Roger Dingledine commited on 2007-03-08 13:01:21
Zeige 1 geänderte Dateien mit 13 Einfügungen und 9 Löschungen.
... | ... |
@@ -118,7 +118,7 @@ There are several major pitfalls to watch out for. |
118 | 118 |
</p> |
119 | 119 |
|
120 | 120 |
<p>First, Tor only protects applications that are configured to |
121 |
-send their traffic through Tor -- it doesn't magically anonymize |
|
121 |
+send their traffic through Tor — it doesn't magically anonymize |
|
122 | 122 |
all your traffic just because you install it. We recommend you |
123 | 123 |
use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a |
124 | 124 |
href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension. |
... | ... |
@@ -127,11 +127,11 @@ supported applications</a>. --> |
127 | 127 |
</p> |
128 | 128 |
|
129 | 129 |
<p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer, |
130 |
-Adobe's PDF plugin, and others can be manipulated |
|
130 |
+Quicktime, Adobe's PDF plugin, and others can be manipulated |
|
131 | 131 |
into revealing your IP address. We recommend the <a |
132 | 132 |
href="https://addons.mozilla.org/firefox/1237/">QuickJava</a> and <a |
133 | 133 |
href="https://addons.mozilla.org/firefox/433/">FlashBlock</a> extensions, |
134 |
-and you should probably disable <a href="about:plugins">plugins</a> |
|
134 |
+and you should probably uninstall other <a href="about:plugins">plugins</a> |
|
135 | 135 |
in general. |
136 | 136 |
<!-- You may also find |
137 | 137 |
<a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a |
... | ... |
@@ -139,7 +139,7 @@ href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. --> |
139 | 139 |
</p> |
140 | 140 |
|
141 | 141 |
<p>Third, beware of cookies: if you ever browse without Tor and Privoxy |
142 |
-and a site gives you a cookie, that cookie can identify you even when |
|
142 |
+and a site gives you a cookie, that cookie could identify you even when |
|
143 | 143 |
you start using Tor again. You should clear your cookies frequently. <a |
144 | 144 |
href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
145 | 145 |
protect any cookies you do not want to lose. |
... | ... |
@@ -149,13 +149,17 @@ protect any cookies you do not want to lose. |
149 | 149 |
and it encrypts everything inside the Tor network, but <a |
150 | 150 |
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it |
151 | 151 |
can't encrypt your traffic between the Tor network and its final |
152 |
-destination.</a> If you |
|
153 |
-are communicating sensitive information, you should use the same level |
|
154 |
-of care that you would on the normal scary Internet -- use SSL or other |
|
155 |
-end-to-end encryption and authentication approaches. |
|
152 |
+destination.</a> |
|
153 |
+If you are communicating sensitive information, you should use as much |
|
154 |
+care as you would on the normal scary Internet — use SSL or other |
|
155 |
+end-to-end encryption and authentication. Also, while Tor blocks attackers |
|
156 |
+on your local network from discovering or influencing your destination, |
|
157 |
+it opens new risks: malicious or misconfigured Tor exit nodes can send |
|
158 |
+you the wrong page, or even send you embedded Java applets disguised as |
|
159 |
+domains you trust. |
|
156 | 160 |
</p> |
157 | 161 |
|
158 |
-<p>Lastly, be smart and learn more. Understand what Tor offers and what |
|
162 |
+<p>Last, be smart and learn more. Understand what Tor offers and what |
|
159 | 163 |
it doesn't offer. This list of pitfalls isn't complete, and we need your |
160 | 164 |
help <a href="<page volunteer>#Documentation">identifying and documenting |
161 | 165 |
all the issues</a>. |
162 | 166 |