mention quicktime explicitly, and mention the exit node issue explicitly too.
Roger Dingledine

Roger Dingledine commited on 2007-03-08 13:01:21
Zeige 1 geänderte Dateien mit 13 Einfügungen und 9 Löschungen.

... ...
@@ -118,7 +118,7 @@ There are several major pitfalls to watch out for.
118 118
 </p>
119 119
 
120 120
 <p>First, Tor only protects applications that are configured to
121
-send their traffic through Tor -- it doesn't magically anonymize
121
+send their traffic through Tor &mdash; it doesn't magically anonymize
122 122
 all your traffic just because you install it.  We recommend you
123 123
 use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a
124 124
 href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension.
... ...
@@ -127,11 +127,11 @@ supported applications</a>. -->
127 127
 </p>
128 128
 
129 129
 <p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer,
130
-Adobe's PDF plugin, and others can be manipulated
130
+Quicktime, Adobe's PDF plugin, and others can be manipulated
131 131
 into revealing your IP address. We recommend the <a
132 132
 href="https://addons.mozilla.org/firefox/1237/">QuickJava</a> and <a
133 133
 href="https://addons.mozilla.org/firefox/433/">FlashBlock</a> extensions,
134
-and you should probably disable <a href="about:plugins">plugins</a>
134
+and you should probably uninstall other <a href="about:plugins">plugins</a>
135 135
 in general.
136 136
 <!-- You may also find
137 137
 <a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a
... ...
@@ -139,7 +139,7 @@ href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. -->
139 139
 </p>
140 140
 
141 141
 <p>Third, beware of cookies: if you ever browse without Tor and Privoxy
142
-and a site gives you a cookie, that cookie can identify you even when
142
+and a site gives you a cookie, that cookie could identify you even when
143 143
 you start using Tor again. You should clear your cookies frequently. <a
144 144
 href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help
145 145
 protect any cookies you do not want to lose.
... ...
@@ -149,13 +149,17 @@ protect any cookies you do not want to lose.
149 149
 and it encrypts everything inside the Tor network, but <a
150 150
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it
151 151
 can't encrypt your traffic between the Tor network and its final
152
-destination.</a> If you
153
-are communicating sensitive information, you should use the same level
154
-of care that you would on the normal scary Internet -- use SSL or other
155
-end-to-end encryption and authentication approaches.
152
+destination.</a>
153
+If you are communicating sensitive information, you should use as much
154
+care as you would on the normal scary Internet &mdash; use SSL or other
155
+end-to-end encryption and authentication. Also, while Tor blocks attackers
156
+on your local network from discovering or influencing your destination,
157
+it opens new risks: malicious or misconfigured Tor exit nodes can send
158
+you the wrong page, or even send you embedded Java applets disguised as
159
+domains you trust.
156 160
 </p>
157 161
 
158
-<p>Lastly, be smart and learn more. Understand what Tor offers and what
162
+<p>Last, be smart and learn more. Understand what Tor offers and what
159 163
 it doesn't offer. This list of pitfalls isn't complete, and we need your
160 164
 help <a href="<page volunteer>#Documentation">identifying and documenting
161 165
 all the issues</a>.
162 166