Browse code

Bug 20465: Call it 'Tor Browser', not 'The Tor Browser'

Arthur Edelstein authored on25/10/2016 22:33:02
Showing10 changed files
... ...
@@ -255,7 +255,7 @@
255 255
           <dd>Researcher at University College London who works
256 256
           on security, performance, and usability of Tor. Original creator
257 257
           of the <a href="<page projects/torbrowser>">Tor Browser
258
-          Bundle</a> (now just called the Tor Browser). You can find
258
+          Bundle</a> (now just called Tor Browser). You can find
259 259
           out more about his work on his
260 260
           <a href="http://www.cs.ucl.ac.uk/staff/s.murdoch/">professional
261 261
           website</a>.</dd>
... ...
@@ -873,8 +873,8 @@ executive
873 873
 
874 874
     <p>No, it doesn't. You need to use a separate program that understands
875 875
     your application and protocol and knows how to clean or "scrub" the data
876
-    it sends. The Tor Browser tries to keep application-level data,
877
-    like the user-agent string, uniform for all users. The Tor Browser can't
876
+    it sends. Tor Browser tries to keep application-level data,
877
+    like the user-agent string, uniform for all users. Tor Browser can't
878 878
     do anything about text that you type into forms, though. <a
879 879
     href="<page download/download-easy>#warning">Be
880 880
     careful and be smart.</a>
... ...
@@ -1060,7 +1060,7 @@ from the graphical interface. Open "Files" (Unity's explorer), open
1060 1060
 Preferences-> Behavior Tab -> Set "Run executable text files when they are
1061 1061
 opened" to "Ask every time", then OK.
1062 1062
 </p>
1063
-<p>You can also start the Tor Browser from the command line by running </p>
1063
+<p>You can also start Tor Browser from the command line by running </p>
1064 1064
 <pre>./start-tor-browser</pre>
1065 1065
 <p>
1066 1066
 from inside the Tor Browser directory.
... ...
@@ -1104,7 +1104,7 @@ issue.
1104 1104
 Firefox extensions?</a></h3>
1105 1105
 
1106 1106
 <p>
1107
-The Tor Browser is free software, so there is nothing preventing you from
1107
+Tor Browser is free software, so there is nothing preventing you from
1108 1108
 modifying it any way you like. However, we do not recommend installing any
1109 1109
 additional Firefox add-ons with Tor Browser. Add-ons can break
1110 1110
 your anonymity in a number of ways, including browser fingerprinting and
... ...
@@ -1112,7 +1112,7 @@ bypassing proxy settings.
1112 1112
 </p>
1113 1113
 <p>
1114 1114
 Some people have suggested we include ad-blocking software or
1115
-anti-tracking software with the Tor Browser. Right now, we do not
1115
+anti-tracking software with Tor Browser. Right now, we do not
1116 1116
 think that's such a good idea. Tor Browser aims to provide
1117 1117
 sufficient privacy that additional add-ons to stop ads and trackers are
1118 1118
 not necessary. Using add-ons like these may cause some sites to break, which
... ...
@@ -1185,7 +1185,7 @@ really bad idea.
1185 1185
 Our efforts to work with the Chrome team to <a
1186 1186
 href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-and-fingerprinting">add
1187 1187
 missing APIs</a> were unsuccessful, unfortunately. Currently, it is impossible
1188
-to use other browsers and get the same level of protections as when using the
1188
+to use other browsers and get the same level of protections as when using
1189 1189
 Tor Browser.
1190 1190
 </p>
1191 1191
 
... ...
@@ -3375,9 +3375,9 @@ diversity,
3375 3375
     a web browser that is preconfigured to
3376 3376
     help you control the risks to your privacy and anonymity while browsing
3377 3377
     the Internet. Not only are the above technologies disabled to prevent
3378
-    identity leaks, the Tor Browser also includes browser extensions like
3378
+    identity leaks, Tor Browser also includes browser extensions like
3379 3379
     NoScript and Torbutton, as well as patches to the Firefox source
3380
-    code. The full design of the Tor Browser can be read <a
3380
+    code. The full design of Tor Browser can be read <a
3381 3381
     href="https://www.torproject.org/projects/torbrowser/design/">here</a>.
3382 3382
     In designing a safe, secure solution for browsing the web with Tor,
3383 3383
     we've discovered that configuring <a href="#TBBOtherBrowser">other
... ...
@@ -19,8 +19,8 @@
19 19
     are done.
20 20
     </h2>
21 21
 
22
-    <p>Even though the Tor Browser comes with a regular Tor, it will only run
23
-    as long as you keep the Tor Browser open. The following instructions will
22
+    <p>Even though Tor Browser comes with a regular Tor, it will only run
23
+    as long as you keep Tor Browser open. The following instructions will
24 24
     set up Tor without graphical interface or a browser. Many people prefer
25 25
     this over TBB when they host hidden services or relay traffic for other Tor
26 26
     users.  <hr>
... ...
@@ -67,7 +67,7 @@
67 67
     you will need to tell Windows the full path to the GnuPG program. If
68 68
     you installed GnuPG with the default values, the path should be
69 69
     something like this: <i>C:\Program Files\Gnu\GnuPg\gpg.exe</i>.</p>
70
-    <p>The Tor Browser team signs the Tor Browsers. Import its key
70
+    <p>The Tor Browser team signs Tor Browser releases. Import its key
71 71
     (0x4E2C6E8793298290) by starting <i>cmd.exe</i> and typing:</p>
72 72
     <pre>"C:\Program Files\Gnu\GnuPg\gpg.exe" --keyserver pool.sks-keyservers.net --recv-keys 0x4E2C6E8793298290</pre>
73 73
     <p>After importing the key, you can verify that the fingerprint
... ...
@@ -116,7 +116,7 @@
116 116
     </p>
117 117
 
118 118
     <p>The next step is to use GnuPG to import the key that signed
119
-    your package. The Tor Browser team signs the Tor Browsers. Import its
119
+    your package. The Tor Browser team signs Tor Browser releases. Import its
120 120
     key (0x4E2C6E8793298290) by starting the terminal (under "Applications"
121 121
     in Mac OS X) and typing:</p>
122 122
 
... ...
@@ -189,7 +189,7 @@
189 189
        property</a> of Tor Browser 3.0 and later. Anyone can build
190 190
        Tor Browser on their own machine and produce a binary that is
191 191
        bit-for-bit identical to the binary we offer on the download page.
192
-       Fortunately, it is not necessary for everyone to build the Tor Browser
192
+       Fortunately, it is not necessary for everyone to build Tor Browser
193 193
        locally to get this security. Verifying and comparing the signed list
194 194
        of <a href="https://en.wikipedia.org/wiki/Cryptographic_hash">hashes</a>
195 195
        will confirm that multiple people have built Tor Browsers
... ...
@@ -19,7 +19,7 @@
19 19
             anonymity and privacy technologies, supporting their
20 20
             unrestricted availability and use, and furthering their
21 21
             scientific and popular understanding. The main product of
22
-            the Tor Project is the Tor Browser, which enables people
22
+            the Tor Project is Tor Browser, which enables people
23 23
             to browse the internet anonymously.  The Tor Project is a
24 24
             501(c)3 tax-exempt non-profit organization based in Boston,
25 25
             Massachusetts. It was founded in 2006.</p>
... ...
@@ -215,14 +215,14 @@ exactly as you are used to.</p>
215 215
 
216 216
 <ol>
217 217
 
218
-<li><b>Use the Tor Browser</b>
218
+<li><b>Use Tor Browser</b>
219 219
 <p>Tor does not protect all of your computer's Internet traffic when you
220 220
 run it. Tor only protects your applications that are properly configured
221 221
 to send their Internet traffic through Tor. To avoid problems with
222 222
 Tor configuration, we strongly recommend you use the <a href="<page
223 223
 projects/torbrowser>">Tor Browser</a>. It is pre-configured to
224 224
 protect your privacy and anonymity on the web as long as you're browsing
225
-with the Tor Browser itself. Almost any other web browser configuration
225
+with Tor Browser itself. Almost any other web browser configuration
226 226
 is likely to be unsafe to use with Tor.</p>
227 227
 </li>
228 228
 <li><b>Don't torrent over Tor</b>
... ...
@@ -238,10 +238,10 @@ traffic</a> this way, you also slow down the entire Tor network for everyone els
238 238
 </p>
239 239
 </li>
240 240
 <li><b>Don't enable or install browser plugins</b>
241
-<p>The Tor Browser will block browser plugins such as Flash, RealPlayer,
241
+<p>Tor Browser will block browser plugins such as Flash, RealPlayer,
242 242
 Quicktime, and others: they can be manipulated into revealing your IP
243 243
 address.  Similarly, we do not recommend installing additional addons or
244
-plugins into the Tor Browser, as these may bypass Tor or otherwise harm
244
+plugins into Tor Browser, as these may bypass Tor or otherwise harm
245 245
 your anonymity and privacy.</p>
246 246
 </li>
247 247
 
... ...
@@ -250,7 +250,7 @@ your anonymity and privacy.</p>
250 250
 href="<page about/overview>#thesolution">to
251 251
 and within the Tor network</a>, but the encryption of your traffic to
252 252
 the final destination website depends upon on that website. To help
253
-ensure private encryption to websites, the Tor Browser includes
253
+ensure private encryption to websites, Tor Browser includes
254 254
 <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a>
255 255
 to force the use of HTTPS encryption with major websites that
256 256
 support it. However, you should still watch the browser URL bar to
... ...
@@ -265,7 +265,7 @@ and HTTPS relate</a>.
265 265
 </li>
266 266
 
267 267
 <li><b>Don't open documents downloaded through Tor while online</b>
268
-<p>The Tor Browser will warn you before automatically opening
268
+<p>Tor Browser will warn you before automatically opening
269 269
 documents that are handled by external applications. <b>DO NOT
270 270
 IGNORE THIS WARNING</b>.  You should be very careful when downloading
271 271
 documents via Tor (especially DOC and PDF files, unless you use the PDF
... ...
@@ -215,7 +215,7 @@ custom configurations. All an apt-get or yum install away.</p>
215 215
 you are used to.</p>
216 216
 
217 217
 <ol>
218
-<li><b>Use the Tor Browser</b>
218
+<li><b>Use Tor Browser</b>
219 219
 
220 220
 <p>
221 221
 
... ...
@@ -224,7 +224,7 @@ run it. Tor only protects your applications that are properly configured to
224 224
 send their Internet traffic through Tor. To avoid problems with Tor
225 225
 configuration, we strongly recommend you use the
226 226
 <a href="<page projects/torbrowser>">Tor Browser</a>. It is pre-configured to protect
227
-your privacy and anonymity on the web as long as you're browsing with the Tor
227
+your privacy and anonymity on the web as long as you're browsing with Tor
228 228
 Browser itself. Almost any other web browser configuration is likely to be
229 229
 unsafe to use with Tor.
230 230
 
... ...
@@ -249,10 +249,10 @@ traffic</a> this way, you also slow down the entire Tor network for everyone els
249 249
 
250 250
 <p>
251 251
 
252
-The Tor Browser will block browser plugins such as Flash, RealPlayer,
252
+Tor Browser will block browser plugins such as Flash, RealPlayer,
253 253
 Quicktime, and others: they can be manipulated into revealing your IP address.
254 254
 Similarly, we do not recommend installing additional addons or plugins into
255
-the Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
255
+Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
256 256
 privacy.
257 257
 
258 258
 </p>
... ...
@@ -267,7 +267,7 @@ Tor will encrypt your traffic
267 267
 <a href="<page about/overview>#thesolution">to and
268 268
 within the Tor network</a>, but the encryption of your traffic to the final
269 269
 destination website depends upon on that website. To help ensure private
270
-encryption to websites, the Tor Browser includes <a
270
+encryption to websites, Tor Browser includes <a
271 271
 href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
272 272
 use of HTTPS encryption with major websites that support it. However, you
273 273
 should still watch the browser URL bar to ensure that websites you provide
... ...
@@ -286,7 +286,7 @@ and HTTPS relate</a>.
286 286
 
287 287
 <p>
288 288
 
289
-The Tor Browser will warn you before automatically opening documents that are
289
+Tor Browser will warn you before automatically opening documents that are
290 290
 handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
291 291
 should be very careful when downloading documents via Tor (especially DOC and
292 292
 PDF files, unless you use the PDF viewer that's built into Tor Browser) as
... ...
@@ -14,7 +14,7 @@
14 14
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
15 15
    <meta name="viewport" content="width=device-width, initial-scale=1">
16 16
    <meta name="author" content="The Tor Project, Inc.">
17
-   <meta name="description" content="Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet. It also helps you bypass censorship online. If you can't open the website, email gettor@torproject.org for instruction on how to get the Tor Browser.">
17
+   <meta name="description" content="Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet. It also helps you bypass censorship online. If you can't open the website, email gettor@torproject.org for instruction on how to get Tor Browser.">
18 18
    <meta name="keywords" content="anonymity online, tor, tor project, censorship circumvention, traffic analysis, anonymous communications research">
19 19
    <meta property="og:image" content="https://www.torproject.org/images/tor-logo.jpg">
20 20
 
... ...
@@ -18,7 +18,7 @@ experience safer and better.</p>
18 18
 src="$(IMGROOT)/icon-TorBrowser.jpg" alt="TorBrowser Icon" width="75"
19 19
 height="75"></a>
20 20
 <div class="projectdesc"><div class="name"><a href="<page
21
-projects/torbrowser>">Tor Browser</a></div> <p>The Tor Browser
21
+projects/torbrowser>">Tor Browser</a></div> <p>Tor Browser
22 22
 contains everything you need to safely browse the Internet. This
23 23
 package requires no installation. Just extract it and run.</p>
24 24
 </div></div>
... ...
@@ -17,7 +17,7 @@
17 17
       <div class="tbb box">
18 18
 #include "side.wmi"
19 19
   <!-- END SIDECOL -->
20
-    <div class="pjtitle"><h2>What is the Tor Browser?</h2></div>
20
+    <div class="pjtitle"><h2>What is Tor Browser?</h2></div>
21 21
     <div class="pjtext">
22 22
       <p>The <strong>Tor</strong> software protects
23 23
       you by bouncing your communications around a distributed network of
... ...
@@ -25,7 +25,7 @@
25 25
       watching your Internet connection from learning what sites you visit,
26 26
       it prevents the sites you visit from learning your physical location,
27 27
       and it lets you access sites which are blocked.</p>
28
-      <p>The <strong>Tor Browser</strong> lets you use Tor on
28
+      <p><strong>Tor Browser</strong> lets you use Tor on
29 29
       Windows, Mac OS X, or Linux without needing to install any software.
30 30
       It can run off a USB flash drive, comes with a pre-configured web
31 31
       browser to protect your anonymity, and is self-contained
... ...
@@ -42,7 +42,7 @@
42 42
     </div>
43 43
     <!-- Commenting out the videos until support updates them to use TB 4.0
44 44
     <div class="pjvids">
45
-      <h3>Quick Videos on how to use the Tor Browser</h3>
45
+      <h3>Quick Videos on how to use Tor Browser</h3>
46 46
     </div>
47 47
     <div class="vidtable">
48 48
       <table>
... ...
@@ -624,7 +624,7 @@
624 624
       of web pages you visited and any cookies will be deleted.</p>
625 625
       <p><a href="$(IMGROOT)/tbb-screenshot3.jpg"><img src="$(IMGROOT)/tbb-screenshot3.jpg" alt="Screenshot of
626 626
       Firefox" width="860" height="645"></a></p>
627
-      <p>To use the Tor Browser again, double click on the "Start Tor Browser" application.</p>
627
+      <p>To use Tor Browser again, double click on the "Start Tor Browser" application.</p>
628 628
       <p>Remember that Tor anonymizes the origin of your traffic,
629 629
       and it encrypts everything inside the Tor network, but <a
630 630
       href="<wikifaq>#ExitEavesdroppers">it can't encrypt your traffic
... ...
@@ -643,7 +643,7 @@
643 643
       email the <a href="<page about/contact>">help desk</a>.</p>
644 644
       <br><br>
645 645
       <h3>Comments and suggestions</h3>
646
-      <p>The Tor Browser is under development.
646
+      <p>Tor Browser is under development.
647 647
       To discuss improvements and submit comments, please use the <a
648 648
       href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk">tor-talk</a>
649 649
       mailing list.</p>
... ...
@@ -651,7 +651,7 @@
651 651
       <h3>More information</h3>
652 652
       <p><strong><em>What is Tor and why do I need it?</em></strong> 
653 653
       <br>To learn more about Tor, visit the <a href="<page index>">Tor Project website</a>.</p>
654
-      <p><strong><em>What is in the Tor Browser?</em></strong>
654
+      <p><strong><em>What is in Tor Browser?</em></strong>
655 655
       <br>It contains Tor, a modified <a
656 656
       href="https://www.mozilla.org/en-US/firefox/organizations/">Firefox
657 657
       ESR</a>, Torbutton, TorLauncher,