevent attackers from learning what destinations you connect |
351 | 371 |
to. It doesn't prevent somebody watching your traffic from learning that |
352 | 372 |
you're using Tor. You can mitigate (but not fully resolve) the risk |
... | ... |
@@ -355,13 +375,11 @@ connecting directly to the public Tor network, but ultimately the best |
355 | 375 |
protection here is a social approach: the more Tor users there are near |
356 | 376 |
you and the more <a href="<page about/torusers>">diverse</a> their interests, |
357 | 377 |
the less dangerous it will be that you are one of them. |
378 |
+</p> |
|
358 | 379 |
|
359 | 380 |
</li> |
360 | 381 |
|
361 |
-<li> Do not use <a |
|
362 |
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
363 |
-and Tor</a> together. |
|
364 |
-</li> |
|
382 |
+ |
|
365 | 383 |
</ol> |
366 | 384 |
<br> |
367 | 385 |
<p> |
368 | 386 |