Roger Dingledine commited on 2008-07-30 21:12:37
Zeige 3 geänderte Dateien mit 440 Einfügungen und 410 Löschungen.
... | ... |
@@ -0,0 +1,175 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision$ |
|
3 |
+# Translation-Priority: 3-low |
|
4 |
+ |
|
5 |
+#include "head.wmi" TITLE="Torbutton FAQ" |
|
6 |
+ |
|
7 |
+<div class="main-column"> |
|
8 |
+ |
|
9 |
+<!-- PUT CONTENT AFTER THIS TAG --> |
|
10 |
+ |
|
11 |
+<h2>Torbutton FAQ</h2> |
|
12 |
+<hr /> |
|
13 |
+ |
|
14 |
+<strong>I can't click on links or hit reload after I toggle Tor! Why?</strong> |
|
15 |
+ |
|
16 |
+<p> |
|
17 |
+Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox |
|
18 |
+Bug 409737</a>, pages can still open popups and perform Javascript redirects |
|
19 |
+and history access after Tor has been toggled. These popups and redirects can |
|
20 |
+be blocked, but unfortunately they are indistinguishable from normal user |
|
21 |
+interactions with the page (such as clicking on links, opening them in new |
|
22 |
+tabs/windows, or using the history buttons), and so those are blocked as a |
|
23 |
+side effect. Once that Firefox bug is fixed, this degree of isolation will |
|
24 |
+become optional (for people who do not want to accidentally click on links and |
|
25 |
+give away information via referrers). A workaround is to right click on the |
|
26 |
+link, and open it in a new tab or window. The tab or window won't load |
|
27 |
+automatically, but you can hit enter in the URL bar, and it will begin |
|
28 |
+loading. Hitting enter in the URL bar will also reload the page without |
|
29 |
+clicking the reload button. |
|
30 |
+</p> |
|
31 |
+ |
|
32 |
+<strong>My browser is in some weird state where nothing works right!</strong> |
|
33 |
+ |
|
34 |
+<p> |
|
35 |
+Try to disable Tor by clicking on the button, and then open a new window. If |
|
36 |
+that doesn't fix the issue, go to the preferences page and hit 'Restore |
|
37 |
+Defaults'. This should reset the extension and Firefox to a known good |
|
38 |
+configuration. If you can manage to reproduce whatever issue gets your |
|
39 |
+Firefox wedged, please file details at <a |
|
40 |
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">the |
|
41 |
+bug tracker</a>. |
|
42 |
+</p> |
|
43 |
+ |
|
44 |
+<strong>When I toggle Tor, my sites that use javascript stop working. Why?</strong> |
|
45 |
+ |
|
46 |
+<p> |
|
47 |
+Javascript can do things like wait until you have disabled Tor before trying |
|
48 |
+to contact its source site, thus revealing your IP address. As such, Torbutton |
|
49 |
+must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor |
|
50 |
+state changes from the state that was used to load a given page. These features |
|
51 |
+are re-enabled when Torbutton goes back into the state that was used to load |
|
52 |
+the page, but in some cases (particularly with Javascript and CSS) it is |
|
53 |
+sometimes not possible to fully recover from the resulting errors, and the |
|
54 |
+page is broken. Unfortunately, the only thing you can do (and still remain |
|
55 |
+safe from having your IP address leak) is to reload the page when you toggle |
|
56 |
+Tor, or just ensure you do all your work in a page before switching tor state. |
|
57 |
+</p> |
|
58 |
+ |
|
59 |
+<strong>When I use Tor, Firefox is no longer filling in logins/search boxes |
|
60 |
+for me. Why?</strong> |
|
61 |
+ |
|
62 |
+<p> |
|
63 |
+Currently, this is tied to the "<b>Block history writes during Tor</b>" |
|
64 |
+setting. If you have enabled that setting, all formfill functionality (both |
|
65 |
+saving and reading) is disabled. If this bothers you, you can uncheck that |
|
66 |
+option, but both history and forms will be saved. To prevent history |
|
67 |
+disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor |
|
68 |
+history reads if you allow history writing during Tor. |
|
69 |
+</p> |
|
70 |
+ |
|
71 |
+<strong>Which Firefox extensions should I avoid using?</strong> |
|
72 |
+ |
|
73 |
+<p> |
|
74 |
+This is a tough one. There are thousands of Firefox extensions: making a |
|
75 |
+complete list of ones that are bad for anonymity is near impossible. However, |
|
76 |
+here are a few examples that should get you started as to what sorts of |
|
77 |
+behavior are dangerous. |
|
78 |
+</p> |
|
79 |
+ |
|
80 |
+<ol> |
|
81 |
+ <li>StumbleUpon, et al</li> |
|
82 |
+ These extensions will send all sorts of information about the websites you |
|
83 |
+ visit to the stumbleupon servers, and correlate this information with a |
|
84 |
+ unique identifier. This is obviously terrible for your anonymity. |
|
85 |
+ More generally, any sort of extension that requires registration, or even |
|
86 |
+ extensions that provide information about websites you visit should be |
|
87 |
+ suspect. |
|
88 |
+ |
|
89 |
+ <li>FoxyProxy</li> |
|
90 |
+ |
|
91 |
+While FoxyProxy is a nice idea in theory, in practice it is impossible to |
|
92 |
+configure securely for Tor usage without Torbutton. Like all vanilla third |
|
93 |
+party proxy plugins, the main risks are <a |
|
94 |
+href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
|
95 |
+and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
|
96 |
+disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
|
97 |
+adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
98 |
+Model</a> for more information). However, even with Torbutton installed in |
|
99 |
+tandem and always enabled, it is still very difficult (though not impossible) |
|
100 |
+to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only |
|
101 |
+applies to specific urls, and not to an entire tab, setting FoxyProxy to only |
|
102 |
+send specific sites through Tor will still allow adservers to still learn your |
|
103 |
+real IP. Worse, if those sites use offsite logging services such as Google |
|
104 |
+Analytics, you may still end up in their logs with your real IP. Malicious |
|
105 |
+exit nodes can also cooperate with sites to inject images into pages that |
|
106 |
+bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor |
|
107 |
+is much more viable, but be very careful with the filters you allow. For |
|
108 |
+example, something as simple as allowing *google* to go via Non-Tor will still |
|
109 |
+cause you to end up in all the logs of all websites that use Google Analytics! |
|
110 |
+See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this |
|
111 |
+question</a> on the FoxyProxy FAQ for more information. |
|
112 |
+ |
|
113 |
+ <li>NoScript</li> |
|
114 |
+ Torbutton currently mitigates all known anonymity issues with Javascript. |
|
115 |
+ While it may be tempting to get better security by disabling Javascript for |
|
116 |
+ certain sites, you are far better off with an all-or-nothing approach. |
|
117 |
+ NoScript is exceedingly complicated, and has many subtleties that can surprise |
|
118 |
+ even advanced users. For example, addons.mozilla.org verifies extension |
|
119 |
+ integrity via Javascript over https, but downloads them in the clear. Not |
|
120 |
+ adding it to your whitelist effectively |
|
121 |
+ means you are pulling down unverified extensions. Worse still, using NoScript |
|
122 |
+ can actually disable protections that Torbutton itself provides via |
|
123 |
+ Javascript, yet still allow malicious exit nodes to compromise your |
|
124 |
+ anonymity via the default whitelist (which they can spoof to inject any script they want). |
|
125 |
+ |
|
126 |
+</ol> |
|
127 |
+ |
|
128 |
+<strong>Which Firefox extensions do you recommend?</strong> |
|
129 |
+<ol> |
|
130 |
+ <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li> |
|
131 |
+ Mentioned above, this extension allows more fine-grained referrer spoofing |
|
132 |
+than Torbutton currently provides. It should break less sites than Torbutton's |
|
133 |
+referrer spoofing option. |
|
134 |
+ <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a></li> |
|
135 |
+ If you use Tor excessively, and rarely disable it, you probably want to |
|
136 |
+install this extension to minimize the ability of sites to store long term |
|
137 |
+identifiers in your cache. This extension applies same origin policy to the |
|
138 |
+cache, so that elements are retrieved from the cache only if they are fetched |
|
139 |
+from a document in the same origin domain as the cached element. |
|
140 |
+</ol> |
|
141 |
+ |
|
142 |
+<strong>Are there any other issues I should be concerned about?</strong> |
|
143 |
+ |
|
144 |
+<p> |
|
145 |
+There is currently one known unfixed security issue with Torbutton: it is |
|
146 |
+possible to unmask the javascript hooks that wrap the Date object to conceal |
|
147 |
+your timezone in Firefox 2, and the timezone masking code does not work at all |
|
148 |
+on Firefox 3. We are working with the Firefox team to fix one of <a |
|
149 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=392274">Bug 399274</a> or |
|
150 |
+<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=419598">Bug 419598</a> |
|
151 |
+to address this. In the meantime, it is possible to set the <b>TZ</b> |
|
152 |
+environment variable to <b>UTC</b> to cause the browser to use UTC as your |
|
153 |
+timezone. Under Linux, you can add an <b>export TZ=UTC</b> to the |
|
154 |
+/usr/bin/firefox script, or edit your system bashrc to do the same. Under |
|
155 |
+Windows, you can set either a <a |
|
156 |
+href="http://support.microsoft.com/kb/310519">User or System Environment |
|
157 |
+Variable</a> for TZ via My Computer's properties. In MacOS, the situation is |
|
158 |
+<a |
|
159 |
+href="http://developer.apple.com/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/EnvironmentVars.html#//apple_ref/doc/uid/20002093-BCIJIJBH">a |
|
160 |
+lot more complicated</a>, unfortunately. |
|
161 |
+</p> |
|
162 |
+ |
|
163 |
+<p> |
|
164 |
+In addition, RSS readers such as Firefox Livemarks can perform |
|
165 |
+periodic fetches. Due to <a |
|
166 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=436250">Firefox Bug |
|
167 |
+436250</a>, there is no way to disable Livemark fetches during Tor. This can |
|
168 |
+be a problem if you have a lot of custom Livemark urls that can give away |
|
169 |
+information about your identity. |
|
170 |
+</p> |
|
171 |
+ |
|
172 |
+ </div><!-- #main --> |
|
173 |
+ |
|
174 |
+#include <foot.wmi> |
|
175 |
+ |
... | ... |
@@ -81,12 +81,11 @@ function install (aEvent) |
81 | 81 |
</script> |
82 | 82 |
|
83 | 83 |
<h2>Torbutton</h2> |
84 |
-<hr> |
|
84 |
+<hr /> |
|
85 | 85 |
|
86 | 86 |
<strong>Current version:</strong><version-torbutton><br/> |
87 | 87 |
<br/> |
88 | 88 |
<strong>Authors:</strong> Scott Squires & Mike Perry<br/> |
89 |
-<strong>Email:</strong> squires at freehaven dot net, mikeperry (o) fscked/org<br/> |
|
90 | 89 |
<br/> |
91 | 90 |
<strong>Install:</strong> |
92 | 91 |
<a href="http://www.torproject.org/torbutton/torbutton-current.xpi" |
... | ... |
@@ -104,9 +103,6 @@ Google search plugins for |
104 | 103 |
<a href="/jsreq.html" title="Ref: 14938 (googleCA)" |
105 | 104 |
onClick="addOpenSearch('googleuk_web','png','General','14445','g');return false">Google UK</a>. |
106 | 105 |
<br/> |
107 |
-<!-- |
|
108 |
-<strong>Install:</strong> <a href="torbutton-1.0.4.xpi">torbutton-1.0.4.xpi</a><br/> |
|
109 |
---> |
|
110 | 106 |
<strong>Source:</strong> You can <a |
111 | 107 |
href="https://svn.torproject.org/svn/torbutton/trunk/">browse the |
112 | 108 |
repository</a> or simply unzip the xpi. |
... | ... |
@@ -116,7 +112,7 @@ repository</a> or simply unzip the xpi. |
116 | 112 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/CHANGELOG">changelog</a> <b>|</b> |
117 | 113 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/LICENCE">license</a> <b>|</b> |
118 | 114 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/CREDITS">credits</a> <b>]</b><br/> |
119 |
-<h2>About</h2> |
|
115 |
+ |
|
120 | 116 |
<p> |
121 | 117 |
Torbutton is a 1-click way for Firefox users to enable or disable |
122 | 118 |
the browser's use of <a href="<page index>">Tor</a>. |
... | ... |
@@ -124,418 +120,24 @@ It adds a panel to the statusbar that says "Tor Enabled" (in green) or |
124 | 120 |
"Tor Disabled" (in red). The user may click on the panel to toggle |
125 | 121 |
the status. If the user (or some other extension) changes the proxy |
126 | 122 |
settings, the change is automatically reflected in the statusbar. |
127 |
-</p><p> |
|
128 |
-Some users may prefer a toolbar button instead of a statusbar panel. Such |
|
129 |
-a button is included, and one adds it to the toolbar by right-clicking |
|
130 |
-on the desired toolbar, selecting "Customize...", and then dragging the |
|
131 |
-Torbutton icon onto the toolbar. There is an option in the preferences |
|
132 |
-to hide the statusbar panel (Tools->Extensions, select Torbutton, |
|
133 |
-and click on Preferences). |
|
134 |
-</p> |
|
135 |
-<p> |
|
136 |
-Newer Firefoxes have the ability to send DNS resolves through the socks |
|
137 |
-proxy, and Torbutton will make use of this feature if it is available |
|
138 |
-in your version of Firefox. |
|
139 | 123 |
</p> |
140 | 124 |
|
141 |
-<a id="FAQ"></a><h2>FAQ</h2> |
|
142 |
- |
|
143 |
-<strong>I can't click on links or hit reload after I toggle Tor! Why?</strong> |
|
144 |
- |
|
145 | 125 |
<p> |
146 |
-Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox |
|
147 |
-Bug 409737</a>, pages can still open popups and perform Javascript redirects |
|
148 |
-and history access after Tor has been toggled. These popups and redirects can |
|
149 |
-be blocked, but unfortunately they are indistinguishable from normal user |
|
150 |
-interactions with the page (such as clicking on links, opening them in new |
|
151 |
-tabs/windows, or using the history buttons), and so those are blocked as a |
|
152 |
-side effect. Once that Firefox bug is fixed, this degree of isolation will |
|
153 |
-become optional (for people who do not want to accidentally click on links and |
|
154 |
-give away information via referrers). A workaround is to right click on the |
|
155 |
-link, and open it in a new tab or window. The tab or window won't load |
|
156 |
-automatically, but you can hit enter in the URL bar, and it will begin |
|
157 |
-loading. Hitting enter in the URL bar will also reload the page without |
|
158 |
-clicking the reload button. |
|
126 |
+To keep you safe, Torbutton disables many types of active content. You |
|
127 |
+can learn more from the <a href="<page torbutton/faq>">Torbutton FAQ</a>, |
|
128 |
+or read more details in the <a href="<page torbutton/options>">Torbutton |
|
129 |
+options</a> list. |
|
159 | 130 |
</p> |
160 | 131 |
|
161 |
-<strong>My browser is in some weird state where nothing works right!</strong> |
|
162 |
- |
|
163 |
-<p> |
|
164 |
-Try to disable Tor by clicking on the button, and then open a new window. If |
|
165 |
-that doesn't fix the issue, go to the preferences page and hit 'Restore |
|
166 |
-Defaults'. This should reset the extension and Firefox to a known good |
|
167 |
-configuration. If you can manage to reproduce whatever issue gets your |
|
168 |
-Firefox wedged, please file details at <a |
|
169 |
-href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">the |
|
170 |
-bug tracker</a>. |
|
171 |
-</p> |
|
172 |
- |
|
173 |
-<strong>When I toggle Tor, my sites that use javascript stop working. Why?</strong> |
|
174 |
- |
|
175 | 132 |
<p> |
176 |
-Javascript can do things like wait until you have disabled Tor before trying |
|
177 |
-to contact its source site, thus revealing your IP address. As such, Torbutton |
|
178 |
-must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor |
|
179 |
-state changes from the state that was used to load a given page. These features |
|
180 |
-are re-enabled when Torbutton goes back into the state that was used to load |
|
181 |
-the page, but in some cases (particularly with Javascript and CSS) it is |
|
182 |
-sometimes not possible to fully recover from the resulting errors, and the |
|
183 |
-page is broken. Unfortunately, the only thing you can do (and still remain |
|
184 |
-safe from having your IP address leak) is to reload the page when you toggle |
|
185 |
-Tor, or just ensure you do all your work in a page before switching tor state. |
|
186 |
-</p> |
|
187 |
- |
|
188 |
-<strong>When I use Tor, Firefox is no longer filling in logins/search boxes |
|
189 |
-for me. Why?</strong> |
|
190 |
- |
|
191 |
-<p> |
|
192 |
-Currently, this is tied to the "<b>Block history writes during Tor</b>" |
|
193 |
-setting. If you have enabled that setting, all formfill functionality (both |
|
194 |
-saving and reading) is disabled. If this bothers you, you can uncheck that |
|
195 |
-option, but both history and forms will be saved. To prevent history |
|
196 |
-disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor |
|
197 |
-history reads if you allow history writing during Tor. |
|
198 |
-</p> |
|
199 |
- |
|
200 |
-<strong>Which Firefox extensions should I avoid using?</strong> |
|
201 |
- |
|
202 |
-<p> |
|
203 |
-This is a tough one. There are thousands of Firefox extensions: making a |
|
204 |
-complete list of ones that are bad for anonymity is near impossible. However, |
|
205 |
-here are a few examples that should get you started as to what sorts of |
|
206 |
-behavior are dangerous. |
|
207 |
-</p> |
|
208 |
- |
|
209 |
-<ol> |
|
210 |
- <li>StumbleUpon, et al</li> |
|
211 |
- These extensions will send all sorts of information about the websites you |
|
212 |
- visit to the stumbleupon servers, and correlate this information with a |
|
213 |
- unique identifier. This is obviously terrible for your anonymity. |
|
214 |
- More generally, any sort of extension that requires registration, or even |
|
215 |
- extensions that provide information about websites you visit should be |
|
216 |
- suspect. |
|
217 |
- |
|
218 |
- <li>FoxyProxy</li> |
|
219 |
- |
|
220 |
-While FoxyProxy is a nice idea in theory, in practice it is impossible to |
|
221 |
-configure securely for Tor usage without Torbutton. Like all vanilla third |
|
222 |
-party proxy plugins, the main risks are <a |
|
223 |
-href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
|
224 |
-and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
|
225 |
-disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
|
226 |
-adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
227 |
-Model</a> for more information). However, even with Torbutton installed in |
|
228 |
-tandem and always enabled, it is still very difficult (though not impossible) |
|
229 |
-to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only |
|
230 |
-applies to specific urls, and not to an entire tab, setting FoxyProxy to only |
|
231 |
-send specific sites through Tor will still allow adservers to still learn your |
|
232 |
-real IP. Worse, if those sites use offsite logging services such as Google |
|
233 |
-Analytics, you may still end up in their logs with your real IP. Malicious |
|
234 |
-exit nodes can also cooperate with sites to inject images into pages that |
|
235 |
-bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor |
|
236 |
-is much more viable, but be very careful with the filters you allow. For |
|
237 |
-example, something as simple as allowing *google* to go via Non-Tor will still |
|
238 |
-cause you to end up in all the logs of all websites that use Google Analytics! |
|
239 |
-See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this |
|
240 |
-question</a> on the FoxyProxy FAQ for more information. |
|
241 |
- |
|
242 |
- <li>NoScript</li> |
|
243 |
- Torbutton currently mitigates all known anonymity issues with Javascript. |
|
244 |
- While it may be tempting to get better security by disabling Javascript for |
|
245 |
- certain sites, you are far better off with an all-or-nothing approach. |
|
246 |
- NoScript is exceedingly complicated, and has many subtleties that can surprise |
|
247 |
- even advanced users. For example, addons.mozilla.org verifies extension |
|
248 |
- integrity via Javascript over https, but downloads them in the clear. Not |
|
249 |
- adding it to your whitelist effectively |
|
250 |
- means you are pulling down unverified extensions. Worse still, using NoScript |
|
251 |
- can actually disable protections that Torbutton itself provides via |
|
252 |
- Javascript, yet still allow malicious exit nodes to compromise your |
|
253 |
- anonymity via the default whitelist (which they can spoof to inject any script they want). |
|
254 |
- |
|
255 |
-</ol> |
|
256 |
- |
|
257 |
-<strong>Which Firefox extensions do you recommend?</strong> |
|
258 |
-<ol> |
|
259 |
- <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li> |
|
260 |
- Mentioned above, this extension allows more fine-grained referrer spoofing |
|
261 |
-than Torbutton currently provides. It should break less sites than Torbutton's |
|
262 |
-referrer spoofing option. |
|
263 |
- <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a></li> |
|
264 |
- If you use Tor excessively, and rarely disable it, you probably want to |
|
265 |
-install this extension to minimize the ability of sites to store long term |
|
266 |
-identifiers in your cache. This extension applies same origin policy to the |
|
267 |
-cache, so that elements are retrieved from the cache only if they are fetched |
|
268 |
-from a document in the same origin domain as the cached element. |
|
269 |
-</ol> |
|
270 |
- |
|
271 |
-<strong>Are there any other issues I should be concerned about?</strong> |
|
272 |
- |
|
273 |
-<p> |
|
274 |
-There is currently one known unfixed security issue with Torbutton: it is |
|
275 |
-possible to unmask the javascript hooks that wrap the Date object to conceal |
|
276 |
-your timezone in Firefox 2, and the timezone masking code does not work at all |
|
277 |
-on Firefox 3. We are working with the Firefox team to fix one of <a |
|
278 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=392274">Bug 399274</a> or |
|
279 |
-<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=419598">Bug 419598</a> |
|
280 |
-to address this. In the meantime, it is possible to set the <b>TZ</b> |
|
281 |
-environment variable to <b>UTC</b> to cause the browser to use UTC as your |
|
282 |
-timezone. Under Linux, you can add an <b>export TZ=UTC</b> to the |
|
283 |
-/usr/bin/firefox script, or edit your system bashrc to do the same. Under |
|
284 |
-Windows, you can set either a <a |
|
285 |
-href="http://support.microsoft.com/kb/310519">User or System Environment |
|
286 |
-Variable</a> for TZ via My Computer's properties. In MacOS, the situation is |
|
287 |
-<a |
|
288 |
-href="http://developer.apple.com/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/EnvironmentVars.html#//apple_ref/doc/uid/20002093-BCIJIJBH">a |
|
289 |
-lot more complicated</a>, unfortunately. |
|
290 |
-</p> |
|
291 |
- |
|
292 |
-<p> |
|
293 |
-In addition, RSS readers such as Firefox Livemarks can perform |
|
294 |
-periodic fetches. Due to <a |
|
295 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=436250">Firefox Bug |
|
296 |
-436250</a>, there is no way to disable Livemark fetches during Tor. This can |
|
297 |
-be a problem if you have a lot of custom Livemark urls that can give away |
|
298 |
-information about your identity. |
|
133 |
+Some users may prefer a toolbar button instead of a statusbar panel. |
|
134 |
+Torbutton lets you add a toolbar button by right-clicking |
|
135 |
+on the desired toolbar, selecting "Customize...", and then dragging the |
|
136 |
+Torbutton icon onto the toolbar. There is an option in the preferences |
|
137 |
+to hide the statusbar panel (Tools->Extensions, select Torbutton, |
|
138 |
+and click on Preferences). |
|
299 | 139 |
</p> |
300 | 140 |
|
301 |
-<h2>Description of Options</h2> |
|
302 |
- |
|
303 |
-<p>The development branch of Torbutton adds several new security features to |
|
304 |
-protect your anonymity from all the major threats the author is aware of. The |
|
305 |
-defaults should be fine for most people, but in case you are the tweaker type, |
|
306 |
-or if you prefer to try to outsource some options to more flexible extensions, |
|
307 |
-here is the complete list. (In an ideal world, these descriptions should all be |
|
308 |
-tooltips in the extension itself, but Firefox bugs <a |
|
309 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a |
|
310 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently |
|
311 |
-prevent this).</p> |
|
312 |
- |
|
313 |
-<ul> |
|
314 |
- <li>Disable plugins on Tor Usage (crucial)</li> |
|
315 |
- |
|
316 |
- This option is key to Tor security. Plugins perform their own networking |
|
317 |
-independent of the browser, and many plugins only partially obey even their own |
|
318 |
-proxy settings. |
|
319 |
- |
|
320 |
- <li>Isolate Dynamic Content to Tor State (crucial)</li> |
|
321 |
- |
|
322 |
- Another crucial option, this setting causes the plugin to disable Javascript |
|
323 |
- on tabs that are loaded during a Tor state different than the current one, |
|
324 |
- to prevent delayed fetches of injected URLs that contain unique identifiers, |
|
325 |
- and to prevent meta-refresh tags from revealing your IP when you turn off |
|
326 |
- Tor. It also prevents all fetches from tabs loaded with an opposite Tor |
|
327 |
- state. This serves to block non-Javascript dynamic content such as CSS |
|
328 |
- popups from revealing your IP address if you disable Tor. |
|
329 |
- |
|
330 |
- <li>Hook Dangerous Javascript (crucial)</li> |
|
331 |
- |
|
332 |
-This setting enables the Javascript hooking code. Javascript is injected into |
|
333 |
-pages to hook the Date object to mask your timezone, and to hook the navigator |
|
334 |
-object to mask OS and user agent properties not handled by the standard |
|
335 |
-Firefox user agent override settings. |
|
336 |
- |
|
337 |
- <li>Resize window dimensions to multiples of 50px on toggle (recommended)</li> |
|
338 |
- |
|
339 |
-To cut down on the amount of state available to fingerprint users uniquely, |
|
340 |
-this pref causes windows to be resized to a multiple of 50 pixels on each |
|
341 |
-side when Tor is enabled and pages are loaded. |
|
342 |
- |
|
343 |
- <li>Disable Updates During Tor (recommended)</li> |
|
344 |
- |
|
345 |
-Under Firefox 2, many extension authors did not update their extensions from |
|
346 |
-SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to |
|
347 |
-existing extensions. Since Firefox 3 now enforces encrypted and/or |
|
348 |
-authenticated updates, this setting is no longer as important as it once |
|
349 |
-was (though updates do leak information about which extensions you have, it is |
|
350 |
-fairly infrequent). |
|
351 |
- |
|
352 |
- <li>Disable Search Suggestions during Tor (optional)</li> |
|
353 |
- |
|
354 |
-This optional setting governs if you get Google search suggestions during Tor |
|
355 |
-usage. Since no cookie is transmitted during search suggestions, this is a |
|
356 |
-relatively benign behavior. |
|
357 |
- |
|
358 |
- <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</li> |
|
359 |
- |
|
360 |
-These settings prevent local html documents from transmitting local files to |
|
361 |
-arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that |
|
362 |
-force the browser to save arbitrary pages locally (and also inject script into |
|
363 |
-arbitrary html files you save to disk via Tor), it is probably a good idea to |
|
364 |
-leave this setting on. |
|
365 |
- |
|
366 |
- <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</li> |
|
367 |
- |
|
368 |
-These two settings allow you to obtain a greater degree of assurance that |
|
369 |
-after you toggle out of Tor, the pages are really gone and can't perform any |
|
370 |
-extra network activity. Currently, there is no known way that pages can still |
|
371 |
-perform activity after toggle, but these options exist as a backup measure |
|
372 |
-just in case a flaw is discovered. They can also serve as a handy 'Boss |
|
373 |
-Button' feature for clearing all Tor browsing off your screen in a hurry. |
|
374 |
- |
|
375 |
- <li>Isolate access to history navigation to Tor state (crucial)</li> |
|
376 |
- |
|
377 |
-This setting prevents both Javascript and accidental user clicks from causing |
|
378 |
-the session history to load pages that were fetched in a different Tor state |
|
379 |
-than the current one. Since this can be used to correlate Tor and Non-Tor |
|
380 |
-activity and thus determine your IP address, it is marked as a crucial |
|
381 |
-setting. |
|
382 |
- |
|
383 |
- <li>Block History Reads during Tor (crucial)</li> |
|
384 |
- |
|
385 |
- Based on code contributed by <a href="http://www.collinjackson.com/">Collin |
|
386 |
- Jackson</a>, when enabled and Tor is enabled, this setting prevents the |
|
387 |
-rendering engine from knowing if certain links were visited. This mechanism |
|
388 |
-defeats all document-based history disclosure attacks, including CSS-only |
|
389 |
-attacks. |
|
390 |
- |
|
391 |
- <li>Block History Reads during Non-Tor (recommended)</li> |
|
392 |
- |
|
393 |
- This setting accomplishes the same but for your Non-Tor activity. |
|
394 |
- |
|
395 |
- <li>Block History Writes during Tor (recommended)</li> |
|
396 |
- |
|
397 |
- This setting prevents the rendering engine from recording visited URLs, and |
|
398 |
-also disables download manager history. Note that if you allow writing of Tor history, |
|
399 |
-it is recommended that you disable non-Tor history reads, since malicious |
|
400 |
-websites you visit without Tor can query your history for .onion sites and |
|
401 |
-other history recorded during Tor usage (such as Google queries). |
|
402 |
- |
|
403 |
- <li>Block History Writes during Non-Tor (optional)</li> |
|
404 |
- |
|
405 |
-This setting also disables recording any history information during Non-Tor |
|
406 |
-usage. |
|
407 |
- |
|
408 |
-<li>Clear History During Tor Toggle (optional)</li> |
|
409 |
- |
|
410 |
- This is an alternate setting to use instead of (or in addition to) blocking |
|
411 |
-history reads or writes. |
|
412 |
- |
|
413 |
- <li>Block Password+Form saving during Tor/Non-Tor</li> |
|
414 |
- |
|
415 |
- These options govern if the browser writes your passwords and search |
|
416 |
- submissions to disk for the given state. |
|
417 |
- |
|
418 |
- <li>Block Tor disk cache and clear all cache on Tor Toggle</li> |
|
419 |
- |
|
420 |
- Since the browser cache can be leveraged to store unique identifiers, cache |
|
421 |
-must not persist across Tor sessions. This option keeps the memory cache active |
|
422 |
-during Tor usage for performance, but blocks disk access for caching. |
|
423 |
- |
|
424 |
- <li>Block disk and memory cache during Tor</li> |
|
425 |
- |
|
426 |
- This setting entirely blocks the cache during Tor, but preserves it for |
|
427 |
-Non-Tor usage. |
|
428 |
- |
|
429 |
- <li>Clear Cookies on Tor Toggle</li> |
|
430 |
- |
|
431 |
- Fully clears all cookies on Tor toggle. |
|
432 |
- |
|
433 |
- <li>Store Non-Tor cookies in a protected jar</li> |
|
434 |
- |
|
435 |
- This option stores your persistent Non-Tor cookies in a special cookie jar |
|
436 |
- file, in case you wish to preserve some cookies. Based on code contributed |
|
437 |
- by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is |
|
438 |
- compatible with third party extensions that you use to manage your Non-Tor |
|
439 |
- cookies. Your Tor cookies will be cleared on toggle, of course. |
|
440 |
- |
|
441 |
- <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</li> |
|
442 |
- |
|
443 |
- This option stores your persistent Tor and Non-Tor cookies |
|
444 |
- separate cookie jar files. Note that it is a bad idea to keep Tor |
|
445 |
- cookies around for any length of time, as they can be retrieved by exit |
|
446 |
- nodes that inject spoofed forms into plaintext pages you fetch. |
|
447 |
- |
|
448 |
- <li>Manage My Own Cookies (dangerous)</li> |
|
449 |
- |
|
450 |
- This setting allows you to manage your own cookies with an alternate |
|
451 |
-extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous, |
|
452 |
-since malicious exit nodes can spoof document elements that appear to be from |
|
453 |
-sites you have preserved cookies for (and can then do things like fetch your |
|
454 |
-entire gmail inbox, even if you were not using gmail or visiting any google |
|
455 |
-pages at the time!). |
|
456 |
- |
|
457 |
- <li>Do not write Tor/Non-Tor cookies to disk</li> |
|
458 |
- |
|
459 |
- These settings prevent Firefox from writing any cookies to disk during the |
|
460 |
- corresponding Tor state. If cookie jars are enabled, those jars will |
|
461 |
- exist in memory only, and will be cleared when Firefox exits. |
|
462 |
- |
|
463 |
- <li>Disable DOM Storage during Tor usage (crucial)</li> |
|
464 |
- |
|
465 |
- Firefox has recently added the ability to store additional state and |
|
466 |
- identifiers in persistent tables, called <a |
|
467 |
- href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>. |
|
468 |
- Obviously this can compromise your anonymity if stored content can be |
|
469 |
- fetched across Tor-state. |
|
470 |
- |
|
471 |
- <li>Clear HTTP auth sessions (recommended)</li> |
|
472 |
- |
|
473 |
- HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. |
|
474 |
- |
|
475 |
- <li>Clear cookies on Tor/Non-Tor shutdown</li> |
|
476 |
- |
|
477 |
- These settings install a shutdown handler to clear cookies on Tor |
|
478 |
-and/or Non-Tor browser shutdown. It is independent of your Clear Private Data |
|
479 |
-settings, and does in fact clear the corresponding cookie jars. |
|
480 |
- |
|
481 |
- <li>Prevent session store from saving Tor-loaded tabs (recommended)</li> |
|
482 |
- |
|
483 |
- This option augments the session store to prevent it from writing out |
|
484 |
- Tor-loaded tabs to disk. Unfortunately, this also disables your ability to |
|
485 |
- undo closed tabs. The reason why this setting is recommended is because |
|
486 |
- after a session crash, your browser will be in an undefined Tor state, and |
|
487 |
- can potentially load a bunch of Tor tabs without Tor. The following option |
|
488 |
- is another alternative to protect against this. |
|
489 |
- |
|
490 |
- <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</li> |
|
491 |
- |
|
492 |
- This setting allows you to choose which Tor state you want the browser to |
|
493 |
- start in normally: Tor, Non-Tor, or whatever state the browser shut down in. |
|
494 |
- |
|
495 |
- <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</li> |
|
496 |
- |
|
497 |
- When Firefox crashes, the Tor state upon restart usually is completely |
|
498 |
- random, and depending on your choice for the above option, may load |
|
499 |
- a bunch of tabs in the wrong state. This setting allows you to choose |
|
500 |
- which state the crashed session should always be restored in to. |
|
501 |
- |
|
502 |
- <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</li> |
|
503 |
- |
|
504 |
- These two settings allow you to control what the Firefox Session Store |
|
505 |
- writes to disk. Since the session store state is used to automatically |
|
506 |
- load websites after a crash or upgrade, it is advisable not to allow |
|
507 |
- Tor tabs to be written to disk, or they may get loaded in Non-Tor |
|
508 |
- after a crash (or the reverse, depending upon the crash recovery setting, |
|
509 |
- of course). |
|
510 |
- |
|
511 |
- <li>Set user agent during Tor usage (crucial)</li> |
|
512 |
- |
|
513 |
- User agent masking is done with the idea of making all Tor users appear |
|
514 |
-uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this |
|
515 |
-string and supporting navigator.* properties, and this version will remain the |
|
516 |
-same for all TorButton versions until such time as specific incompatibility |
|
517 |
-issues are demonstrated. Uniformity of this value is obviously very important |
|
518 |
-to anonymity. Note that for this option to have full effectiveness, the user |
|
519 |
-must also allow Hook Dangerous Javascript ensure that the navigator.* |
|
520 |
-properties are reset correctly. The browser does not set some of them via the |
|
521 |
-exposed user agent override preferences. |
|
522 |
- |
|
523 |
- <li>Spoof US English Browser</li> |
|
524 |
- |
|
525 |
-This option causes Firefox to send http headers as if it were an English |
|
526 |
-browser. Useful for internationalized users. |
|
527 |
- |
|
528 |
- <li>Don't send referrer during Tor Usage</li> |
|
529 |
- |
|
530 |
-This option disables the referrer header, preventing sites from determining |
|
531 |
-where you came from to visit them. This can break some sites, however. <a |
|
532 |
-href="http://www.digg.com">Digg</a> in particular seemed to be broken by this. |
|
533 |
-A more streamlined, less intrusive version of this option should be available |
|
534 |
-eventually. In the meantime, <a |
|
535 |
-href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can |
|
536 |
-provide this functionality via a default option of <b>Forge</b>. |
|
537 |
-</ul> |
|
538 |
- |
|
539 | 141 |
</div><!-- #main --> |
540 | 142 |
|
541 | 143 |
#include <foot.wmi> |
... | ... |
@@ -0,0 +1,253 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision$ |
|
3 |
+# Translation-Priority: 3-low |
|
4 |
+ |
|
5 |
+#include "head.wmi" TITLE="Torbutton Options" |
|
6 |
+ |
|
7 |
+<div class="main-column"> |
|
8 |
+ |
|
9 |
+<!-- PUT CONTENT AFTER THIS TAG --> |
|
10 |
+ |
|
11 |
+<h2>Torbutton Options</h2> |
|
12 |
+<hr /> |
|
13 |
+ |
|
14 |
+<p>The development branch of Torbutton adds several new security features to |
|
15 |
+protect your anonymity from all the major threats the author is aware of. The |
|
16 |
+defaults should be fine for most people, but in case you are the tweaker type, |
|
17 |
+or if you prefer to try to outsource some options to more flexible extensions, |
|
18 |
+here is the complete list. (In an ideal world, these descriptions should all be |
|
19 |
+tooltips in the extension itself, but Firefox bugs <a |
|
20 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a |
|
21 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently |
|
22 |
+prevent this).</p> |
|
23 |
+ |
|
24 |
+<ul> |
|
25 |
+ <li>Disable plugins on Tor Usage (crucial)</li> |
|
26 |
+ |
|
27 |
+ This option is key to Tor security. Plugins perform their own networking |
|
28 |
+independent of the browser, and many plugins only partially obey even their own |
|
29 |
+proxy settings. |
|
30 |
+ |
|
31 |
+ <li>Isolate Dynamic Content to Tor State (crucial)</li> |
|
32 |
+ |
|
33 |
+ Another crucial option, this setting causes the plugin to disable Javascript |
|
34 |
+ on tabs that are loaded during a Tor state different than the current one, |
|
35 |
+ to prevent delayed fetches of injected URLs that contain unique identifiers, |
|
36 |
+ and to prevent meta-refresh tags from revealing your IP when you turn off |
|
37 |
+ Tor. It also prevents all fetches from tabs loaded with an opposite Tor |
|
38 |
+ state. This serves to block non-Javascript dynamic content such as CSS |
|
39 |
+ popups from revealing your IP address if you disable Tor. |
|
40 |
+ |
|
41 |
+ <li>Hook Dangerous Javascript (crucial)</li> |
|
42 |
+ |
|
43 |
+This setting enables the Javascript hooking code. Javascript is injected into |
|
44 |
+pages to hook the Date object to mask your timezone, and to hook the navigator |
|
45 |
+object to mask OS and user agent properties not handled by the standard |
|
46 |
+Firefox user agent override settings. |
|
47 |
+ |
|
48 |
+ <li>Resize window dimensions to multiples of 50px on toggle (recommended)</li> |
|
49 |
+ |
|
50 |
+To cut down on the amount of state available to fingerprint users uniquely, |
|
51 |
+this pref causes windows to be resized to a multiple of 50 pixels on each |
|
52 |
+side when Tor is enabled and pages are loaded. |
|
53 |
+ |
|
54 |
+ <li>Disable Updates During Tor (recommended)</li> |
|
55 |
+ |
|
56 |
+Under Firefox 2, many extension authors did not update their extensions from |
|
57 |
+SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to |
|
58 |
+existing extensions. Since Firefox 3 now enforces encrypted and/or |
|
59 |
+authenticated updates, this setting is no longer as important as it once |
|
60 |
+was (though updates do leak information about which extensions you have, it is |
|
61 |
+fairly infrequent). |
|
62 |
+ |
|
63 |
+ <li>Disable Search Suggestions during Tor (optional)</li> |
|
64 |
+ |
|
65 |
+This optional setting governs if you get Google search suggestions during Tor |
|
66 |
+usage. Since no cookie is transmitted during search suggestions, this is a |
|
67 |
+relatively benign behavior. |
|
68 |
+ |
|
69 |
+ <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</li> |
|
70 |
+ |
|
71 |
+These settings prevent local html documents from transmitting local files to |
|
72 |
+arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that |
|
73 |
+force the browser to save arbitrary pages locally (and also inject script into |
|
74 |
+arbitrary html files you save to disk via Tor), it is probably a good idea to |
|
75 |
+leave this setting on. |
|
76 |
+ |
|
77 |
+ <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</li> |
|
78 |
+ |
|
79 |
+These two settings allow you to obtain a greater degree of assurance that |
|
80 |
+after you toggle out of Tor, the pages are really gone and can't perform any |
|
81 |
+extra network activity. Currently, there is no known way that pages can still |
|
82 |
+perform activity after toggle, but these options exist as a backup measure |
|
83 |
+just in case a flaw is discovered. They can also serve as a handy 'Boss |
|
84 |
+Button' feature for clearing all Tor browsing off your screen in a hurry. |
|
85 |
+ |
|
86 |
+ <li>Isolate access to history navigation to Tor state (crucial)</li> |
|
87 |
+ |
|
88 |
+This setting prevents both Javascript and accidental user clicks from causing |
|
89 |
+the session history to load pages that were fetched in a different Tor state |
|
90 |
+than the current one. Since this can be used to correlate Tor and Non-Tor |
|
91 |
+activity and thus determine your IP address, it is marked as a crucial |
|
92 |
+setting. |
|
93 |
+ |
|
94 |
+ <li>Block History Reads during Tor (crucial)</li> |
|
95 |
+ |
|
96 |
+ Based on code contributed by <a href="http://www.collinjackson.com/">Collin |
|
97 |
+ Jackson</a>, when enabled and Tor is enabled, this setting prevents the |
|
98 |
+rendering engine from knowing if certain links were visited. This mechanism |
|
99 |
+defeats all document-based history disclosure attacks, including CSS-only |
|
100 |
+attacks. |
|
101 |
+ |
|
102 |
+ <li>Block History Reads during Non-Tor (recommended)</li> |
|
103 |
+ |
|
104 |
+ This setting accomplishes the same but for your Non-Tor activity. |
|
105 |
+ |
|
106 |
+ <li>Block History Writes during Tor (recommended)</li> |
|
107 |
+ |
|
108 |
+ This setting prevents the rendering engine from recording visited URLs, and |
|
109 |
+also disables download manager history. Note that if you allow writing of Tor history, |
|
110 |
+it is recommended that you disable non-Tor history reads, since malicious |
|
111 |
+websites you visit without Tor can query your history for .onion sites and |
|
112 |
+other history recorded during Tor usage (such as Google queries). |
|
113 |
+ |
|
114 |
+ <li>Block History Writes during Non-Tor (optional)</li> |
|
115 |
+ |
|
116 |
+This setting also disables recording any history information during Non-Tor |
|
117 |
+usage. |
|
118 |
+ |
|
119 |
+<li>Clear History During Tor Toggle (optional)</li> |
|
120 |
+ |
|
121 |
+ This is an alternate setting to use instead of (or in addition to) blocking |
|
122 |
+history reads or writes. |
|
123 |
+ |
|
124 |
+ <li>Block Password+Form saving during Tor/Non-Tor</li> |
|
125 |
+ |
|
126 |
+ These options govern if the browser writes your passwords and search |
|
127 |
+ submissions to disk for the given state. |
|
128 |
+ |
|
129 |
+ <li>Block Tor disk cache and clear all cache on Tor Toggle</li> |
|
130 |
+ |
|
131 |
+ Since the browser cache can be leveraged to store unique identifiers, cache |
|
132 |
+must not persist across Tor sessions. This option keeps the memory cache active |
|
133 |
+during Tor usage for performance, but blocks disk access for caching. |
|
134 |
+ |
|
135 |
+ <li>Block disk and memory cache during Tor</li> |
|
136 |
+ |
|
137 |
+ This setting entirely blocks the cache during Tor, but preserves it for |
|
138 |
+Non-Tor usage. |
|
139 |
+ |
|
140 |
+ <li>Clear Cookies on Tor Toggle</li> |
|
141 |
+ |
|
142 |
+ Fully clears all cookies on Tor toggle. |
|
143 |
+ |
|
144 |
+ <li>Store Non-Tor cookies in a protected jar</li> |
|
145 |
+ |
|
146 |
+ This option stores your persistent Non-Tor cookies in a special cookie jar |
|
147 |
+ file, in case you wish to preserve some cookies. Based on code contributed |
|
148 |
+ by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is |
|
149 |
+ compatible with third party extensions that you use to manage your Non-Tor |
|
150 |
+ cookies. Your Tor cookies will be cleared on toggle, of course. |
|
151 |
+ |
|
152 |
+ <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</li> |
|
153 |
+ |
|
154 |
+ This option stores your persistent Tor and Non-Tor cookies |
|
155 |
+ separate cookie jar files. Note that it is a bad idea to keep Tor |
|
156 |
+ cookies around for any length of time, as they can be retrieved by exit |
|
157 |
+ nodes that inject spoofed forms into plaintext pages you fetch. |
|
158 |
+ |
|
159 |
+ <li>Manage My Own Cookies (dangerous)</li> |
|
160 |
+ |
|
161 |
+ This setting allows you to manage your own cookies with an alternate |
|
162 |
+extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous, |
|
163 |
+since malicious exit nodes can spoof document elements that appear to be from |
|
164 |
+sites you have preserved cookies for (and can then do things like fetch your |
|
165 |
+entire gmail inbox, even if you were not using gmail or visiting any google |
|
166 |
+pages at the time!). |
|
167 |
+ |
|
168 |
+ <li>Do not write Tor/Non-Tor cookies to disk</li> |
|
169 |
+ |
|
170 |
+ These settings prevent Firefox from writing any cookies to disk during the |
|
171 |
+ corresponding Tor state. If cookie jars are enabled, those jars will |
|
172 |
+ exist in memory only, and will be cleared when Firefox exits. |
|
173 |
+ |
|
174 |
+ <li>Disable DOM Storage during Tor usage (crucial)</li> |
|
175 |
+ |
|
176 |
+ Firefox has recently added the ability to store additional state and |
|
177 |
+ identifiers in persistent tables, called <a |
|
178 |
+ href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>. |
|
179 |
+ Obviously this can compromise your anonymity if stored content can be |
|
180 |
+ fetched across Tor-state. |
|
181 |
+ |
|
182 |
+ <li>Clear HTTP auth sessions (recommended)</li> |
|
183 |
+ |
|
184 |
+ HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. |
|
185 |
+ |
|
186 |
+ <li>Clear cookies on Tor/Non-Tor shutdown</li> |
|
187 |
+ |
|
188 |
+ These settings install a shutdown handler to clear cookies on Tor |
|
189 |
+and/or Non-Tor browser shutdown. It is independent of your Clear Private Data |
|
190 |
+settings, and does in fact clear the corresponding cookie jars. |
|
191 |
+ |
|
192 |
+ <li>Prevent session store from saving Tor-loaded tabs (recommended)</li> |
|
193 |
+ |
|
194 |
+ This option augments the session store to prevent it from writing out |
|
195 |
+ Tor-loaded tabs to disk. Unfortunately, this also disables your ability to |
|
196 |
+ undo closed tabs. The reason why this setting is recommended is because |
|
197 |
+ after a session crash, your browser will be in an undefined Tor state, and |
|
198 |
+ can potentially load a bunch of Tor tabs without Tor. The following option |
|
199 |
+ is another alternative to protect against this. |
|
200 |
+ |
|
201 |
+ <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</li> |
|
202 |
+ |
|
203 |
+ This setting allows you to choose which Tor state you want the browser to |
|
204 |
+ start in normally: Tor, Non-Tor, or whatever state the browser shut down in. |
|
205 |
+ |
|
206 |
+ <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</li> |
|
207 |
+ |
|
208 |
+ When Firefox crashes, the Tor state upon restart usually is completely |
|
209 |
+ random, and depending on your choice for the above option, may load |
|
210 |
+ a bunch of tabs in the wrong state. This setting allows you to choose |
|
211 |
+ which state the crashed session should always be restored in to. |
|
212 |
+ |
|
213 |
+ <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</li> |
|
214 |
+ |
|
215 |
+ These two settings allow you to control what the Firefox Session Store |
|
216 |
+ writes to disk. Since the session store state is used to automatically |
|
217 |
+ load websites after a crash or upgrade, it is advisable not to allow |
|
218 |
+ Tor tabs to be written to disk, or they may get loaded in Non-Tor |
|
219 |
+ after a crash (or the reverse, depending upon the crash recovery setting, |
|
220 |
+ of course). |
|
221 |
+ |
|
222 |
+ <li>Set user agent during Tor usage (crucial)</li> |
|
223 |
+ |
|
224 |
+ User agent masking is done with the idea of making all Tor users appear |
|
225 |
+uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this |
|
226 |
+string and supporting navigator.* properties, and this version will remain the |
|
227 |
+same for all TorButton versions until such time as specific incompatibility |
|
228 |
+issues are demonstrated. Uniformity of this value is obviously very important |
|
229 |
+to anonymity. Note that for this option to have full effectiveness, the user |
|
230 |
+must also allow Hook Dangerous Javascript ensure that the navigator.* |
|
231 |
+properties are reset correctly. The browser does not set some of them via the |
|
232 |
+exposed user agent override preferences. |
|
233 |
+ |
|
234 |
+ <li>Spoof US English Browser</li> |
|
235 |
+ |
|
236 |
+This option causes Firefox to send http headers as if it were an English |
|
237 |
+browser. Useful for internationalized users. |
|
238 |
+ |
|
239 |
+ <li>Don't send referrer during Tor Usage</li> |
|
240 |
+ |
|
241 |
+This option disables the referrer header, preventing sites from determining |
|
242 |
+where you came from to visit them. This can break some sites, however. <a |
|
243 |
+href="http://www.digg.com">Digg</a> in particular seemed to be broken by this. |
|
244 |
+A more streamlined, less intrusive version of this option should be available |
|
245 |
+eventually. In the meantime, <a |
|
246 |
+href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can |
|
247 |
+provide this functionality via a default option of <b>Forge</b>. |
|
248 |
+</ul> |
|
249 |
+ |
|
250 |
+ </div><!-- #main --> |
|
251 |
+ |
|
252 |
+#include <foot.wmi> |
|
253 |
+ |
|
0 | 254 |