bring the warnings list a little bit more up to date.
Roger Dingledine

Roger Dingledine commited on 2009-06-29 02:05:50
Zeige 1 geänderte Dateien mit 17 Einfügungen und 17 Löschungen.

... ...
@@ -206,32 +206,31 @@ href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension.
206 206
 </li>
207 207
 
208 208
 <li>
209
-Browser plugins such as Java, Flash, ActiveX, RealPlayer,
210
-Quicktime, Adobe's PDF plugin, and others can be manipulated
211
-into revealing your IP address. You should probably
212
-<a href="http://plugindoc.mozdev.org/faqs/uninstall.html">uninstall your
213
-plugins</a>
214
-(go to "about:plugins" to see what is installed), or investigate <a
215
-href="https://addons.mozilla.org/firefox/1237/">QuickJava</a>, <a
216
-href="https://addons.mozilla.org/firefox/433/">FlashBlock</a>, and
217
-<a href="http://noscript.net/">NoScript</a>
218
-if you really need them. Consider removing extensions that look up
219
-more information about the websites you type in (like Google toolbar),
220
-as they may bypass Tor and/or broadcast sensitive information. Some
209
+Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer,
210
+Quicktime, Adobe's PDF plugin, and others: they can be manipulated
211
+into revealing your IP address. For example, that means Youtube is
212
+disabled. If you really need your Youtube, you can <a href="<page
213
+torbutton/faq>#noflash">reconfigure Torbutton</a> to allow it; but
214
+be aware that you're opening yourself up to potential attack. Also,
215
+extensions like Google toolbar look up
216
+more information about the websites you type in:
217
+they may bypass Tor and/or broadcast sensitive information. Some
221 218
 people prefer using two browsers (one for Tor, one for unsafe browsing).
222 219
 </li>
223 220
 
224 221
 <li>
225
-Beware of cookies: if you ever browse without Tor and Privoxy
222
+Beware of cookies: if you ever browse without Tor
226 223
 and a site gives you a cookie, that cookie could identify you even when
227
-you start using Tor again. You should clear your cookies frequently. <a
224
+you start using Tor again. Torbutton tries to handle your cookies
225
+safely. <a
228 226
 href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help
229 227
 protect any cookies you do not want to lose.
230 228
 </li>
231 229
 
232 230
 <li>
233
-Tor anonymizes the origin of your traffic,
234
-and it encrypts everything inside the Tor network, but <a
231
+Tor anonymizes the origin of your traffic, and it encrypts everything
232
+between you and the Tor network and everything inside the Tor network,
233
+but <a
235 234
 href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it
236 235
 can't encrypt your traffic between the Tor network and its final
237 236
 destination.</a>
... ...
@@ -245,7 +244,8 @@ While Tor blocks attackers
245 244
 on your local network from discovering or influencing your destination,
246 245
 it opens new risks: malicious or misconfigured Tor exit nodes can send
247 246
 you the wrong page, or even send you embedded Java applets disguised as
248
-domains you trust.
247
+domains you trust. Be careful opening documents or applications you
248
+download through Tor, unless you've verified their integrity.
249 249
 </li>
250 250
 </ol>
251 251
 
252 252