clean up the faq, address ticket 7287, remove polipo.
Andrew Lewman

Andrew Lewman commited on 2013-01-21 02:44:17
Zeige 1 geänderte Dateien mit 667 Einfügungen und 344 Löschungen.

... ...
@@ -17,7 +17,8 @@
17 17
     <p>General questions:</p>
18 18
     <ul>
19 19
     <li><a href="#WhatIsTor">What is Tor?</a></li>
20
-    <li><a href="#Torisdifferent">How is Tor different from other proxies?</a></li>
20
+    <li><a href="#Torisdifferent">How is Tor different from other
21
+proxies?</a></li>
21 22
     <li><a href="#CompatibleApplications">What programs can I use with
22 23
     Tor?</a></li>
23 24
     <li><a href="#WhyCalledTor">Why is it called Tor?</a></li>
... ...
@@ -41,10 +42,13 @@
41 42
     page?</a></li>
42 43
     <li><a href="#GetTor">Your website is blocked in my country. How
43 44
     do I download Tor?</a></li>
44
-    <li><a href="#CompileTorWindows">How do I compile Tor under Windows?</a></li>
45
-    <li><a href="#VirusFalsePositives">Why does my Tor executable appear to
45
+    <li><a href="#CompileTorWindows">How do I compile Tor under
46
+Windows?</a></li>
47
+    <li><a href="#VirusFalsePositives">Why does my Tor executable appear
48
+to
46 49
     have a virus or spyware?</a></li>
47
-    <li><a href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></li>
50
+    <li><a href="#LiveCD">Is there a LiveCD or other bundle that
51
+includes Tor?</a></li>
48 52
     </ul>
49 53
 
50 54
     <p>Tor Browser Bundle:</p>
... ...
@@ -59,14 +63,18 @@
59 63
     go?</a></li>
60 64
     <li><a href="#TBBOtherExtensions">Can I install other Firefox
61 65
     extensions?</a></li>
62
-    <li><a href="#TBBJavaScriptEnabled">Why is NoScript configured to allow JavaScript by default in the Tor Browser Bundle?  Isn't that unsafe?</a></li>
63
-    <li><a href="#TBBCanIBlockJS">I'm an expert!  (No, really!)  Can I configure NoScript to block JavaScript by default?</a></li>
66
+    <li><a href="#TBBJavaScriptEnabled">Why is NoScript configured to
67
+allow JavaScript by default in the Tor Browser Bundle?  Isn't that
68
+unsafe?</a></li>
69
+    <li><a href="#TBBCanIBlockJS">I'm an expert!  (No, really!)  Can I
70
+configure NoScript to block JavaScript by default?</a></li>
64 71
     <li><a href="#TBBOtherBrowser">I want to use Chrome/IE/Opera/etc
65 72
     with Tor.</a></li>
66 73
     <li><a href="#TBBCloseBrowser">I want to leave Tor Browser Bundle
67 74
     running but close the browser.</a></li>
68 75
 
69
-    <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or tells
76
+    <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or
77
+tells
70 78
     me I have spyware installed.</a></li>
71 79
     <li><a href="#GmailWarning">Gmail warns me that my account may have
72 80
     been compromised.</a></li>
... ...
@@ -82,7 +90,8 @@
82 90
     correctly.</a></li>
83 91
     <li><a href="#VidaliaPassword">Tor/Vidalia prompts for a password at
84 92
     start.</a></li>
85
-    <li><a href="#ChooseEntryExit">Can I control which nodes (or country)
93
+    <li><a href="#ChooseEntryExit">Can I control which nodes (or
94
+country)
86 95
     are used for entry/exit?</a></li>
87 96
     <li><a href="#FirewallPorts">My firewall only allows a few outgoing
88 97
     ports.</a></li>
... ...
@@ -90,13 +99,17 @@
90 99
 
91 100
     <p>Running a Tor relay:</p>
92 101
     <ul>
93
-    <li><a href="#RelayFlexible">How stable does my relay need to be?</a></li>
94
-    <li><a href="#ExitPolicies">I'd run a relay, but I don't want to deal
102
+    <li><a href="#RelayFlexible">How stable does my relay need to
103
+be?</a></li>
104
+    <li><a href="#ExitPolicies">I'd run a relay, but I don't want to
105
+deal
95 106
     with abuse issues.</a></li>
96 107
     <li><a href="#RelayOrBridge">Should I be a normal relay or bridge
97 108
     relay?</a></li>
98
-    <li><a href="#MultipleRelays">I want to run more than one relay.</a></li>
99
-    <li><a href="#RelayMemory">Why is my Tor relay using so much memory?</a></li>
109
+    <li><a href="#MultipleRelays">I want to run more than one
110
+relay.</a></li>
111
+    <li><a href="#RelayMemory">Why is my Tor relay using so much
112
+memory?</a></li>
100 113
     <li><a href="#WhyNotNamed">Why is my Tor relay not named?</a></li>
101 114
     <li><a href="#RelayDonations">Can I donate for a relay rather than
102 115
     run my own?</a></li>
... ...
@@ -106,7 +119,8 @@
106 119
 
107 120
     <p>Anonymity and Security:</p>
108 121
     <ul>
109
-    <li><a href="#KeyManagement">Tell me about all the keys Tor uses.</a></li>
122
+    <li><a href="#KeyManagement">Tell me about all the keys Tor
123
+uses.</a></li>
110 124
     <li><a href="#EntryGuards">What are Entry Guards?</a></li>
111 125
     </ul>
112 126
 
... ...
@@ -114,7 +128,8 @@
114 128
     <ul>
115 129
     <li><a href="#EverybodyARelay">You should make every Tor user be a
116 130
     relay.</a></li>
117
-    <li><a href="#TransportIPnotTCP">You should transport all IP packets,
131
+    <li><a href="#TransportIPnotTCP">You should transport all IP
132
+packets,
118 133
     not just TCP packets.</a></li>
119 134
     <li><a href="#HideExits">You should hide the list of Tor relays,
120 135
     so people can't block the exits.</a></li>
... ...
@@ -122,12 +137,14 @@
122 137
 
123 138
     <p>Abuse:</p>
124 139
     <ul>
125
-    <li><a href="#Criminals">Doesn't Tor enable criminals to do bad things?</a></li>
140
+    <li><a href="#Criminals">Doesn't Tor enable criminals to do bad
141
+things?</a></li>
126 142
     <li><a href="#RespondISP">How do I respond to my ISP about my exit
127 143
     relay?</a></li>
128 144
     </ul>
129 145
 
130
-    <p>For other questions not yet on this version of the FAQ, see the <a
146
+    <p>For other questions not yet on this version of the FAQ, see the
147
+<a
131 148
     href="<wikifaq>">wiki FAQ</a> for now.</p>
132 149
 
133 150
     <hr>
... ...
@@ -142,71 +159,110 @@
142 159
     </p>
143 160
 
144 161
     <p>
145
-    The Tor software is a program you can run on your computer that helps keep
146
-    you safe on the Internet. Tor protects you by bouncing your communications
162
+    The Tor software is a program you can run on your computer that
163
+helps keep
164
+    you safe on the Internet. Tor protects you by bouncing your
165
+communications
147 166
     around a distributed network of relays run by volunteers all around
148
-    the world: it prevents somebody watching your Internet connection from
167
+    the world: it prevents somebody watching your Internet connection
168
+from
149 169
     learning what sites you visit, and it prevents the sites you visit
150
-    from learning your physical location. This set of volunteer relays is
151
-    called the Tor network. You can read more about how Tor works on the <a
170
+    from learning your physical location. This set of volunteer relays
171
+is
172
+    called the Tor network. You can read more about how Tor works on the
173
+<a
152 174
     href="<page about/overview>">overview page</a>.
153 175
     </p>
154 176
 
155 177
     <p>
156
-    The Tor Project is a non-profit (charity) organization that maintains
178
+    The Tor Project is a non-profit (charity) organization that
179
+maintains
157 180
     and develops the Tor software.
158 181
     </p>
159 182
 
160 183
     <hr>
161 184
 
162 185
     <a id="Torisdifferent"></a>
163
-    <h3><a class="anchor" href="#Torisdifferent">How is Tor different from other proxies?</a></h3>
164
-    <p>
165
-    A typical proxy provider sets up a server somewhere on the Internet and
166
-allows you to use it to relay your traffic.  This creates a simple, easy to
167
-maintain architecture.  The users all enter and leave through the same server.
168
-The provider may charge for use of the proxy, or fund their costs through
169
-advertisements on the server.  In the simplest configuration, you don't have to
170
-install anything.  You just have to point your browser at their proxy server.
171
-Simple proxy providers are fine solutions if you do not want protections for
172
-your privacy and anonymity online and you trust the provider from doing bad
173
-things.  Some simple proxy providers use SSL to secure your connection to them.
174
-This may protect you against local eavesdroppers, such as those at a cafe with
186
+    <h3><a class="anchor" href="#Torisdifferent">How is Tor different
187
+from other proxies?</a></h3>
188
+    <p>
189
+    A typical proxy provider sets up a server somewhere on the Internet
190
+and
191
+allows you to use it to relay your traffic.  This creates a simple, easy
192
+to
193
+maintain architecture.  The users all enter and leave through the same
194
+server.
195
+The provider may charge for use of the proxy, or fund their costs
196
+through
197
+advertisements on the server.  In the simplest configuration, you don't
198
+have to
199
+install anything.  You just have to point your browser at their proxy
200
+server.
201
+Simple proxy providers are fine solutions if you do not want protections
202
+for
203
+your privacy and anonymity online and you trust the provider from doing
204
+bad
205
+things.  Some simple proxy providers use SSL to secure your connection
206
+to them.
207
+This may protect you against local eavesdroppers, such as those at a
208
+cafe with
175 209
 free wifi Internet.
176 210
     </p>
177 211
     <p>
178
-    Simple proxy providers also create a single point of failure.  The provider
179
-knows who you are and where you browse on the Internet.  They can see your
180
-traffic as it passes through their server.  In some cases, they can even see
212
+    Simple proxy providers also create a single point of failure.  The
213
+provider
214
+knows who you are and where you browse on the Internet.  They can see
215
+your
216
+traffic as it passes through their server.  In some cases, they can even
217
+see
181 218
 inside your
182
-encrypted traffic as they relay it to your banking site or to ecommerce stores.
219
+encrypted traffic as they relay it to your banking site or to ecommerce
220
+stores.
183 221
 You have to trust the provider isn't doing any number of things, such as
184
-watching your traffic, injecting their own advertisements into your traffic
222
+watching your traffic, injecting their own advertisements into your
223
+traffic
185 224
 stream, and recording your personal details.
186 225
     </p>
187 226
     <p>
188
-    Tor passes your traffic through at least 3 different servers before sending
189
-it on to the destination. Because there's a separate layer of encryption for
190
-each of the three relays, Tor does not modify, or even know, what you are
191
-sending into it.  It merely relays your traffic, completely encrypted through
192
-the Tor network and has it pop out somewhere else in the world, completely
193
-intact.  The Tor client is required because we assume you trust your local
194
-computer.  The Tor client manages the encryption and the path chosen through
195
-the network.  The relays located all over the world merely pass encrypted
227
+    Tor passes your traffic through at least 3 different servers before
228
+sending
229
+it on to the destination. Because there's a separate layer of encryption
230
+for
231
+each of the three relays, Tor does not modify, or even know, what you
232
+are
233
+sending into it.  It merely relays your traffic, completely encrypted
234
+through
235
+the Tor network and has it pop out somewhere else in the world,
236
+completely
237
+intact.  The Tor client is required because we assume you trust your
238
+local
239
+computer.  The Tor client manages the encryption and the path chosen
240
+through
241
+the network.  The relays located all over the world merely pass
242
+encrypted
196 243
 packets between themselves.</p>
197 244
     <p>
198 245
     <dl>
199
-    <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of
200
-three servers can see encrypted Tor traffic coming from your computer.  It
201
-still doesn't know who you are and what you are doing over Tor.  It merely sees
202
-"This IP address is using Tor".  Tor is not illegal anywhere in the world, so
203
-using Tor by itself is fine.  You are still protected from this node figuring
246
+    <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad
247
+first of
248
+three servers can see encrypted Tor traffic coming from your computer.
249
+It
250
+still doesn't know who you are and what you are doing over Tor.  It
251
+merely sees
252
+"This IP address is using Tor".  Tor is not illegal anywhere in the
253
+world, so
254
+using Tor by itself is fine.  You are still protected from this node
255
+figuring
204 256
 out who you are and where you are going on the Internet.</dd>
205
-    <dt>Can't the third server see my traffic?</dt><dd>Possibly.  A bad third
206
-of three servers can see the traffic you sent into Tor.  It won't know who sent
257
+    <dt>Can't the third server see my traffic?</dt><dd>Possibly.  A bad
258
+third
259
+of three servers can see the traffic you sent into Tor.  It won't know
260
+who sent
207 261
 this traffic.  If you're using encryption, such as visiting a bank or
208
-e-commerce website, or encrypted mail connections, etc, it will only know the
209
-destination.  It won't be able to see the data inside the traffic stream.  You
262
+e-commerce website, or encrypted mail connections, etc, it will only
263
+know the
264
+destination.  It won't be able to see the data inside the traffic
265
+stream.  You
210 266
 are still protected from this node figuring out who you are and if using
211 267
 encryption, what data you're sending to the destination.</dd>
212 268
     </dl>
... ...
@@ -215,25 +271,34 @@ encryption, what data you're sending to the destination.</dd>
215 271
     <hr>
216 272
 
217 273
     <a id="CompatibleApplications"></a>
218
-    <h3><a class="anchor" href="#CompatibleApplications">What programs can I use with Tor?</a></h3>
274
+    <h3><a class="anchor" href="#CompatibleApplications">What programs
275
+can I use with Tor?</a></h3>
219 276
 
220 277
     <p>
221
-    There are two pieces to "Torifying" a program: connection-level anonymity
222
-    and application-level anonymity. Connection-level anonymity focuses on
223
-    making sure the application's Internet connections get sent through Tor.
278
+    There are two pieces to "Torifying" a program: connection-level
279
+anonymity
280
+    and application-level anonymity. Connection-level anonymity focuses
281
+on
282
+    making sure the application's Internet connections get sent through
283
+Tor.
224 284
     This step is normally done by configuring
225 285
     the program to use your Tor client as a "socks" proxy, but there are
226
-    other ways to do it too. For application-level anonymity, you need to
227
-    make sure that the information the application sends out doesn't hurt
228
-    your privacy. (Even if the connections are being routed through Tor, you
229
-    still don't want to include sensitive information like your name.) This
286
+    other ways to do it too. For application-level anonymity, you need
287
+to
288
+    make sure that the information the application sends out doesn't
289
+hurt
290
+    your privacy. (Even if the connections are being routed through Tor,
291
+you
292
+    still don't want to include sensitive information like your name.)
293
+This
230 294
     second step needs to be done on a program-by-program basis, which is
231 295
     why we don't yet recommend very many programs for safe use with Tor.
232 296
     </p>
233 297
 
234 298
     <p>
235 299
     Most of our work so far has focused on the Firefox web browser. The
236
-    bundles on the <a href="<page download/download>">download page</a> automatically
300
+    bundles on the <a href="<page download/download>">download page</a>
301
+automatically
237 302
     install the <a href="<page torbutton/index>">Torbutton Firefox
238 303
     extension</a> if you have Firefox installed. As of version 1.2.0,
239 304
     Torbutton now takes care of a lot of the connection-level and
... ...
@@ -255,7 +320,8 @@ encryption, what data you're sending to the destination.</dd>
255 320
     <hr>
256 321
 
257 322
     <a id="WhyCalledTor"></a>
258
-    <h3><a class="anchor" href="#WhyCalledTor">Why is it called Tor?</a></h3>
323
+    <h3><a class="anchor" href="#WhyCalledTor">Why is it called
324
+Tor?</a></h3>
259 325
 
260 326
     <p>
261 327
     Because Tor is the onion routing network. When we were starting the
... ...
@@ -272,28 +338,35 @@ encryption, what data you're sending to the destination.</dd>
272 338
     </p>
273 339
 
274 340
     <p>
275
-    Note: even though it originally came from an acronym, Tor is not spelled
341
+    Note: even though it originally came from an acronym, Tor is not
342
+spelled
276 343
     "TOR". Only the first letter is capitalized. In fact, we can usually
277
-    spot people who haven't read any of our website (and have instead learned
278
-    everything they know about Tor from news articles) by the fact that they
344
+    spot people who haven't read any of our website (and have instead
345
+learned
346
+    everything they know about Tor from news articles) by the fact that
347
+they
279 348
     spell it wrong.
280 349
     </p>
281 350
 
282 351
     <hr>
283 352
 
284 353
     <a id="Backdoor"></a>
285
-    <h3><a class="anchor" href="#Backdoor">Is there a backdoor in Tor?</a></h3>
354
+    <h3><a class="anchor" href="#Backdoor">Is there a backdoor in
355
+Tor?</a></h3>
286 356
 
287 357
     <p>
288
-    There is absolutely no backdoor in Tor. Nobody has asked us to put one
289
-    in, and we know some smart lawyers who say that it's unlikely that anybody
358
+    There is absolutely no backdoor in Tor. Nobody has asked us to put
359
+one
360
+    in, and we know some smart lawyers who say that it's unlikely that
361
+anybody
290 362
     will try to make us add one in our jurisdiction (U.S.). If they do
291 363
     ask us, we will fight them, and (the lawyers say) probably win.
292 364
     </p>
293 365
 
294 366
     <p>
295 367
     We think that putting a backdoor in Tor would be tremendously
296
-    irresponsible to our users, and a bad precedent for security software
368
+    irresponsible to our users, and a bad precedent for security
369
+software
297 370
     in general. If we ever put a deliberate backdoor in our security
298 371
     software, it would ruin our professional reputations. Nobody would
299 372
     trust our software ever again &mdash; for excellent reason!
... ...
@@ -302,8 +375,10 @@ encryption, what data you're sending to the destination.</dd>
302 375
     <p>
303 376
     But that said, there are still plenty of subtle attacks
304 377
     people might try. Somebody might impersonate us, or break into our
305
-    computers, or something like that. Tor is open source, and you should
306
-    always check the source (or at least the diffs since the last release)
378
+    computers, or something like that. Tor is open source, and you
379
+should
380
+    always check the source (or at least the diffs since the last
381
+release)
307 382
     for suspicious things. If we (or the distributors) don't give you
308 383
     source, that's a sure sign something funny might be going on. You
309 384
     should also check the <a href="<page docs/verifying-signatures>">PGP
... ...
@@ -313,35 +388,43 @@ encryption, what data you're sending to the destination.</dd>
313 388
 
314 389
     <p>
315 390
     Also, there might be accidental bugs in Tor that could affect your
316
-    anonymity. We periodically find and fix anonymity-related bugs, so make
391
+    anonymity. We periodically find and fix anonymity-related bugs, so
392
+make
317 393
     sure you keep your Tor versions up-to-date.
318 394
     </p>
319 395
 
320 396
     <hr>
321 397
 
322 398
     <a id="DistributingTor"></a>
323
-    <h3><a class="anchor" href="#DistributingTor">Can I distribute Tor?</a></h3>
399
+    <h3><a class="anchor" href="#DistributingTor">Can I distribute
400
+Tor?</a></h3>
324 401
 
325 402
     <p>
326 403
     Yes.
327 404
     </p>
328 405
 
329 406
     <p>
330
-    The Tor software is <a href="https://www.fsf.org/">free software</a>. This
331
-    means we give you the rights to redistribute the Tor software, either
332
-    modified or unmodified, either for a fee or gratis. You don't have to
407
+    The Tor software is <a href="https://www.fsf.org/">free
408
+software</a>. This
409
+    means we give you the rights to redistribute the Tor software,
410
+either
411
+    modified or unmodified, either for a fee or gratis. You don't have
412
+to
333 413
     ask us for specific permission.
334 414
     </p>
335 415
 
336 416
     <p>
337
-    However, if you want to redistribute the Tor software you must follow our
417
+    However, if you want to redistribute the Tor software you must
418
+follow our
338 419
     <a href="<gitblob>LICENSE">LICENSE</a>.
339
-    Essentially this means that you need to include our LICENSE file along
420
+    Essentially this means that you need to include our LICENSE file
421
+along
340 422
     with whatever part of the Tor software you're distributing.
341 423
     </p>
342 424
 
343 425
     <p>
344
-    Most people who ask us this question don't want to distribute just the
426
+    Most people who ask us this question don't want to distribute just
427
+the
345 428
     Tor software, though. They want to distribute the <a
346 429
     href="https://www.torproject.org/projects/torbrowser.html.en">Tor
347 430
     Browser</a>. This includes <a
... ...
@@ -359,39 +442,52 @@ encryption, what data you're sending to the destination.</dd>
359 442
     </p>
360 443
 
361 444
     <p>
362
-    Also, you should make sure not to confuse your readers about what Tor is,
363
-    who makes it, and what properties it provides (and doesn't provide). See
364
-    our <a href="<page docs/trademark-faq>">trademark FAQ</a> for details.
445
+    Also, you should make sure not to confuse your readers about what
446
+Tor is,
447
+    who makes it, and what properties it provides (and doesn't provide).
448
+See
449
+    our <a href="<page docs/trademark-faq>">trademark FAQ</a> for
450
+details.
365 451
     </p>
366 452
 
367 453
     <p>
368 454
     Lastly, you should realize that we release new versions of the
369 455
     Tor software frequently, and sometimes we make backward incompatible
370
-    changes. So if you distribute a particular version of the Tor software, it
371
-    may not be supported &mdash; or even work &mdash; six months later. This
456
+    changes. So if you distribute a particular version of the Tor
457
+software, it
458
+    may not be supported &mdash; or even work &mdash; six months later.
459
+This
372 460
     is a fact of life for all security software under heavy development.
373 461
     </p>
374 462
 
375 463
     <hr>
376 464
 
377 465
     <a id="SupportMail"></a>
378
-    <h3><a class="anchor" href="#SupportMail">How can I get support?</a></h3>
466
+    <h3><a class="anchor" href="#SupportMail">How can I get
467
+support?</a></h3>
379 468
 
380 469
     <p>Your best bet is to first try the following:</p>
381 470
     <ol>
382 471
     <li>Read through this <a href="<page docs/faq>">FAQ</a>.</li>
383
-    <li>Read through the <a href="<page docs/documentation>">documentation</a>.</li>
472
+    <li>Read through the <a href="<page
473
+docs/documentation>">documentation</a>.</li>
384 474
     <li>Read through the <a
385
-    href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk">tor-talk
475
+
476
+href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk">
477
+tor-talk
386 478
     archives</a> and see if your question is already answered.</li>
387
-    <li>Join our <a href="ircs://irc.torproject.org#tor">irc channel</a> and
479
+    <li>Join our <a href="ircs://irc.torproject.org#tor">irc channel</a>
480
+and
388 481
     state the issue and wait for help.</li>
389 482
     <li>Send an email to <a
483
+
390 484
 href="mailto:help@rt.torproject.org">help@rt.torproject.org</a>.</li>
391
-    <li>If all else fails, try <a href="<page about/contact>">contacting us</a> directly.</li>
485
+    <li>If all else fails, try <a href="<page about/contact>">contacting
486
+us</a> directly.</li>
392 487
     </ol>
393 488
 
394
-    <p>If you find your answer, please stick around on the IRC channel or the
489
+    <p>If you find your answer, please stick around on the IRC channel
490
+or the
395 491
     mailing list to help others who were once in your position.</p>
396 492
 
397 493
     <hr>
... ...
@@ -420,24 +516,31 @@ encryption, what data you're sending to the destination.</dd>
420 516
     </p>
421 517
 
422 518
     <p>
423
-    Before we answer, though, you should realize that Tor is never going to
424
-    be blazing fast. Your traffic is bouncing through volunteers' computers
425
-    in various parts of the world, and some bottlenecks and network latency
519
+    Before we answer, though, you should realize that Tor is never going
520
+to
521
+    be blazing fast. Your traffic is bouncing through volunteers'
522
+computers
523
+    in various parts of the world, and some bottlenecks and network
524
+latency
426 525
     will always be present. You shouldn't expect to see university-style
427 526
     bandwidth through Tor.
428 527
     </p>
429 528
 
430 529
     <p>
431
-    But that doesn't mean that it can't be improved. The current Tor network
432
-    is quite small compared to the number of people trying to use it, and
433
-    many of these users don't understand or care that Tor can't currently
530
+    But that doesn't mean that it can't be improved. The current Tor
531
+network
532
+    is quite small compared to the number of people trying to use it,
533
+and
534
+    many of these users don't understand or care that Tor can't
535
+currently
434 536
     handle file-sharing traffic load.
435 537
     </p>
436 538
 
437 539
     <p>
438 540
     For the much more in-depth answer, see <a
439 541
     href="<blog>why-tor-is-slow">Roger's blog
440
-    post on the topic</a>, which includes both a detailed PDF and a video
542
+    post on the topic</a>, which includes both a detailed PDF and a
543
+video
441 544
     to go with it.
442 545
     </p>
443 546
 
... ...
@@ -448,60 +551,64 @@ encryption, what data you're sending to the destination.</dd>
448 551
     <ul>
449 552
 
450 553
     <li>
451
-    <a href="<page docs/tor-doc-relay>">Configure your Tor to relay traffic
452
-    for others</a>. Help make the Tor network large enough that we can handle
554
+    <a href="<page docs/tor-doc-relay>">Configure your Tor to relay
555
+traffic
556
+    for others</a>. Help make the Tor network large enough that we can
557
+handle
453 558
     all the users who want privacy and security on the Internet.
454 559
     </li>
455 560
 
456 561
     <li>
457
-    <a href="<page projects/vidalia>">Help us make Tor more usable</a>. We
562
+    <a href="<page projects/vidalia>">Help us make Tor more usable</a>.
563
+We
458 564
     especially need people to help make it easier to configure your Tor
459 565
     as a relay. Also, we need help with clear simple documentation to
460 566
     walk people through setting it up.
461 567
     </li>
462 568
 
463 569
     <li>
464
-    There are some bottlenecks in the current Tor network. Help us design
465
-    experiments to track down and demonstrate where the problems are, and
570
+    There are some bottlenecks in the current Tor network. Help us
571
+design
572
+    experiments to track down and demonstrate where the problems are,
573
+and
466 574
     then we can focus better on fixing them.
467 575
     </li>
468 576
 
469
-    <li>
470
-    There are some steps that individuals
471
-    can take to improve their Tor performance. <a
472
-    href="<wiki>doc/FireFoxTorPerf">You
473
-    can configure your Firefox to handle Tor better</a>, <a
474
-    href="http://www.pps.jussieu.fr/~jch/software/polipo/tor.html">you can use
475
-    Polipo with Tor</a>, or you can try <a href="<page download/download>">upgrading
476
-    to the latest version of Tor</a>.  If this works well, please help by
477
-    documenting what you did, and letting us know about it.
478
-    </li>
479
-
480 577
     <li>
481 578
     Tor needs some architectural changes too. One important change is to
482
-    start providing <a href="#EverybodyARelay">better service to people who
483
-    relay traffic</a>. We're working on this, and we'll finish faster if we
579
+    start providing <a href="#EverybodyARelay">better service to people
580
+who
581
+    relay traffic</a>. We're working on this, and we'll finish faster if
582
+we
484 583
     get to spend more time on it.
485 584
     </li>
486 585
 
487 586
     <li>
488
-    Help do other things so we can do the hard stuff. Please take a moment
489
-    to figure out what your skills and interests are, and then <a href="<page
587
+    Help do other things so we can do the hard stuff. Please take a
588
+moment
589
+    to figure out what your skills and interests are, and then <a
590
+href="<page
490 591
     getinvolved/volunteer>">look at our volunteer page</a>.
491 592
     </li>
492 593
 
493 594
     <li>
494
-    Help find sponsors for Tor. Do you work at a company or government agency
595
+    Help find sponsors for Tor. Do you work at a company or government
596
+agency
495 597
     that uses Tor or has a use for Internet privacy, e.g. to browse the
496
-    competition's websites discreetly, or to connect back to the home servers
497
-    when on the road without revealing affiliations? If your organization has
498
-    an interest in keeping the Tor network working, please contact them about
499
-    supporting Tor. Without sponsors, Tor is going to become even slower.
598
+    competition's websites discreetly, or to connect back to the home
599
+servers
600
+    when on the road without revealing affiliations? If your
601
+organization has
602
+    an interest in keeping the Tor network working, please contact them
603
+about
604
+    supporting Tor. Without sponsors, Tor is going to become even
605
+slower.
500 606
     </li>
501 607
 
502 608
     <li>
503 609
     If you can't help out with any of the above, you can still help out
504
-    individually by <a href="<page donate/donate>">donating a bit of money to the
610
+    individually by <a href="<page donate/donate>">donating a bit of
611
+money to the
505 612
     cause</a>. It adds up!
506 613
     </li>
507 614
 
... ...
@@ -510,7 +617,8 @@ encryption, what data you're sending to the destination.</dd>
510 617
     <hr>
511 618
 
512 619
     <a id="Funding"></a>
513
-    <h3><a class="anchor" href="#Funding">What would The Tor Project do with more funding?</a></h3>
620
+    <h3><a class="anchor" href="#Funding">What would The Tor Project do
621
+with more funding?</a></h3>
514 622
 
515 623
     <p>
516 624
     The Tor network's <a
... ...
@@ -524,7 +634,8 @@ encryption, what data you're sending to the destination.</dd>
524 634
     </p>
525 635
 
526 636
     <p>
527
-    There are six main development/maintenance pushes that need attention:
637
+    There are six main development/maintenance pushes that need
638
+attention:
528 639
     </p>
529 640
 
530 641
     <ul>
... ...
@@ -532,38 +643,52 @@ encryption, what data you're sending to the destination.</dd>
532 643
     <li>
533 644
     Scalability: We need to keep scaling and decentralizing the Tor
534 645
     architecture so it can handle thousands of relays and millions of
535
-    users. The upcoming stable release is a major improvement, but there's
646
+    users. The upcoming stable release is a major improvement, but
647
+there's
536 648
     lots more to be done next in terms of keeping Tor fast and stable.
537 649
     </li>
538 650
 
539 651
     <li>
540
-    User support: With this many users, a lot of people are asking questions
541
-    all the time, offering to help out with things, and so on. We need good
542
-    clean docs, and we need to spend some effort coordinating volunteers.
652
+    User support: With this many users, a lot of people are asking
653
+questions
654
+    all the time, offering to help out with things, and so on. We need
655
+good
656
+    clean docs, and we need to spend some effort coordinating
657
+volunteers.
543 658
     </li>
544 659
 
545 660
     <li>
546
-    Relay support: the Tor network is run by volunteers, but they still need
661
+    Relay support: the Tor network is run by volunteers, but they still
662
+need
547 663
     attention with prompt bug fixes, explanations when things go wrong,
548
-    reminders to upgrade, and so on. The network itself is a commons, and
549
-    somebody needs to spend some energy making sure the relay operators stay
550
-    happy. We also need to work on stability on some platforms &mdash; e.g.,
664
+    reminders to upgrade, and so on. The network itself is a commons,
665
+and
666
+    somebody needs to spend some energy making sure the relay operators
667
+stay
668
+    happy. We also need to work on stability on some platforms &mdash;
669
+e.g.,
551 670
     Tor relays have problems on Win XP currently.
552 671
     </li>
553 672
 
554 673
     <li>
555
-    Usability: Beyond documentation, we also need to work on usability of the
556
-    software itself. This includes installers, clean GUIs, easy configuration
557
-    to interface with other applications, and generally automating all of
558
-    the difficult and confusing steps inside Tor. We've got a start on this
559
-    with the <a href="<page projects/vidalia>">Vidalia GUI</a>, but much more work
674
+    Usability: Beyond documentation, we also need to work on usability
675
+of the
676
+    software itself. This includes installers, clean GUIs, easy
677
+configuration
678
+    to interface with other applications, and generally automating all
679
+of
680
+    the difficult and confusing steps inside Tor. We've got a start on
681
+this
682
+    with the <a href="<page projects/vidalia>">Vidalia GUI</a>, but much
683
+more work
560 684
     remains &mdash; usability for privacy software has never been easy.
561 685
     </li>
562 686
 
563 687
     <li>
564 688
     Incentives: We need to work on ways to encourage people to configure
565 689
     their Tors as relays and exit nodes rather than just clients.
566
-    <a href="#EverybodyARelay">We need to make it easy to become a relay,
690
+    <a href="#EverybodyARelay">We need to make it easy to become a
691
+relay,
567 692
     and we need to give people incentives to do it.</a>
568 693
     </li>
569 694
 
... ...
@@ -572,9 +697,12 @@ encryption, what data you're sending to the destination.</dd>
572 697
     of surprises and gotchas. In our copious free time, we
573 698
     also help run top anonymity and privacy conferences like <a
574 699
     href="http://petsymposium.org/">PETS</a>. We've identified a set of
575
-    critical <a href="<page getinvolved/volunteer>#Research">Tor research questions</a>
576
-    that will help us figure out how to make Tor secure against the variety of
577
-    attacks out there. Of course, there are more research questions waiting
700
+    critical <a href="<page getinvolved/volunteer>#Research">Tor
701
+research questions</a>
702
+    that will help us figure out how to make Tor secure against the
703
+variety of
704
+    attacks out there. Of course, there are more research questions
705
+waiting
578 706
     behind these.
579 707
     </li>
580 708
 
... ...
@@ -582,9 +710,11 @@ encryption, what data you're sending to the destination.</dd>
582 710
 
583 711
     <p>
584 712
     We're continuing to move forward on all of these, but at this rate
585
-    <a href="#WhySlow">the Tor network is growing faster than the developers
713
+    <a href="#WhySlow">the Tor network is growing faster than the
714
+developers
586 715
     can keep up</a>.
587
-    Now would be an excellent time to add a few more developers to the effort
716
+    Now would be an excellent time to add a few more developers to the
717
+effort
588 718
     so we can continue to grow the network.
589 719
     </p>
590 720
 
... ...
@@ -594,23 +724,30 @@ encryption, what data you're sending to the destination.</dd>
594 724
     </p>
595 725
 
596 726
     <p>
597
-    We are proud to have <a href="<page about/sponsors>">sponsorship and support</a>
598
-    from the Omidyar Network, the International Broadcasting Bureau, Bell
599
-    Security Solutions, the Electronic Frontier Foundation, several government
727
+    We are proud to have <a href="<page about/sponsors>">sponsorship and
728
+support</a>
729
+    from the Omidyar Network, the International Broadcasting Bureau,
730
+Bell
731
+    Security Solutions, the Electronic Frontier Foundation, several
732
+government
600 733
     agencies and research groups, and hundreds of private contributors.
601 734
     </p>
602 735
 
603 736
     <p>
604
-    However, this support is not enough to keep Tor abreast of changes in the
605
-    Internet privacy landscape. Please <a href="<page donate/donate>">donate</a>
606
-    to the project, or <a href="<page about/contact>">contact</a> our executive
737
+    However, this support is not enough to keep Tor abreast of changes
738
+in the
739
+    Internet privacy landscape. Please <a href="<page
740
+donate/donate>">donate</a>
741
+    to the project, or <a href="<page about/contact>">contact</a> our
742
+executive
607 743
     director for information on making grants or major donations.
608 744
     </p>
609 745
 
610 746
     <hr>
611 747
 
612 748
     <a id="Metrics"></a>
613
-    <h3><a class="anchor" href="#Metrics">How many people use Tor? How many relays or exit nodes are there?</a></h3>
749
+    <h3><a class="anchor" href="#Metrics">How many people use Tor? How
750
+many relays or exit nodes are there?</a></h3>
614 751
 
615 752
     <p>All this and more about measuring Tor can be found at the <a
616 753
     href="https://metrics.torproject.org/">Tor Metrics Portal</a>.</p>
... ...
@@ -622,9 +759,11 @@ certificate fingerprints for Tor's various websites?</a></h3>
622 759
     <p>
623 760
     <pre>
624 761
     *.torproject.org SSL certificate from Digicert:
625
-    The serial number is: 02:DA:41:04:89:A5:FD:A2:B5:DB:DB:F8:ED:15:0D:BE
762
+    The serial number is:
763
+02:DA:41:04:89:A5:FD:A2:B5:DB:DB:F8:ED:15:0D:BE
626 764
     The SHA-1 fingerprint is: a7e70f8a648fe04a9677f13eedf6f91b5f7f2e25
627
-    The SHA-256 fingerprint is: 23b854af6b96co224fd173382c520b46fa94f2d4e7238893f63ad2d783e27b4b
765
+    The SHA-256 fingerprint is:
766
+23b854af6b96co224fd173382c520b46fa94f2d4e7238893f63ad2d783e27b4b
628 767
 
629 768
     blog.torproject.org SSL certificate from RapidSSL:
630 769
     The serial number is: 00:EF:A3
... ...
@@ -634,31 +773,47 @@ certificate fingerprints for Tor's various websites?</a></h3>
634 773
     <hr>
635 774
 
636 775
     <a id="HowUninstallTor"></a>
637
-    <h3><a class="anchor" href="#HowUninstallTor">How do I uninstall Tor?</a></h3>
776
+    <h3><a class="anchor" href="#HowUninstallTor">How do I uninstall
777
+Tor?</a></h3>
778
+
779
+    <p>
780
+    Tor Browser does not install itself in the classic sense of
781
+applications. You just simply delete the folder or directory named "Tor
782
+Browser" and it is removed from your system.
783
+    </p>
638 784
 
639 785
     <p>
640
-    This depends entirely on how you installed it and which operating system you
641
-    have. If you installed a package, then hopefully your package has a way to
642
-    uninstall itself. The Windows packages include uninstallers. The proper way to
643
-    completely remove Tor, Vidalia, Torbutton for Firefox, and Polipo on any
786
+    If this is not related to Tor Browser, uninstallation depends
787
+entirely on how you installed it and which operating system you
788
+    have. If you installed a package, then hopefully your package has a
789
+way to
790
+    uninstall itself. The Windows packages include uninstallers. The
791
+proper way to
792
+    completely remove Tor, Vidalia, and Torbutton for Firefox on any
644 793
 version of Windows is as follows:
645 794
     </p>
646 795
 
647 796
     <ol>
648
-    <li>In your taskbar, right click on Vidalia (the green onion or the black head)
797
+    <li>In your taskbar, right click on Vidalia (the green onion or the
798
+black head)
649 799
     and choose exit.</li>
650
-    <li>Right click on the taskbar to bring up TaskManager. Look for tor.exe in the
651
-    Process List. If it's running, right click and choose End Process.</li>
652
-    <li>Click the Start button, go to Programs, go to Vidalia, choose Uninstall.
653
-    This will remove the Vidalia bundle, which includes Tor and Polipo.</li>
654
-    <li>Start Firefox. Go to the Tools menu, choose Add-ons. Select Torbutton.
800
+    <li>Right click on the taskbar to bring up TaskManager. Look for
801
+tor.exe in the
802
+    Process List. If it's running, right click and choose End
803
+Process.</li>
804
+    <li>Click the Start button, go to Programs, go to Vidalia, choose
805
+Uninstall.
806
+    This will remove the Vidalia bundle, which includes Tor.</li>
807
+    <li>Start Firefox. Go to the Tools menu, choose Add-ons. Select
808
+Torbutton.
655 809
     Click the Uninstall button.</li>
656 810
     </ol>
657 811
 
658 812
     <p>
659 813
     If you do not follow these steps (for example by trying to uninstall
660
-    Vidalia, Tor, and Polipo while they are still running), you will need to
661
-    reboot and manually remove the directory "Program Files\Vidalia Bundle".
814
+    Vidalia and Tor while they are still running), you will need to
815
+    reboot and manually remove the directory "Program Files\Vidalia
816
+Bundle".
662 817
     </p>
663 818
 
664 819
     <p>
... ...
@@ -667,24 +822,29 @@ certificate fingerprints for Tor's various websites?</a></h3>
667 822
     </p>
668 823
 
669 824
     <p>
670
-    If you installed by source, I'm afraid there is no easy uninstall method. But
671
-    on the bright side, by default it only installs into /usr/local/ and it should
825
+    If you installed by source, I'm afraid there is no easy uninstall
826
+method. But
827
+    on the bright side, by default it only installs into /usr/local/ and
828
+it should
672 829
     be pretty easy to notice things there.
673 830
     </p>
674 831
 
675 832
     <hr>
676 833
 
677 834
     <a id="PGPSigs"></a>
678
-    <h3><a class="anchor" href="#PGPSigs">What are these "sig" files on the download page?</a></h3>
835
+    <h3><a class="anchor" href="#PGPSigs">What are these "sig" files on
836
+the download page?</a></h3>
679 837
 
680 838
     <p>
681
-    These are PGP signatures, so you can verify that the file you've downloaded is
839
+    These are PGP signatures, so you can verify that the file you've
840
+downloaded is
682 841
     exactly the one that we intended you to get.
683 842
     </p>
684 843
 
685 844
     <p>
686 845
     Please read the <a
687
-    href="<page docs/verifying-signatures>">verifying signatures</a> page for details.
846
+    href="<page docs/verifying-signatures>">verifying signatures</a>
847
+page for details.
688 848
     </p>
689 849
 
690 850
 <hr>
... ...
@@ -698,7 +858,8 @@ Some government or corporate firewalls censor connections to Tor's
698 858
 website. In those cases, you have three options. First, get it from
699 859
 a friend &mdash; the <a href="<page projects/torbrowser>">Tor Browser
700 860
 Bundle</a> fits nicely on a USB key. Second, find the <a
701
-href="https://encrypted.google.com/search?q=tor+mirrors">google cache</a>
861
+href="https://encrypted.google.com/search?q=tor+mirrors">google
862
+cache</a>
702 863
 for the <a href="<page getinvolved/mirrors>">Tor mirrors</a> page
703 864
 and see if any of those copies of our website work for you. Third,
704 865
 you can download Tor via email: log in to your Gmail account and mail
... ...
@@ -709,7 +870,8 @@ to receive very large attachments.
709 870
 </p>
710 871
 
711 872
 <p>
712
-Be sure to <a href="<page docs/verifying-signatures>">verify the signature</a>
873
+Be sure to <a href="<page docs/verifying-signatures>">verify the
874
+signature</a>
713 875
 of any package you download, especially when you get it from somewhere
714 876
 other than our official HTTPS website.
715 877
 </p>
... ...
@@ -717,57 +879,72 @@ other than our official HTTPS website.
717 879
 <hr>
718 880
 
719 881
     <a id="CompileTorWindows"></a>
720
-    <h3><a class="anchor" href="#CompileTorWindows">How do I compile Tor under Windows?</a></h3>
882
+    <h3><a class="anchor" href="#CompileTorWindows">How do I compile Tor
883
+under Windows?</a></h3>
721 884
 
722 885
     <p>
723
-    Try following the steps at <a href="<gitblob>doc/tor-win32-mingw-creation.txt">
886
+    Try following the steps at <a
887
+href="<gitblob>doc/tor-win32-mingw-creation.txt">
724 888
     tor-win32-mingw-creation.txt</a>.
725 889
     </p>
726 890
 
727 891
     <p>
728 892
     (Note that you don't need to compile Tor yourself in order to use
729
-    it. Most people just use the packages available on the <a href="<page
893
+    it. Most people just use the packages available on the <a
894
+href="<page
730 895
     download/download>">download page</a>.)
731 896
     </p>
732 897
 
733 898
     <hr>
734 899
 
735 900
     <a id="VirusFalsePositives"></a>
736
-    <h3><a class="anchor" href="#VirusFalsePositives">Why does my Tor executable appear to have a virus or spyware?</a></h3>
901
+    <h3><a class="anchor" href="#VirusFalsePositives">Why does my Tor
902
+executable appear to have a virus or spyware?</a></h3>
737 903
 
738 904
     <p>
739
-    Sometimes, overzealous Windows virus and spyware detectors trigger on some
740
-    parts of the Tor Windows binary. Our best guess is that these are false
741
-    positives &mdash; after all, the anti-virus and anti-spyware business is just a
742
-    guessing game anyway. You should contact your vendor and explain that you have
743
-    a program that seems to be triggering false positives. Or pick a better vendor.
905
+    Sometimes, overzealous Windows virus and spyware detectors trigger
906
+on some
907
+    parts of the Tor Windows binary. Our best guess is that these are
908
+false
909
+    positives &mdash; after all, the anti-virus and anti-spyware
910
+business is just a
911
+    guessing game anyway. You should contact your vendor and explain
912
+that you have
913
+    a program that seems to be triggering false positives. Or pick a
914
+better vendor.
744 915
     </p>
745 916
 
746 917
     <p>
747 918
     In the meantime, we encourage you to not just take our word for
748
-    it. Our job is to provide the source; if you're concerned, please do <a
919
+    it. Our job is to provide the source; if you're concerned, please do
920
+<a
749 921
     href="#CompileTorWindows">recompile it yourself</a>.
750 922
     </p>
751 923
 
752 924
     <hr>
753 925
 
754 926
     <a id="LiveCD"></a>
755
-    <h3><a class="anchor" href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></h3>
927
+    <h3><a class="anchor" href="#LiveCD">Is there a LiveCD or other
928
+bundle that includes Tor?</a></h3>
756 929
 
757 930
     <p>
758 931
     Yes.  Use <a href="https://tails.boum.org/">The Amnesic Incognito
759
-    Live System</a> or <a href="<page projects/torbrowser>">the Tor Browser
932
+    Live System</a> or <a href="<page projects/torbrowser>">the Tor
933
+Browser
760 934
     Bundle</a>.
761 935
     </p>
762 936
 
763 937
 <hr>
764 938
 
765 939
 <a id="TBBFlash"></a>
766
-<h3><a class="anchor" href="#TBBFlash">Why can't I view videos on YouTube
940
+<h3><a class="anchor" href="#TBBFlash">Why can't I view videos on
941
+YouTube
767 942
 and other Flash-based sites?</a></h3>
768 943
 
769 944
 <p>
770
-<a href="https://www.torproject.org/torbutton/torbutton-faq.html.en#noflash">Answer</a>
945
+<a
946
+href="https://www.torproject.org/torbutton/torbutton-faq.html.
947
+en#noflash">Answer</a>
771 948
 </p>
772 949
 
773 950
 <hr>
... ...
@@ -821,12 +998,11 @@ for OSX and Linux.
821 998
 
822 999
 <p>
823 1000
 If that fails, feel free to install <a
824
-href="http://www.privoxy.org/">privoxy</a> or <a
825
-href="https://archive.torproject.org/tor-package-archive/polipo/">polipo</a>.
826
-You can use <a
827
-href="https://gitweb.torproject.org/torbrowser.git/blob_plain/1ffcd9dafb9dd76c3a29dd686e05a71a95599fb5:/build-scripts/config/polipo.conf">our
828
-old polipo config file</a> if you like. However, please realize that
829
-this approach is not recommended for novice users.
1001
+href="http://www.privoxy.org/">privoxy</a>.
1002
+However, please realize that this approach is not recommended for novice
1003
+users. Privoxy has an <a
1004
+href="http://www.privoxy.org/faq/misc.html#TOR">example
1005
+configuration</a> of Tor and Privoxy.
830 1006
 </p>
831 1007
 
832 1008
 <hr>
... ...
@@ -837,7 +1013,8 @@ Firefox extensions?</a></h3>
837 1013
 
838 1014
 <p>
839 1015
 Yes. Just install them like normal. But be sure to avoid extensions like
840
-Foxyproxy that screw up your proxy settings. Also, avoid privacy-invasive
1016
+Foxyproxy that screw up your proxy settings. Also, avoid
1017
+privacy-invasive
841 1018
 extensions (for example, pretty much anything with the word Toolbar in
842 1019
 its name).
843 1020
 </p>
... ...
@@ -845,7 +1022,9 @@ its name).
845 1022
 <hr>
846 1023
 
847 1024
 <a id="TBBJavaScriptEnabled"></a>
848
-<h3><a class="anchor" href="#TBBJavaScriptEnabled">Why is NoScript configured to allow JavaScript by default in the Tor Browser Bundle?  Isn't that unsafe?</a></h3>
1025
+<h3><a class="anchor" href="#TBBJavaScriptEnabled">Why is NoScript
1026
+configured to allow JavaScript by default in the Tor Browser Bundle?
1027
+Isn't that unsafe?</a></h3>
849 1028
 
850 1029
 <p>
851 1030
 We configure NoScript to allow JavaScript by default in the Tor
... ...
@@ -859,7 +1038,8 @@ JavaScript might make a website work).
859 1038
 <hr>
860 1039
 
861 1040
 <a id="TBBCanIBlockJS"></a>
862
-<h3><a class="anchor" href="#CanIBlockJS">I'm an expert!  (No, really!)  Can I configure NoScript to block JavaScript by default?</a></h3>
1041
+<h3><a class="anchor" href="#CanIBlockJS">I'm an expert!  (No, really!)
1042
+Can I configure NoScript to block JavaScript by default?</a></h3>
863 1043
 
864 1044
 <p>
865 1045
 You can configure your copies of Tor Browser Bundle however you want
... ...
@@ -887,22 +1067,27 @@ Chrome/IE/Opera/etc with Tor.</a></h3>
887 1067
 Unfortunately, Torbutton only works with Firefox right now, and without
888 1068
 <a href="https://www.torproject.org/torbutton/en/design/">Torbutton's
889 1069
 extensive privacy fixes</a> there are many ways for websites or other
890
-attackers to recognize you, track you back to your IP address, and so on.
1070
+attackers to recognize you, track you back to your IP address, and so
1071
+on.
891 1072
 In short, using any browser besides Tor Browser Bundle with Tor is a
892 1073
 really bad idea.
893 1074
 </p>
894 1075
 
895 1076
 <p>
896 1077
 We're working with the Chrome team to <a
897
-href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-and-fingerprinting">fix
898
-some bugs and missing APIs in Chrome</a> so it will be possible to write a
899
-Torbutton for Chrome. No support for any other browser is on the horizon.
1078
+href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-
1079
+and-fingerprinting">fix
1080
+some bugs and missing APIs in Chrome</a> so it will be possible to write
1081
+a
1082
+Torbutton for Chrome. No support for any other browser is on the
1083
+horizon.
900 1084
 </p>
901 1085
 
902 1086
 <hr>
903 1087
 
904 1088
 <a id="TBBCloseBrowser"></a>
905
-<h3><a class="anchor" href="#TBBCloseBrowser">I want to leave Tor Browser
1089
+<h3><a class="anchor" href="#TBBCloseBrowser">I want to leave Tor
1090
+Browser
906 1091
 Bundle running but close the browser.</a></h3>
907 1092
 
908 1093
 <p>
... ...
@@ -913,7 +1098,8 @@ be patient.
913 1098
 <hr>
914 1099
 
915 1100
 <a id="GoogleCaptcha"></a>
916
-<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a Captcha or tells me I have spyware installed.</a></h3>
1101
+<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a
1102
+Captcha or tells me I have spyware installed.</a></h3>
917 1103
 
918 1104
 <p>
919 1105
 This is a known and intermittent problem; it does not mean that Google
... ...
@@ -921,9 +1107,11 @@ considers Tor to be spyware.
921 1107
 </p>
922 1108
 
923 1109
 <p>
924
-When you use Tor, you are sending queries through exit relays that are also
1110
+When you use Tor, you are sending queries through exit relays that are
1111
+also
925 1112
 shared by thousands of other users. Tor users typically see this message
926
-when many Tor users are querying Google in a short period of time. Google
1113
+when many Tor users are querying Google in a short period of time.
1114
+Google
927 1115
 interprets the high volume of traffic from a single IP address (the exit
928 1116
 relay you happened to pick) as somebody trying to "crawl" their website,
929 1117
 so it slows down traffic from that IP address for a short time.
... ...
@@ -938,7 +1126,8 @@ an infection.
938 1126
 </p>
939 1127
 
940 1128
 <p>
941
-To our knowledge, Google is not doing anything intentionally specifically
1129
+To our knowledge, Google is not doing anything intentionally
1130
+specifically
942 1131
 to deter or block Tor use. The error message about an infected machine
943 1132
 should clear up again after a short time.
944 1133
 </p>
... ...
@@ -952,7 +1141,8 @@ DuckDuckGo, ixquick, or Bing.
952 1141
 <hr />
953 1142
 
954 1143
 <a id="GmailWarning"></a>
955
-<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my account
1144
+<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my
1145
+account
956 1146
 may have been compromised.</a></h3>
957 1147
 
958 1148
 <p>
... ...
@@ -964,7 +1154,8 @@ throughout the world recently used to access your account.
964 1154
 
965 1155
 <p>
966 1156
 In general this is a false alarm: Google saw a bunch of logins from
967
-different places, as a result of running the service via Tor, and decided
1157
+different places, as a result of running the service via Tor, and
1158
+decided
968 1159
 it was a good idea to confirm the account was being accessed by it's
969 1160
 rightful owner.
970 1161
 </p>
... ...
@@ -981,7 +1172,8 @@ Cookie hijacking is possible by either physical access to your computer
981 1172
 or by watching your network traffic.  In theory only physical access
982 1173
 should compromise your system because Gmail and similar services
983 1174
 should only send the cookie over an SSL link. In practice, alas, it's <a
984
-href="http://fscked.org/blog/fully-automated-active-https-cookie-hijacking">
1175
+href="http://fscked.org/blog/fully-automated-active-https-cookie-
1176
+hijacking">
985 1177
 way more complex than that</a>.
986 1178
 </p>
987 1179
 
... ...
@@ -998,7 +1190,8 @@ recent logins and wondering if you actually logged in at those times.
998 1190
 <hr>
999 1191
 
1000 1192
 <a id="torrc"></a>
1001
-<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc". What does that mean?</a></h3>
1193
+<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc".
1194
+What does that mean?</a></h3>
1002 1195
 
1003 1196
 <p>
1004 1197
 Tor installs a text file called torrc that contains configuration
... ...
@@ -1008,8 +1201,10 @@ make common changes through the Vidalia interface &mdash; only advanced
1008 1201
 users should need to modify their torrc file directly.
1009 1202
 </p>
1010 1203
 <p>
1011
-Tor Browser Bundle users should edit your torrc through Vidalia. Open the
1012
-Vidalia Control Panel. Choose Settings. Choose Advanced. Click the button
1204
+Tor Browser Bundle users should edit your torrc through Vidalia. Open
1205
+the
1206
+Vidalia Control Panel. Choose Settings. Choose Advanced. Click the
1207
+button
1013 1208
 labelled "Edit current torrc". Remember to make sure the checkbox for
1014 1209
 "Save Settings." is checked. Hit the Ok button and you are done.
1015 1210
 </p>
... ...
@@ -1040,19 +1235,22 @@ package's documentation.
1040 1235
 </li>
1041 1236
 <li>Finally, if you installed from source, you may not have a torrc
1042 1237
 installed yet: look in <code>/usr/local/etc/</code> and note that you
1043
-may need to manually copy <code>torrc.sample</code> to <code>torrc</code>.
1238
+may need to manually copy <code>torrc.sample</code> to
1239
+<code>torrc</code>.
1044 1240
 </li>
1045 1241
 </ul>
1046 1242
 
1047 1243
 <p>
1048 1244
 If you use Vidalia, be sure to exit both Tor and Vidalia before you edit
1049
-your torrc file manually. Otherwise Vidalia might overwrite your changes.
1245
+your torrc file manually. Otherwise Vidalia might overwrite your
1246
+changes.
1050 1247
 </p>
1051 1248
 
1052 1249
 <p>
1053 1250
 Once you've changed your torrc, you will need to restart Tor for the
1054 1251
 changes to take effect. (For advanced users on OS X and Unix, note that
1055
-you actually only need to send Tor a HUP signal, not actually restart it.)
1252
+you actually only need to send Tor a HUP signal, not actually restart
1253
+it.)
1056 1254
 </p>
1057 1255
 
1058 1256
 <p>
... ...
@@ -1065,7 +1263,8 @@ configuration.
1065 1263
 <hr>
1066 1264
 
1067 1265
 <a id="Logs"></a>
1068
-<h3><a class="anchor" href="#Logs">How do I set up logging, or see Tor's logs?</a></h3>
1266
+<h3><a class="anchor" href="#Logs">How do I set up logging, or see Tor's
1267
+logs?</a></h3>
1069 1268
 
1070 1269
 <p>
1071 1270
 If you installed a Tor bundle that includes Vidalia, then Vidalia has a
... ...
@@ -1094,7 +1293,8 @@ default to <code>/usr/local/var/log/tor/</code>.
1094 1293
 </ul>
1095 1294
 
1096 1295
 <p>
1097
-To change your logging setup by hand, <a href="#torrc">edit your torrc</a>
1296
+To change your logging setup by hand, <a href="#torrc">edit your
1297
+torrc</a>
1098 1298
 and find the section (near the top of the file) which contains the
1099 1299
 following line:
1100 1300
 </p>
... ...
@@ -1122,7 +1322,8 @@ and filename for your Tor log.
1122 1322
 <hr>
1123 1323
 
1124 1324
 <a id="DoesntWork"></a>
1125
-<h3><a class="anchor" href="#DoesntWork">I installed Tor but it's not working.</a></h3>
1325
+<h3><a class="anchor" href="#DoesntWork">I installed Tor but it's not
1326
+working.</a></h3>
1126 1327
 
1127 1328
 <p>
1128 1329
 Once you've got the Tor bundle up and running, the first question to
... ...
@@ -1130,8 +1331,10 @@ ask is whether your Tor client is able to establish a circuit.
1130 1331
 </p>
1131 1332
 
1132 1333
 <p>If Tor can establish a circuit, the onion icon in
1133
-Vidalia will turn green (and if you're running Tor Browser Bundle, it will
1134
-automatically launch a browser for you). You can also check in the Vidalia
1334
+Vidalia will turn green (and if you're running Tor Browser Bundle, it
1335
+will
1336
+automatically launch a browser for you). You can also check in the
1337
+Vidalia
1135 1338
 Control Panel to make sure it says "Connected to the Tor
1136 1339
 network!" under Status. For those not using Vidalia, check your <a
1137 1340
 href="#Logs">Tor logs</a> for
... ...
@@ -1153,9 +1356,11 @@ day and date under the 'Date &amp; Time' Tab. Also make sure your time
1153 1356
 zone is correct.</li>
1154 1357
 <li>Is your Internet connection <a href="#FirewallPorts">firewalled
1155 1358
 by port</a>, or do you normally need to use a <a
1156
-href="<wikifaq>#MyInternetconnectionrequiresanHTTPorSOCKSproxy.">proxy</a>?
1359
+href="<wikifaq>#MyInternetconnectionrequiresanHTTPorSOCKSproxy.">proxy</
1360
+a>?
1157 1361
 </li>
1158
-<li>Are you running programs like Norton Internet Security or SELinux that
1362
+<li>Are you running programs like Norton Internet Security or SELinux
1363
+that
1159 1364
 block certain connections, even though you don't realize they do? They
1160 1365
 could be preventing Tor from making network connections.</li>
1161 1366
 <li>Are you in China, or behind a restrictive corporate network firewall
... ...
@@ -1168,7 +1373,8 @@ about what's going wrong?</li>
1168 1373
 <hr />
1169 1374
 
1170 1375
 <a id="VidaliaPassword"></a>
1171
-<h3><a class="anchor" href="#VidaliaPassword">Tor/Vidalia prompts for a password at start.</a></h3>
1376
+<h3><a class="anchor" href="#VidaliaPassword">Tor/Vidalia prompts for a
1377
+password at start.</a></h3>
1172 1378
 
1173 1379
 <p>
1174 1380
 Vidalia interacts with the Tor software via Tor's "control port". The
... ...
@@ -1193,9 +1399,11 @@ Vidalia and Tor before you can run this one.
1193 1399
 </li>
1194 1400
 <li>Vidalia crashed, but left Tor running with the last known random
1195 1401
 password. After you restart Vidalia, it generates a new random password,
1196
-but Vidalia can't talk to Tor, because the random passwords are different.
1402
+but Vidalia can't talk to Tor, because the random passwords are
1403
+different.
1197 1404
 <br />
1198
-If the dialog that prompts you for a control password has a Reset button,
1405
+If the dialog that prompts you for a control password has a Reset
1406
+button,
1199 1407
 you can click the button and Vidalia will restart Tor with a new random
1200 1408
 control password.
1201 1409
 <br />
... ...
@@ -1214,7 +1422,8 @@ talk to the already running Tor. Vidalia generates a random password,
1214 1422
 but it is different than the saved password in the Tor service.
1215 1423
 <br />
1216 1424
 You need to reconfigure Tor to not be a service. See the FAQ entry on
1217
-<a href="<wikifaq>#HowdoIrunmyTorrelayasanNTservice">running Tor as a Windows NT service</a>
1425
+<a href="<wikifaq>#HowdoIrunmyTorrelayasanNTservice">running Tor as a
1426
+Windows NT service</a>
1218 1427
 for more information on how to remove the Tor service.
1219 1428
 </li>
1220 1429
 </ol>
... ...
@@ -1222,7 +1431,8 @@ for more information on how to remove the Tor service.
1222 1431
     <hr>
1223 1432
 
1224 1433
     <a id="ChooseEntryExit"></a>
1225
-    <h3><a class="anchor" href="#ChooseEntryExit">Can I control which nodes (or country) are used for entry/exit?</a></h3>
1434
+    <h3><a class="anchor" href="#ChooseEntryExit">Can I control which
1435
+nodes (or country) are used for entry/exit?</a></h3>
1226 1436
 
1227 1437
     <p>
1228 1438
     Yes. You can set preferred entry and exit nodes as well as
... ...
@@ -1232,22 +1442,26 @@ for more information on how to remove the Tor service.
1232 1442
     </p>
1233 1443
     <dl>
1234 1444
       <dt><tt>EntryNodes $fingerprint,$fingerprint,...</tt></dt>
1235
-        <dd>A list of preferred nodes to use for the first hop in the circuit, if possible.
1445
+        <dd>A list of preferred nodes to use for the first hop in the
1446
+circuit, if possible.
1236 1447
         </dd>
1237 1448
       <dt><tt>ExitNodes $fingerprint,$fingerprint,...</tt></dt>
1238
-        <dd>A list of preferred nodes to use for the last hop in the circuit, if possible.
1449
+        <dd>A list of preferred nodes to use for the last hop in the
1450
+circuit, if possible.
1239 1451
         </dd>
1240 1452
       <dt><tt>ExcludeNodes $fingerprint,$fingerprint,...</tt></dt>
1241 1453
         <dd>A list of nodes to never use when building a circuit.
1242 1454
         </dd>
1243 1455
       <dt><tt>ExcludeExitNodes $fingerprint,$fingerprint,...</tt></dt>
1244 1456
         <dd>A list of nodes to never use when picking an exit.
1245
-            Nodes listed in <tt>ExcludeNodes</tt> are automatically in this list.
1457
+            Nodes listed in <tt>ExcludeNodes</tt> are automatically in
1458
+this list.
1246 1459
         </dd>
1247 1460
     </dl>
1248 1461
     <p>
1249 1462
     <em>We recommend you do not use these</em>
1250
-    &mdash; they are intended for testing and may disappear in future versions.
1463
+    &mdash; they are intended for testing and may disappear in future
1464
+versions.
1251 1465
     You get the best security that Tor can provide when you leave the
1252 1466
     route selection to Tor; overriding the entry / exit nodes can mess
1253 1467
     up your anonymity in ways we don't understand.
... ...
@@ -1259,32 +1473,39 @@ for more information on how to remove the Tor service.
1259 1473
     setting <tt>StrictExitNodes 1</tt> or <tt>StrictEntryNodes 1</tt>
1260 1474
     &mdash; but if you do, your Tor connections will stop working
1261 1475
     if all of the nodes you have specified become unreachable.
1262
-    See the <a href="<page docs/documentation>#NeatLinks">Tor status pages</a>
1476
+    See the <a href="<page docs/documentation>#NeatLinks">Tor status
1477
+pages</a>
1263 1478
     for some nodes you might pick.
1264 1479
     </p>
1265 1480
     <p>
1266 1481
     Instead of <tt>$fingerprint</tt> you can also specify a <a
1267
-    href="https://secure.wikimedia.org/wikipedia/en/wiki/ISO_3166-1_alpha-2">2
1482
+
1483
+href="https://secure.wikimedia.org/wikipedia/en/wiki/ISO_3166-1_alpha-2"
1484
+>2
1268 1485
     letter ISO3166 country code</a> in curly braces (for example {de}),
1269 1486
     or an ip address pattern (for example 255.254.0.0/8), or a node
1270 1487
     nickname. Make sure there are no spaces between the commas and the
1271 1488
     list items.
1272 1489
     </p>
1273 1490
     <p>
1274
-    If you want to access a service directly through Tor's Socks interface
1491
+    If you want to access a service directly through Tor's Socks
1492
+interface
1275 1493
     (eg. using ssh via connect.c), another option is to set up an
1276
-    internal mapping in your configuration file using <tt>MapAddress</tt>.
1494
+    internal mapping in your configuration file using
1495
+<tt>MapAddress</tt>.
1277 1496
     See the manual page for details.
1278 1497
     </p>
1279 1498
 
1280 1499
     <hr>
1281 1500
 
1282 1501
 <a id="FirewallPorts"></a>
1283
-<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a few outgoing ports.</a></h3>
1502
+<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a
1503
+few outgoing ports.</a></h3>
1284 1504
 
1285 1505
 <p>
1286 1506
 If your firewall works by blocking ports, then you can tell Tor to only
1287
-use the ports that your firewall permits by adding "FascistFirewall 1" to
1507
+use the ports that your firewall permits by adding "FascistFirewall 1"
1508
+to
1288 1509
 your <a href="<page docs/faq>#torrc">torrc
1289 1510
 configuration file</a>, or by clicking "My firewall only lets me connect
1290 1511
 to certain ports" in Vidalia's Network Settings window.
... ...
@@ -1309,7 +1530,8 @@ use the ReachableAddresses config options, e.g.:
1309 1530
 <hr>
1310 1531
 
1311 1532
     <a id="RelayFlexible"></a>
1312
-    <h3><a class="anchor" href="#RelayFlexible">How stable does my relay need to be?</a></h3>
1533
+    <h3><a class="anchor" href="#RelayFlexible">How stable does my relay
1534
+need to be?</a></h3>
1313 1535
 
1314 1536
     <p>
1315 1537
     We aim to make setting up a Tor relay easy and convenient:
... ...
@@ -1321,13 +1543,19 @@ use the ReachableAddresses config options, e.g.:
1321 1543
     rate limiting</a>. Further, if you have a fast
1322 1544
     link but want to limit the number of bytes per
1323 1545
     day (or week or month) that you donate, check out the <a
1324
-    href="<wikifaq>#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay">hibernation
1546
+
1547
+href="<wikifaq>#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay">
1548
+hibernation
1325 1549
     feature</a>.
1326 1550
     </li>
1327
-    <li>Each Tor relay has an <a href="#ExitPolicies">exit policy</a> that
1328
-    specifies what sort of outbound connections are allowed or refused from
1329
-    that relay. If you are uncomfortable allowing people to exit from your
1330
-    relay, you can set it up to only allow connections to other Tor relays.
1551
+    <li>Each Tor relay has an <a href="#ExitPolicies">exit policy</a>
1552
+that
1553
+    specifies what sort of outbound connections are allowed or refused
1554
+from
1555
+    that relay. If you are uncomfortable allowing people to exit from
1556
+your
1557
+    relay, you can set it up to only allow connections to other Tor
1558
+relays.
1331 1559
     </li>
1332 1560
     <li>It's fine if the relay goes offline sometimes. The directories
1333 1561
     notice this quickly and stop advertising the relay. Just try to make
... ...
@@ -1344,8 +1572,10 @@ use the ReachableAddresses config options, e.g.:
1344 1572
     offers some examples on how to do this.
1345 1573
     </li>
1346 1574
     <li>Your relay will passively estimate and advertise its recent
1347
-    bandwidth capacity, so high-bandwidth relays will attract more users than
1348
-    low-bandwidth ones. Therefore having low-bandwidth relays is useful too.
1575
+    bandwidth capacity, so high-bandwidth relays will attract more users
1576
+than
1577
+    low-bandwidth ones. Therefore having low-bandwidth relays is useful
1578
+too.
1349 1579
     </li>
1350 1580
     </ul>
1351 1581
 
... ...
@@ -1353,7 +1583,8 @@ use the ReachableAddresses config options, e.g.:
1353 1583
 
1354 1584
     <a id="RunARelayBut"></a>
1355 1585
     <a id="ExitPolicies"></a>
1356
-    <h3><a class="anchor" href="#ExitPolicies">I'd run a relay, but I don't want to deal with abuse issues.</a></h3>
1586
+    <h3><a class="anchor" href="#ExitPolicies">I'd run a relay, but I
1587
+don't want to deal with abuse issues.</a></h3>
1357 1588
 
1358 1589
     <p>
1359 1590
     Great. That's exactly why we implemented exit policies.
... ...
@@ -1361,13 +1592,16 @@ use the ReachableAddresses config options, e.g.:
1361 1592
 
1362 1593
     <p>
1363 1594
     Each Tor relay has an exit policy that specifies what sort of
1364
-    outbound connections are allowed or refused from that relay. The exit
1595
+    outbound connections are allowed or refused from that relay. The
1596
+exit
1365 1597
     policies are propagated to Tor clients via the directory, so clients
1366 1598
     will automatically avoid picking exit relays that would refuse to
1367 1599
     exit to their intended destination. This way each relay can decide
1368 1600
     the services, hosts, and networks he wants to allow connections to,
1369
-    based on abuse potential and his own situation. Read the FAQ entry on
1370
-    <a href="<page docs/faq-abuse>#TypicalAbuses">issues you might encounter</a>
1601
+    based on abuse potential and his own situation. Read the FAQ entry
1602
+on
1603
+    <a href="<page docs/faq-abuse>#TypicalAbuses">issues you might
1604
+encounter</a>
1371 1605
     if you use the default exit policy, and then read Mike Perry's
1372 1606
     <a href="<blog>tips-running-exit-node-minimal-harassment">tips
1373 1607
     for running an exit node with minimal harassment</a>.
... ...
@@ -1375,36 +1609,47 @@ use the ReachableAddresses config options, e.g.:
1375 1609
 
1376 1610
     <p>
1377 1611
     The default exit policy allows access to many popular services
1378
-    (e.g. web browsing), but <a href="<wikifaq>#Istherealistofdefaultexitports">restricts</a>
1612
+    (e.g. web browsing), but <a
1613
+href="<wikifaq>#Istherealistofdefaultexitports">restricts</a>
1379 1614
     some due to abuse potential (e.g. mail) and some since
1380 1615
     the Tor network can't handle the load (e.g. default
1381 1616
     file-sharing ports). You can change your exit policy
1382 1617
     using Vidalia's "Sharing" tab, or by manually editing your
1383 1618
     <a href="<page docs/faq>#torrc">torrc</a>
1384
-    file. If you want to avoid most if not all abuse potential, set it to
1385
-    "reject *:*" (or un-check all the boxes in Vidalia). This setting means
1386
-    that your relay will be used for relaying traffic inside the Tor network,
1619
+    file. If you want to avoid most if not all abuse potential, set it
1620
+to
1621
+    "reject *:*" (or un-check all the boxes in Vidalia). This setting
1622
+means
1623
+    that your relay will be used for relaying traffic inside the Tor
1624
+network,
1387 1625
     but not for connections to external websites or other services.
1388 1626
     </p>
1389 1627
 
1390 1628
     <p>
1391
-    If you do allow any exit connections, make sure name resolution works
1629
+    If you do allow any exit connections, make sure name resolution
1630
+works
1392 1631
     (that is, your computer can resolve Internet addresses correctly).
1393
-    If there are any resources that your computer can't reach (for example,
1632
+    If there are any resources that your computer can't reach (for
1633
+example,
1394 1634
     you are behind a restrictive firewall or content filter), please
1395
-    explicitly reject them in your exit policy &mdash; otherwise Tor users
1635
+    explicitly reject them in your exit policy &mdash; otherwise Tor
1636
+users
1396 1637
     will be impacted too.
1397 1638
     </p>
1398 1639
 
1399 1640
     <hr>
1400 1641
 
1401 1642
     <a id="RelayOrBridge"></a>
1402
-    <h3><a class="anchor" href="#RelayOrBridge">Should I be a normal relay or bridge relay?</a></h3>
1643
+    <h3><a class="anchor" href="#RelayOrBridge">Should I be a normal
1644
+relay or bridge relay?</a></h3>
1403 1645
 
1404
-    <p><a href="<page docs/bridges>">Bridge relays</a> (or "bridges" for short)
1405
-    are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't listed
1646
+    <p><a href="<page docs/bridges>">Bridge relays</a> (or "bridges" for
1647
+short)
1648
+    are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't
1649
+listed
1406 1650
     in the main Tor directory. That means
1407
-    that even an ISP or government trying to filter connections to the Tor
1651
+    that even an ISP or government trying to filter connections to the
1652
+Tor
1408 1653
     network probably won't be able to block all the bridges.
1409 1654
     </p>
1410 1655
 
... ...
@@ -1414,14 +1659,17 @@ use the ReachableAddresses config options, e.g.:
1414 1659
     </p>
1415 1660
 
1416 1661
     <p>Right now, China is the main place in the world that filters
1417
-    connections to the Tor network. So bridges are useful a) for users in
1418
-    China, b) as a backup measure in case the Tor network gets blocked in
1662
+    connections to the Tor network. So bridges are useful a) for users
1663
+in
1664
+    China, b) as a backup measure in case the Tor network gets blocked
1665
+in
1419 1666
     more places, and c) for people who want an extra layer of security
1420 1667
     because they're worried somebody will recognize that it's a public
1421 1668
     Tor relay IP address they're contacting.
1422 1669
     </p>
1423 1670
 
1424
-    <p>So should you run a normal relay or bridge relay? If you have lots
1671
+    <p>So should you run a normal relay or bridge relay? If you have
1672
+lots
1425 1673
     of bandwidth, you should definitely run a normal relay &mdash; the
1426 1674
     average bridge doesn't see much load these days. If you're willing
1427 1675
     to <a href="#ExitPolicies">be an exit</a>, you should definitely
... ...
@@ -1433,7 +1681,8 @@ use the ReachableAddresses config options, e.g.:
1433 1681
     <hr>
1434 1682
 
1435 1683
 <a id="MultipleRelays"></a>
1436
-<h3><a class="anchor" href="#MultipleRelays">I want to run more than one relay.</a></h3>
1684
+<h3><a class="anchor" href="#MultipleRelays">I want to run more than one
1685
+relay.</a></h3>
1437 1686
 
1438 1687
 <p>
1439 1688
 Great. If you want to run several relays to donate more to the network,
... ...
@@ -1454,7 +1703,8 @@ all the relays (comma-separated) that are under your control:
1454 1703
 
1455 1704
 <p>
1456 1705
 where each fingerprint is the 40 character identity fingerprint (without
1457
-spaces). You can also list them by nickname, but fingerprint is safer. Be
1706
+spaces). You can also list them by nickname, but fingerprint is safer.
1707
+Be
1458 1708
 sure to prefix the digest strings with a dollar sign ('$') so that the
1459 1709
 digest is not confused with a nickname in the config file.
1460 1710
 </p>
... ...
@@ -1469,27 +1719,38 @@ the same geographic location.
1469 1719
     <hr>
1470 1720
 
1471 1721
     <a id="RelayMemory"></a>
1472
-    <h3><a class="anchor" href="#RelayMemory">Why is my Tor relay using so much memory?</a></h3>
1722
+    <h3><a class="anchor" href="#RelayMemory">Why is my Tor relay using
1723
+so much memory?</a></h3>
1473 1724
 
1474
-    <p>If your Tor relay is using more memory than you'd like, here are some
1725
+    <p>If your Tor relay is using more memory than you'd like, here are
1726
+some
1475 1727
     tips for reducing its footprint:
1476 1728
     </p>
1477 1729
 
1478 1730
     <ol>
1479 1731
     <li>If you're on Linux, you may be encountering memory fragmentation
1480
-    bugs in glibc's malloc implementation. That is, when Tor releases memory
1481
-    back to the system, the pieces of memory are fragmented so they're hard
1482
-    to reuse. The Tor tarball ships with OpenBSD's malloc implementation,
1483
-    which doesn't have as many fragmentation bugs (but the tradeoff is higher
1484
-    CPU load). You can tell Tor to use this malloc implementation instead:
1732
+    bugs in glibc's malloc implementation. That is, when Tor releases
1733
+memory
1734
+    back to the system, the pieces of memory are fragmented so they're
1735
+hard
1736
+    to reuse. The Tor tarball ships with OpenBSD's malloc
1737
+implementation,
1738
+    which doesn't have as many fragmentation bugs (but the tradeoff is
1739
+higher
1740
+    CPU load). You can tell Tor to use this malloc implementation
1741
+instead:
1485 1742
     <tt>./configure --enable-openbsd-malloc</tt></li>
1486 1743
 
1487
-    <li>If you're running a fast relay, meaning you have many TLS connections
1744
+    <li>If you're running a fast relay, meaning you have many TLS
1745
+connections
1488 1746
     open, you are probably losing a lot of memory to OpenSSL's internal
1489 1747
     buffers (38KB+ per socket). We've patched OpenSSL to <a
1490
-    href="https://lists.torproject.org/pipermail/tor-dev/2008-June/001519.html">release
1748
+
1749
+href="https://lists.torproject.org/pipermail/tor-dev/2008-June/001519.
1750
+html">release
1491 1751
     unused buffer memory more aggressively</a>. If you update to OpenSSL
1492
-    1.0.0 or newer, Tor's build process will automatically recognize and use
1752
+    1.0.0 or newer, Tor's build process will automatically recognize and
1753
+use
1493 1754
     this feature.</li>
1494 1755
 
1495 1756
     <li>If you're running on Solaris, OpenBSD, NetBSD, or
... ...
@@ -1499,7 +1760,8 @@ the same geographic location.
1499 1760
     operating system</a>.</li>
1500 1761
 
1501 1762
     <li>If you still can't handle the memory load, consider reducing the
1502
-    amount of bandwidth your relay advertises. Advertising less bandwidth
1763
+    amount of bandwidth your relay advertises. Advertising less
1764
+bandwidth
1503 1765
     means you will attract fewer users, so your relay shouldn't grow
1504 1766
     as large. See the <tt>MaxAdvertisedBandwidth</tt> option in the man
1505 1767
     page.</li>
... ...
@@ -1507,23 +1769,28 @@ the same geographic location.
1507 1769
     </ol>
1508 1770
 
1509 1771
     <p>
1510
-    All of this said, fast Tor relays do use a lot of ram. It is not unusual
1772
+    All of this said, fast Tor relays do use a lot of ram. It is not
1773
+unusual
1511 1774
     for a fast exit relay to use 500-1000 MB of memory.
1512 1775
     </p>
1513 1776
 
1514 1777
     <hr>
1515 1778
 
1516 1779
     <a id="WhyNotNamed"></a>
1517
-    <h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not named?</a></h3>
1780
+    <h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not
1781
+named?</a></h3>
1518 1782
 
1519 1783
     <p>
1520
-    We currently use these metrics to determine if your relay should be named:<br>
1784
+    We currently use these metrics to determine if your relay should be
1785
+named:<br>
1521 1786
     </p>
1522 1787
     <ul>
1523
-    <li>The name is not currently mapped to a different key. Existing mappings
1788
+    <li>The name is not currently mapped to a different key. Existing
1789
+mappings
1524 1790
     are removed after 6 months of inactivity from a relay.</li>
1525 1791
     <li>The relay must have been around for at least two weeks.</li>
1526
-    <li>No other router may have wanted the same name in the past month.</li>
1792
+    <li>No other router may have wanted the same name in the past
1793
+month.</li>
1527 1794
     </ul>
1528 1795
 
1529 1796
     <hr>
... ...
@@ -1555,7 +1823,8 @@ the same geographic location.
1555 1823
 
1556 1824
     <p>
1557 1825
     Note that there can be a tradeoff here between anonymity and
1558
-    performance. The Tor network's anonymity comes in part from diversity,
1826
+    performance. The Tor network's anonymity comes in part from
1827
+diversity,
1559 1828
     so if you are in a position to run your own relay, you will be
1560 1829
     improving Tor's anonymity more than by donating. At the same time
1561 1830
     though, economies
... ...
@@ -1568,24 +1837,29 @@ the same geographic location.
1568 1837
     <hr>
1569 1838
 
1570 1839
     <a id="KeyManagement"></a>
1571
-    <h3><a class="anchor" href="#KeyManagement">Tell me about all the keys Tor uses.</a></h3>
1840
+    <h3><a class="anchor" href="#KeyManagement">Tell me about all the
1841
+keys Tor uses.</a></h3>
1572 1842
 
1573 1843
     <p>
1574 1844
     Tor uses a variety of different keys, with three goals in mind: 1)
1575 1845
     encryption to ensure privacy of data within the Tor network, 2)
1576 1846
     authentication so clients know they're
1577
-    talking to the relays they meant to talk to, and 3) signatures to make
1847
+    talking to the relays they meant to talk to, and 3) signatures to
1848
+make
1578 1849
     sure all clients know the same set of relays.
1579 1850
     </p>
1580 1851
 
1581 1852
     <p>
1582
-    <b>Encryption</b>: first, all connections in Tor use TLS link encryption,
1853
+    <b>Encryption</b>: first, all connections in Tor use TLS link
1854
+encryption,
1583 1855
     so observers can't look inside to see which circuit a given cell is
1584
-    intended for. Further, the Tor client establishes an ephemeral encryption
1856
+    intended for. Further, the Tor client establishes an ephemeral
1857
+encryption
1585 1858
     key with each relay in the circuit; these extra layers of encryption
1586 1859
     mean that only the exit relay can read
1587 1860
     the cells. Both sides discard the circuit key when the circuit ends,
1588
-    so logging traffic and then breaking into the relay to discover the key
1861
+    so logging traffic and then breaking into the relay to discover the
1862
+key
1589 1863
     won't work.
1590 1864
     </p>
1591 1865
 
... ...
@@ -1604,23 +1879,32 @@ the same geographic location.
1604 1879
 
1605 1880
     <p>
1606 1881
     <b>Coordination</b>:
1607
-    How do clients know what the relays are, and how do they know that they
1608
-    have the right keys for them? Each relay has a long-term public signing
1609
-    key called the "identity key". Each directory authority additionally has a
1882
+    How do clients know what the relays are, and how do they know that
1883
+they
1884
+    have the right keys for them? Each relay has a long-term public
1885
+signing
1886
+    key called the "identity key". Each directory authority additionally
1887
+has a
1610 1888
     "directory signing key". The directory authorities <a
1611 1889
     href="<specblob>dir-spec.txt">provide a signed list</a>
1612
-    of all the known relays, and in that list are a set of certificates from
1613
-    each relay (self-signed by their identity key) specifying their keys,
1614
-    locations, exit policies, and so on. So unless the adversary can control
1890
+    of all the known relays, and in that list are a set of certificates
1891
+from
1892
+    each relay (self-signed by their identity key) specifying their
1893
+keys,
1894
+    locations, exit policies, and so on. So unless the adversary can
1895
+control
1615 1896
     a majority of the directory authorities (as of 2012 there are 8
1616 1897
     directory authorities), he can't trick the Tor client into using
1617 1898
     other Tor relays.
1618 1899
     </p>
1619 1900
 
1620 1901
     <p>
1621
-    How do clients know what the directory authorities are? The Tor software
1622
-    comes with a built-in list of location and public key for each directory
1623
-    authority. So the only way to trick users into using a fake Tor network
1902
+    How do clients know what the directory authorities are? The Tor
1903
+software
1904
+    comes with a built-in list of location and public key for each
1905
+directory
1906
+    authority. So the only way to trick users into using a fake Tor
1907
+network
1624 1908
     is to give them a specially modified version of the software.
1625 1909
     </p>
1626 1910
 
... ...
@@ -1633,23 +1917,30 @@ the same geographic location.
1633 1917
     </p>
1634 1918
 
1635 1919
     <p>
1636
-    In order to be certain that it's really signed by us, you need to have
1637
-    met us in person and gotten a copy of our GPG key fingerprint, or you
1638
-    need to know somebody who has. If you're concerned about an attack on
1639
-    this level, we recommend you get involved with the security community
1920
+    In order to be certain that it's really signed by us, you need to
1921
+have
1922
+    met us in person and gotten a copy of our GPG key fingerprint, or
1923
+you
1924
+    need to know somebody who has. If you're concerned about an attack
1925
+on
1926
+    this level, we recommend you get involved with the security
1927
+community
1640 1928
     and start meeting people.
1641 1929
     </p>
1642 1930
 
1643 1931
     <hr>
1644 1932
 
1645 1933
 <a id="EntryGuards"></a>
1646
-<h3><a class="anchor" href="#EntryGuards">What are Entry Guards?</a></h3>
1934
+<h3><a class="anchor" href="#EntryGuards">What are Entry
1935
+Guards?</a></h3>
1647 1936
 
1648 1937
 <p>
1649 1938
 Tor (like all current practical low-latency anonymity designs) fails
1650 1939
 when the attacker can see both ends of the communications channel. For
1651
-example, suppose the attacker controls or watches the Tor relay you choose
1652
-to enter the network, and also controls or watches the website you visit. In
1940
+example, suppose the attacker controls or watches the Tor relay you
1941
+choose
1942
+to enter the network, and also controls or watches the website you
1943
+visit. In
1653 1944
 this case, the research community knows no practical low-latency design
1654 1945
 that can reliably stop the attacker from correlating volume and timing
1655 1946
 information on the two sides.
... ...
@@ -1663,17 +1954,20 @@ will be able to correlate all traffic you send with probability
1663 1954
 <i>(c/n)<sup>2</sup></i>. But profiling is, for most users, as bad
1664 1955
 as being traced all the time: they want to do something often without
1665 1956
 an attacker noticing, and the attacker noticing once is as bad as the
1666
-attacker noticing more often. Thus, choosing many random entries and exits
1957
+attacker noticing more often. Thus, choosing many random entries and
1958
+exits
1667 1959
 gives the user no chance of escaping profiling by this kind of attacker.
1668 1960
 </p>
1669 1961
 
1670 1962
 <p>
1671
-The solution is "entry guards": each Tor client selects a few relays at random
1963
+The solution is "entry guards": each Tor client selects a few relays at
1964
+random
1672 1965
 to use as entry points, and uses only those relays for her first hop. If
1673 1966
 those relays are not controlled or observed, the attacker can't win,
1674 1967
 ever, and the user is secure. If those relays <i>are</i> observed or
1675 1968
 controlled by the attacker, the attacker sees a larger <i>fraction</i>
1676
-of the user's traffic &mdash; but still the user is no more profiled than
1969
+of the user's traffic &mdash; but still the user is no more profiled
1970
+than
1677 1971
 before. Thus, the user has some chance (on the order of <i>(n-c)/n</i>)
1678 1972
 of avoiding profiling, whereas she had none before.
1679 1973
 </p>
... ...
@@ -1699,50 +1993,66 @@ we move to a "directory guard" design as well.
1699 1993
     <hr>
1700 1994
 
1701 1995
     <a id="EverybodyARelay"></a>
1702
-    <h3><a class="anchor" href="#EverybodyARelay">You should make every Tor user be a relay.</a></h3>
1996
+    <h3><a class="anchor" href="#EverybodyARelay">You should make every
1997
+Tor user be a relay.</a></h3>
1703 1998
 
1704 1999
     <p>
1705 2000
     Requiring every Tor user to be a relay would help with scaling the
1706 2001
     network to handle all our users, and <a
1707 2002
     href="<wikifaq>#DoIgetbetteranonymityifIrunarelay">running a Tor
1708
-    relay may help your anonymity</a>. However, many Tor users cannot be good
1709
-    relays &mdash; for example, some Tor clients operate from behind restrictive
1710
-    firewalls, connect via modem, or otherwise aren't in a position where they
2003
+    relay may help your anonymity</a>. However, many Tor users cannot be
2004
+good
2005
+    relays &mdash; for example, some Tor clients operate from behind
2006
+restrictive
2007
+    firewalls, connect via modem, or otherwise aren't in a position
2008
+where they
1711 2009
     can relay traffic. Providing service to these clients is a critical
1712
-    part of providing effective anonymity for everyone, since many Tor users
1713
-    are subject to these or similar constraints and including these clients
2010
+    part of providing effective anonymity for everyone, since many Tor
2011
+users
2012
+    are subject to these or similar constraints and including these
2013
+clients
1714 2014
     increases the size of the anonymity set.
1715 2015
     </p>
1716 2016
 
1717 2017
     <p>
1718
-    That said, we do want to encourage Tor users to run relays, so what we
1719
-    really want to do is simplify the process of setting up and maintaining
1720
-    a relay. We've made a lot of progress with easy configuration in the past
1721
-    few years: Vidalia has an easy relay configuration interface, and supports
1722
-    uPnP too. Tor is good at automatically detecting whether it's reachable and
2018
+    That said, we do want to encourage Tor users to run relays, so what
2019
+we
2020
+    really want to do is simplify the process of setting up and
2021
+maintaining
2022
+    a relay. We've made a lot of progress with easy configuration in the
2023
+past
2024
+    few years: Vidalia has an easy relay configuration interface, and
2025
+supports
2026
+    uPnP too. Tor is good at automatically detecting whether it's
2027
+reachable and
1723 2028
     how much bandwidth it can offer.
1724 2029
     </p>
1725 2030
 
1726 2031
     <p>
1727
-    There are five steps we need to address before we can do this though:
2032
+    There are five steps we need to address before we can do this
2033
+though:
1728 2034
     </p>
1729 2035
 
1730 2036
     <p>
1731 2037
     First, we need to make Tor stable as a relay on all common
1732 2038
     operating systems. The main remaining platform is Windows,
1733 2039
     and we're mostly there. See Section 4.1 of <a
1734
-    href="https://www.torproject.org/press/2008-12-19-roadmap-press-release">our
2040
+
2041
+href="https://www.torproject.org/press/2008-12-19-roadmap-press-release"
2042
+>our
1735 2043
     development roadmap</a>.
1736 2044
     </p>
1737 2045
 
1738 2046
     <p>
1739 2047
     Second, we still need to get better at automatically estimating
1740 2048
     the right amount of bandwidth to allow. See item #7 on the
1741
-    <a href="<page getinvolved/volunteer>#Research">research section of the
2049
+    <a href="<page getinvolved/volunteer>#Research">research section of
2050
+the
1742 2051
     volunteer page</a>: "Tor doesn't work very well when relays
1743 2052
     have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a
1744 2053
     href="<page docs/faq>#TransportIPnotTCP">switching
1745
-    to UDP transport</a> is the simplest answer here &mdash; which alas is
2054
+    to UDP transport</a> is the simplest answer here &mdash; which alas
2055
+is
1746 2056
     not a very simple answer at all.
1747 2057
     </p>
1748 2058
 
... ...
@@ -1764,17 +2074,25 @@ we move to a "directory guard" design as well.
1764 2074
     href="http://freehaven.net/anonbib/#clog-the-queue">different</a>
1765 2075
     <a href="http://freehaven.net/anonbib/#torta05">research</a> papers
1766 2076
     describe ways to identify the relays in a circuit by running traffic
1767
-    through candidate relays and looking for dips in the traffic while the
1768
-    circuit is active. These clogging attacks are not that scary in the Tor
1769
-    context so long as relays are never clients too. But if we're trying to
1770
-    encourage more clients to turn on relay functionality too (whether as
1771
-    <a href="<page docs/bridges>">bridge relays</a> or as normal relays), then
1772
-    we need to understand this threat better and learn how to mitigate it.
1773
-    </p>
1774
-
1775
-    <p>
1776
-    Fifth, we might need some sort of incentive scheme to encourage people
1777
-    to relay traffic for others, and/or to become exit nodes. Here are our
2077
+    through candidate relays and looking for dips in the traffic while
2078
+the
2079
+    circuit is active. These clogging attacks are not that scary in the
2080
+Tor
2081
+    context so long as relays are never clients too. But if we're trying
2082
+to
2083
+    encourage more clients to turn on relay functionality too (whether
2084
+as
2085
+    <a href="<page docs/bridges>">bridge relays</a> or as normal
2086
+relays), then
2087
+    we need to understand this threat better and learn how to mitigate
2088
+it.
2089
+    </p>
2090
+
2091
+    <p>
2092
+    Fifth, we might need some sort of incentive scheme to encourage
2093
+people
2094
+    to relay traffic for others, and/or to become exit nodes. Here are
2095
+our
1778 2096
     <a href="<blog>two-incentive-designs-tor">current
1779 2097
     thoughts on Tor incentives</a>.
1780 2098
     </p>
... ...
@@ -1786,13 +2104,15 @@ we move to a "directory guard" design as well.
1786 2104
 <hr>
1787 2105
 
1788 2106
 <a id="TransportIPnotTCP"></a>
1789
-<h3><a class="anchor" href="#TransportIPnotTCP">You should transport all IP packets, not just TCP packets.</a></h3>
2107
+<h3><a class="anchor" href="#TransportIPnotTCP">You should transport all
2108
+IP packets, not just TCP packets.</a></h3>
1790 2109
 
1791 2110
 <p>
1792 2111
 This would be handy, because it would make Tor better able to handle
1793 2112
 new protocols like VoIP, it could solve the whole need to socksify
1794 2113
 applications, and it would solve the fact that exit relays need to
1795
-allocate a lot of file descriptors to hold open all the exit connections.
2114
+allocate a lot of file descriptors to hold open all the exit
2115
+connections.
1796 2116
 </p>
1797 2117
 
1798 2118
 <p>
... ...
@@ -1820,7 +2140,8 @@ rather than the DNS server at a user's ISP; thus, we must understand
1820 2140
 the protocols we are transporting.
1821 2141
 </li>
1822 2142
 <li><a
1823
-href="http://crypto.stanford.edu/~nagendra/projects/dtls/dtls.html">DTLS</a>
2143
+href="http://crypto.stanford.edu/~nagendra/projects/dtls/dtls.html">DTLS
2144
+</a>
1824 2145
 (datagram TLS) basically has no users, and IPsec sure is big. Once we've
1825 2146
 picked a transport mechanism, we need to design a new end-to-end Tor
1826 2147
 protocol for avoiding tagging attacks and other potential anonymity and
... ...
@@ -1830,13 +2151,15 @@ integrity issues now that we allow drops, resends, et cetera.
1830 2151
 IDS. Our node operators tell us that exit policies are one of the main
1831 2152
 reasons they're willing to run Tor. Adding an Intrusion Detection System
1832 2153
 to handle exit policies would increase the security complexity of Tor,
1833
-and would likely not work anyway, as evidenced by the entire field of IDS
2154
+and would likely not work anyway, as evidenced by the entire field of
2155
+IDS
1834 2156
 and counter-IDS papers. Many potential abuse issues are resolved by the
1835 2157
 fact that Tor only transports valid TCP streams (as opposed to arbitrary
1836 2158
 IP including malformed packets and IP floods), so exit policies become
1837 2159
 even <i>more</i> important as we become able to transport IP packets. We
1838 2160
 also need to compactly describe exit policies in the Tor directory,
1839
-so clients can predict which nodes will allow their packets to exit &mdash;
2161
+so clients can predict which nodes will allow their packets to exit
2162
+&mdash;
1840 2163
 and clients need to predict all the packets they will want to send in
1841 2164
 a session before picking their exit node!
1842 2165
 </li>
... ...
@@ -1865,10 +2188,12 @@ list of relays directly, somebody could still make a lot of connections
1865 2188
 through Tor to a test site and build a list of the addresses they see.
1866 2189
 </li>
1867 2190
 
1868
-<li>If people want to block us, we believe that they should be allowed to
2191
+<li>If people want to block us, we believe that they should be allowed
2192
+to
1869 2193
 do so.  Obviously, we would prefer for everybody to allow Tor users to
1870 2194
 connect to them, but people have the right to decide who their services
1871
-should allow connections from, and if they want to block anonymous users,
2195
+should allow connections from, and if they want to block anonymous
2196
+users,
1872 2197
 they can.
1873 2198
 </li>
1874 2199
 
... ...
@@ -1885,7 +2210,8 @@ spend rethinking their overall approach to privacy and anonymity.
1885 2210
     <hr>
1886 2211
 
1887 2212
     <a id="Criminals"></a>
1888
-    <h3><a class="anchor" href="#Criminals">Doesn't Tor enable criminals to do bad things?</a></h3>
2213
+    <h3><a class="anchor" href="#Criminals">Doesn't Tor enable criminals
2214
+to do bad things?</a></h3>
1889 2215
 
1890 2216
     <p>
1891 2217
     For the answer to this question and others, please see our <a
... ...
@@ -1895,7 +2221,8 @@ spend rethinking their overall approach to privacy and anonymity.
1895 2221
     <hr>
1896 2222
 
1897 2223
     <a id="RespondISP"></a>
1898
-    <h3><a class="anchor" href="#RespondISP">How do I respond to my ISP about my exit relay?</a></h3>
2224
+    <h3><a class="anchor" href="#RespondISP">How do I respond to my ISP
2225
+about my exit relay?</a></h3>
1899 2226
 
1900 2227
     <p>
1901 2228
     A collection of templates for successfully responding to ISPs is <a
1902 2229