Mike Perry commited on 2011-12-24 21:39:54
Zeige 2 geänderte Dateien mit 84 Einfügungen und 74 Löschungen.
... | ... |
@@ -148,56 +148,61 @@ |
148 | 148 |
|
149 | 149 |
<ol> |
150 | 150 |
<li> |
151 |
-Tor only protects Internet applications that are configured to send |
|
152 |
-their traffic through Tor — it doesn't magically anonymize all |
|
153 |
-your traffic just because you install it. We recommend you use the |
|
154 |
-<a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It is |
|
155 |
-pre-configured to protect your privacy and anonymity on the web as long |
|
156 |
-as you are browsing with Tor Browser. |
|
151 |
+ |
|
152 |
+Tor only protects Internet applications that are configured to send their |
|
153 |
+traffic through Tor — it doesn't magically anonymize all of your traffic |
|
154 |
+just because you install it. We strongly recommend you use the <a href="<page |
|
155 |
+projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect |
|
156 |
+your privacy and anonymity on the web as long as you're browsing with Tor |
|
157 |
+Browser itself. Almost any other web browser configuration is likely to be |
|
158 |
+unsafe. Similarly, we do not recommend installing additional addons into the |
|
159 |
+Tor Browser, as these may bypass Tor or otherwise impede your anonymity. |
|
160 |
+ |
|
157 | 161 |
</li> |
158 | 162 |
|
159 | 163 |
<li> |
160 |
-Tor Browser and Torbutton block browser plugins such as Java, Flash, |
|
164 |
+ |
|
165 |
+The Tor Browser will block browser plugins such as Java, Flash, |
|
161 | 166 |
ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they |
162 | 167 |
can be manipulated into revealing your IP address. For example, that |
163 |
-means Youtube is disabled. If you really need your Youtube, you can <a |
|
164 |
-href="<page torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> |
|
168 |
+means Youtube is disabled. If you really need your Youtube, you can |
|
169 |
+<a href="<page torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> |
|
165 | 170 |
to allow it; but be aware that you're opening yourself up to potential |
166 |
-attack. Also, extensions like Google toolbar look up more information |
|
167 |
-about the websites you type in: they may bypass Tor and/or broadcast |
|
168 |
-sensitive information. Some people prefer using two browsers (one for Tor, |
|
169 |
-one for non-Tor browsing). |
|
170 |
-</li> |
|
171 |
+attack. |
|
171 | 172 |
|
172 |
-<li> |
|
173 |
-Beware of cookies: if you ever browse without Tor and a site gives |
|
174 |
-you a cookie, that cookie could identify you even when you start |
|
175 |
-using Tor again. Torbutton tries to handle your cookies safely. <a |
|
176 |
-href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
|
177 |
-protect any cookies you do not want to lose. |
|
178 | 173 |
</li> |
179 | 174 |
|
180 | 175 |
<li> |
181 |
-Tor anonymizes the origin of your traffic, and it encrypts everything |
|
182 |
-between you and the Tor network and everything inside the Tor network, |
|
183 |
-but <a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it |
|
184 |
-can't encrypt your traffic between the Tor network and its final |
|
185 |
-destination.</a> If you are communicating sensitive information, you |
|
186 |
-should use as much care as you would on the normal scary Internet — |
|
187 |
-use HTTPS or other end-to-end encryption and authentication. <a |
|
188 |
-href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> is a |
|
189 |
-Firefox extension produced as a collaboration between The Tor Project |
|
190 |
-and the Electronic Frontier Foundation. It encrypts your communications |
|
191 |
-with a number of major websites. |
|
176 |
+ |
|
177 |
+Similarly, the Tor Browser Bundle will warn you before automatically opening |
|
178 |
+documents that are handled by external applications. <b>DO NOT IGNORE THIS |
|
179 |
+WARNING</b>. You should be very careful when downloading documents via Tor |
|
180 |
+(especially DOC and PDF files) as these documents can contain Internet |
|
181 |
+resources that will be downloaded outside of Tor by the application that |
|
182 |
+opens them. These documents can be modified by malicious exit nodes, or by |
|
183 |
+someone who is trying to trick you into revealing your non-Tor IP address. If |
|
184 |
+you must work with DOC and/or PDF files, we strongly recommend using a |
|
185 |
+disconnected computer, a <a href="https://www.virtualbox.org/">VirtualBox</a> |
|
186 |
+free <a href="http://virtualboxes.org/">image</a> with networking disabled, or |
|
187 |
+<a href="http://tails.boum.org/">Tails</a>. |
|
188 |
+ |
|
192 | 189 |
</li> |
193 | 190 |
|
194 | 191 |
<li> |
195 |
-While Tor blocks attackers on your local network from discovering |
|
196 |
-or influencing your destination, it opens new risks: malicious or |
|
197 |
-misconfigured Tor exit nodes can send you the wrong page, or even send |
|
198 |
-you embedded Java applets disguised as domains you trust. Be careful |
|
199 |
-opening documents or applications you download through Tor, unless you've |
|
200 |
-verified their integrity. |
|
192 |
+ |
|
193 |
+Tor anonymizes the origin of your traffic, and it encrypts everything between |
|
194 |
+you and the Tor network and everything inside the Tor network, but |
|
195 |
+<a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it can't encrypt your traffic |
|
196 |
+between the Tor network and its final destination.</a> To help ensure |
|
197 |
+privacy for this last leg, the Tor Browser Bundle includes |
|
198 |
+<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to encrypt |
|
199 |
+your communications with a number of major websites, but you should still |
|
200 |
+watch the browser URL bar to ensure that websites you provide sensitive information |
|
201 |
+to display a |
|
202 |
+<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or |
|
203 |
+green validation</a>, include <b>https://</b> in the URL bar, |
|
204 |
+and display the proper name for the current website. |
|
205 |
+ |
|
201 | 206 |
</li> |
202 | 207 |
|
203 | 208 |
<li> |
... | ... |
@@ -286,56 +286,61 @@ |
286 | 286 |
|
287 | 287 |
<ol> |
288 | 288 |
<li> |
289 |
-Tor only protects Internet applications that are configured to send |
|
290 |
-their traffic through Tor — it doesn't magically anonymize all |
|
291 |
-your traffic just because you install it. We recommend you use the |
|
292 |
-<a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It is |
|
293 |
-pre-configured to protect your privacy and anonymity on the web as long |
|
294 |
-as you're browsing with Tor Browser. |
|
289 |
+ |
|
290 |
+Tor only protects Internet applications that are configured to send their |
|
291 |
+traffic through Tor — it doesn't magically anonymize all of your traffic |
|
292 |
+just because you install it. We strongly recommend you use the <a href="<page |
|
293 |
+projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect |
|
294 |
+your privacy and anonymity on the web as long as you're browsing with Tor |
|
295 |
+Browser itself. Almost any other web browser configuration is likely to be |
|
296 |
+unsafe. Similarly, we do not recommend installing additional addons into the |
|
297 |
+Tor Browser, as these may bypass Tor or otherwise impede your anonymity. |
|
298 |
+ |
|
295 | 299 |
</li> |
296 | 300 |
|
297 | 301 |
<li> |
298 |
-Tor Browser and Torbutton block browser plugins such as Java, Flash, |
|
302 |
+ |
|
303 |
+The Tor Browser will block browser plugins such as Java, Flash, |
|
299 | 304 |
ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they |
300 | 305 |
can be manipulated into revealing your IP address. For example, that |
301 |
-means Youtube is disabled. If you really need your Youtube, you can <a |
|
302 |
-href="<page torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> |
|
306 |
+means Youtube is disabled. If you really need your Youtube, you can |
|
307 |
+<a href="<page torbutton/torbutton-faq>#noflash">reconfigure Torbutton</a> |
|
303 | 308 |
to allow it; but be aware that you're opening yourself up to potential |
304 |
-attack. Also, extensions like Google toolbar look up more information |
|
305 |
-about the websites you type in: they may bypass Tor and/or broadcast |
|
306 |
-sensitive information. Some people prefer using two browsers (one for Tor, |
|
307 |
-one for non-Tor browsing). |
|
308 |
-</li> |
|
309 |
+attack. |
|
309 | 310 |
|
310 |
-<li> |
|
311 |
-Beware of cookies: if you ever browse without Tor and a site gives |
|
312 |
-you a cookie, that cookie could identify you even when you start |
|
313 |
-using Tor again. Torbutton tries to handle your cookies safely. <a |
|
314 |
-href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
|
315 |
-protect any cookies you do not want to lose. |
|
316 | 311 |
</li> |
317 | 312 |
|
318 | 313 |
<li> |
319 |
-Tor anonymizes the origin of your traffic, and it encrypts everything |
|
320 |
-between you and the Tor network and everything inside the Tor network, |
|
321 |
-but <a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it |
|
322 |
-can't encrypt your traffic between the Tor network and its final |
|
323 |
-destination.</a> If you are communicating sensitive information, you |
|
324 |
-should use as much care as you would on the normal scary Internet — |
|
325 |
-use HTTPS or other end-to-end encryption and authentication. <a |
|
326 |
-href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> is a |
|
327 |
-Firefox extension produced as a collaboration between The Tor Project |
|
328 |
-and the Electronic Frontier Foundation. It encrypts your communications |
|
329 |
-with a number of major websites. |
|
314 |
+ |
|
315 |
+Similarly, the Tor Browser Bundle will warn you before automatically opening |
|
316 |
+documents that are handled by external applications. <b>DO NOT IGNORE THIS |
|
317 |
+WARNING</b>. You should be very careful when downloading documents via Tor |
|
318 |
+(especially DOC and PDF files) as these documents can contain Internet |
|
319 |
+resources that will be downloaded outside of Tor by the application that |
|
320 |
+opens them. These documents can be modified by malicious exit nodes, or by |
|
321 |
+someone who is trying to trick you into revealing your non-Tor IP address. If |
|
322 |
+you must work with DOC and/or PDF files, we strongly recommend using a |
|
323 |
+disconnected computer, a <a href="https://www.virtualbox.org/">VirtualBox</a> |
|
324 |
+free <a href="http://virtualboxes.org/">image</a> with networking disabled, or |
|
325 |
+<a href="http://tails.boum.org/">Tails</a>. |
|
326 |
+ |
|
330 | 327 |
</li> |
331 | 328 |
|
332 | 329 |
<li> |
333 |
-While Tor blocks attackers on your local network from discovering |
|
334 |
-or influencing your destination, it opens new risks: malicious or |
|
335 |
-misconfigured Tor exit nodes can send you the wrong page, or even send |
|
336 |
-you embedded Java applets disguised as domains you trust. Be careful |
|
337 |
-opening documents or applications you download through Tor, unless you've |
|
338 |
-verified their integrity. |
|
330 |
+ |
|
331 |
+Tor anonymizes the origin of your traffic, and it encrypts everything between |
|
332 |
+you and the Tor network and everything inside the Tor network, but |
|
333 |
+<a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it can't encrypt your traffic |
|
334 |
+between the Tor network and its final destination.</a> To help ensure |
|
335 |
+privacy for this last leg, the Tor Browser Bundle includes |
|
336 |
+<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to encrypt |
|
337 |
+your communications with a number of major websites, but you should still |
|
338 |
+watch the browser URL bar to ensure that websites you provide sensitive information |
|
339 |
+to display a |
|
340 |
+<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or |
|
341 |
+green validation</a>, include <b>https://</b> in the URL bar, |
|
342 |
+and display the proper name for the current website. |
|
343 |
+ |
|
339 | 344 |
</li> |
340 | 345 |
|
341 | 346 |
<li> |
342 | 347 |