remove some decloak.net links (site is offline)
Sebastian Hahn

Sebastian Hahn commited on 2015-07-06 03:40:25
Zeige 3 geänderte Dateien mit 11 Einfügungen und 11 Löschungen.

... ...
@@ -172,9 +172,9 @@ investigated is also capable of performing network activity independent of
172 172
 browser proxy settings - and often independent of its own proxy settings.
173 173
 Sites that have plugin content don't even have to be malicious to obtain a
174 174
 user's
175
-Non-Tor IP (it usually leaks by itself), though <ulink
176
-url="http://decloak.net">plenty of active
177
-exploits</ulink> are possible as well. In addition, plugins can be used to store unique identifiers that are more
175
+Non-Tor IP (it usually leaks by itself), though
176
+plenty of active
177
+exploits are possible as well. In addition, plugins can be used to store unique identifiers that are more
178 178
 difficult to clear than standard cookies. 
179 179
 <ulink url="http://epic.org/privacy/cookies/flash.html">Flash-based
180 180
 cookies</ulink> fall into this category, but there are likely numerous other
... ...
@@ -1181,8 +1181,8 @@ url="https://gitweb.torproject.org/torbutton.git/blob_plain/HEAD:/src/chrome/con
1181 1181
 url="http://java.sun.com/j2se/1.5.0/docs/api/java/net/class-use/NetworkInterface.html">can query</ulink> the <ulink
1182 1182
 url="http://www.rgagnon.com/javadetails/java-0095.html">local IP
1183 1183
 address</ulink> and report it back to the
1184
-remote site. They can also <ulink
1185
-url="http://decloak.net">bypass proxy settings</ulink> and directly connect to a
1184
+remote site. They can also
1185
+>bypass proxy settings and directly connect to a
1186 1186
 remote site without Tor. Every browser plugin we have tested with Firefox has
1187 1187
 some form of network capability, and every one ignores proxy settings or worse - only
1188 1188
 partially obeys them. This includes but is not limited to:
... ...
@@ -2696,7 +2696,7 @@ testing, and also in the hope that some brave soul will one day decide to
2696 2696
 combine them into a comprehensive automated test suite.
2697 2697
 
2698 2698
      <orderedlist>
2699
-      <listitem><ulink url="http://decloak.net/">Decloak.net</ulink>
2699
+      <listitem>Decloak.net (defunct)
2700 2700
        <para>
2701 2701
 
2702 2702
 Decloak.net is the canonical source of plugin and external-application based
... ...
@@ -95,8 +95,8 @@ investigated is also capable of performing network activity independent of
95 95
 browser proxy settings - and often independent of its own proxy settings.
96 96
 Sites that have plugin content don't even have to be malicious to obtain a
97 97
 user's
98
-Non-Tor IP (it usually leaks by itself), though <a class="ulink" href="http://decloak.net" target="_top">plenty of active
99
-exploits</a> are possible as well. In addition, plugins can be used to store unique identifiers that are more
98
+Non-Tor IP (it usually leaks by itself), though plenty of active
99
+exploits are possible as well. In addition, plugins can be used to store unique identifiers that are more
100 100
 difficult to clear than standard cookies. 
101 101
 <a class="ulink" href="http://epic.org/privacy/cookies/flash.html" target="_top">Flash-based
102 102
 cookies</a> fall into this category, but there are likely numerous other
... ...
@@ -636,7 +636,7 @@ callback <code class="function">torbutton_prefs_test_settings()</code> in <a cla
636 636
 
637 637
   </p></div></div><div class="sect2" title="5.2. Dynamic Content Settings"><div class="titlepage"><div><div><h3 class="title"><a id="id2686645"></a>5.2. Dynamic Content Settings</h3></div></div></div><div class="sect3" title="Disable plugins on Tor Usage (crucial)"><div class="titlepage"><div><div><h4 class="title"><a id="plugins"></a>Disable plugins on Tor Usage (crucial)</h4></div></div></div><p>Option: <span class="command"><strong>extensions.torbutton.no_tor_plugins</strong></span></p><p>Java and plugins <a class="ulink" href="http://java.sun.com/j2se/1.5.0/docs/api/java/net/class-use/NetworkInterface.html" target="_top">can query</a> the <a class="ulink" href="http://www.rgagnon.com/javadetails/java-0095.html" target="_top">local IP
638 638
 address</a> and report it back to the
639
-remote site. They can also <a class="ulink" href="http://decloak.net" target="_top">bypass proxy settings</a> and directly connect to a
639
+remote site. They can also bypass proxy settings and directly connect to a
640 640
 remote site without Tor. Every browser plugin we have tested with Firefox has
641 641
 some form of network capability, and every one ignores proxy settings or worse - only
642 642
 partially obeys them. This includes but is not limited to:
... ...
@@ -1309,7 +1309,7 @@ individually. They are provided here for reference and future regression
1309 1309
 testing, and also in the hope that some brave soul will one day decide to
1310 1310
 combine them into a comprehensive automated test suite.
1311 1311
 
1312
-     </p><div class="orderedlist"><ol class="orderedlist" type="1"><li class="listitem"><a class="ulink" href="http://decloak.net/" target="_top">Decloak.net</a><p>
1312
+     </p><div class="orderedlist"><ol class="orderedlist" type="1"><li class="listitem">Decloak.net (defunct)<p>
1313 1313
 
1314 1314
 Decloak.net is the canonical source of plugin and external-application based
1315 1315
 proxy-bypass exploits. It is a fully automated test suite maintained by <a class="ulink" href="http://digitaloffense.net/" target="_top">HD Moore</a> as a service for people to
... ...
@@ -595,7 +595,7 @@ connections are not attempted, through the proxy or otherwise (Tor does not
595 595
 yet support IPv6). We have also verified that external protocol helpers, such
596 596
 as SMB URLs and other custom protocol handlers are all blocked.
597 597
 
598
- </p></li><li class="listitem"><span class="command"><strong>Disabling plugins</strong></span><p>Plugins have the ability to make arbitrary OS system calls and  <a class="ulink" href="http://decloak.net/" target="_top">bypass proxy settings</a>. This includes
598
+ </p></li><li class="listitem"><span class="command"><strong>Disabling plugins</strong></span><p>Plugins have the ability to make arbitrary OS system calls and  bypass proxy settings. This includes
599 599
 the ability to make UDP sockets and send arbitrary data independent of the
600 600
 browser proxy settings.
601 601
  </p><p>
602 602