...
|
...
|
@@ -45,11 +45,11 @@ clicking the reload button.
|
45
|
45
|
</p>
|
46
|
46
|
|
47
|
47
|
|
48
|
|
-<strong>I can't view videos on youtube and other flash-based sites. Why?</strong>
|
|
48
|
+<strong>I can't view videos on YouTube and other flash-based sites. Why?</strong>
|
49
|
49
|
|
50
|
50
|
<p>
|
51
|
51
|
|
52
|
|
-Plugins are binary blobs that get inserted into Firefox, can perform
|
|
52
|
+Plugins are binary blobs that get inserted into Firefox and can perform
|
53
|
53
|
arbitrary activity on your computer. This includes but is not limited to: <a
|
54
|
54
|
href="http://www.metasploit.com/research/projects/decloak/">completely
|
55
|
55
|
disregarding proxy settings</a>, querying your <a
|
...
|
...
|
@@ -69,16 +69,17 @@ annoying. Can't I just use the old version?</strong>
|
69
|
69
|
<p>
|
70
|
70
|
|
71
|
71
|
<b>No.</b> Use of the old version, or any other vanilla proxy changer
|
72
|
|
-(including FoxyProxy -- see below) is actively discouraged. Seriously. Using a
|
73
|
|
-vanilla proxy switcher by itself is so insecure that you are not only just
|
74
|
|
-wasting your time, you are also actually endangering yourself. Simply do not
|
75
|
|
-use Tor and you will have the same (or perhaps better!) security. For more
|
76
|
|
-information on the types of attacks you are exposed to with a "homegrown"
|
77
|
|
-solution, please see <a
|
|
72
|
+(including FoxyProxy -- see below) without Torbutton is actively discouraged.
|
|
73
|
+Seriously. Using a vanilla proxy switcher by itself is so insecure that you
|
|
74
|
+are not only just wasting your time, you are also actually endangering
|
|
75
|
+yourself. Simply do not use Tor and you will have the same (and in some cases,
|
|
76
|
+better) security. For more information on the types of attacks you are
|
|
77
|
+exposed to with a "homegrown" solution, please see <a
|
78
|
78
|
href="https://www.torproject.org/torbutton/design/#adversary">The Torbutton
|
79
|
|
-Adversary Model</a>, in particular the <b>Adversary Capabilities - Attacks</b>
|
80
|
|
-subsection. If there are any specific Torbutton behaviors that you do not
|
81
|
|
-like, please file a bug on <a
|
|
79
|
+Adversary Model</a>, in particular the
|
|
80
|
+<a href="https://www.torproject.org/torbutton/design/#attacks">Adversary
|
|
81
|
+Capabilities - Attacks</a> subsection. If there are any specific Torbutton
|
|
82
|
+behaviors that you do not like, please file a bug on <a
|
82
|
83
|
href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">the
|
83
|
84
|
bug tracker.</a> Most of Torbutton's security features can also be disabled
|
84
|
85
|
via its preferences, if you think you have your own protection for those
|
...
|
...
|
@@ -159,20 +160,19 @@ href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a>
|
159
|
160
|
and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history
|
160
|
161
|
disclosure</a>, followed closely by cookie theft by exit nodes and tracking by
|
161
|
162
|
adservers (see the <a href="design/index.html#adversary">Torbutton Adversary
|
162
|
|
-Model</a> for more information). However, even with Torbutton installed in
|
163
|
|
-tandem and always enabled, it is still very difficult (though not impossible)
|
164
|
|
-to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only
|
165
|
|
-applies to specific urls, and not to an entire tab, setting FoxyProxy to only
|
166
|
|
-send specific sites through Tor will still allow adservers to still learn your
|
167
|
|
-real IP. Worse, if those sites use offsite logging services such as Google
|
168
|
|
-Analytics, you may still end up in their logs with your real IP. Malicious
|
169
|
|
-exit nodes can also cooperate with sites to inject images into pages that
|
170
|
|
-bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor
|
171
|
|
-is much more viable, but be very careful with the filters you allow. For
|
172
|
|
-example, something as simple as allowing *google* to go via Non-Tor will still
|
173
|
|
-cause you to end up in all the logs of all websites that use Google Analytics!
|
174
|
|
-See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this
|
175
|
|
-question</a> on the FoxyProxy FAQ for more information.
|
|
163
|
+Model</a> for more information). However, with Torbutton installed in tandem
|
|
164
|
+and always enabled, it is possible to configure FoxyProxy securely (though it
|
|
165
|
+is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls,
|
|
166
|
+and not to an entire tab, setting FoxyProxy to only send specific sites
|
|
167
|
+through Tor will still allow adservers (whose hosts don't match your filters) to learn your real IP. Worse, when
|
|
168
|
+sites use offsite logging services such as Google Analytics, you will
|
|
169
|
+still end up in their logs with your real IP. Malicious exit nodes can also
|
|
170
|
+cooperate with sites to inject images into pages that bypass your filters.
|
|
171
|
+Setting FoxyProxy to only send certain URLs via Non-Tor is much more secure in
|
|
172
|
+this regard, but be very careful with the filters you allow. For example, something as simple as allowing *google* to go via Non-Tor will still cause you to end up
|
|
173
|
+in all the logs of all websites that use Google Analytics! See <a
|
|
174
|
+href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this question</a> on
|
|
175
|
+the FoxyProxy FAQ for more information.
|
176
|
176
|
|
177
|
177
|
<li>NoScript</li>
|
178
|
178
|
Torbutton currently mitigates all known anonymity issues with Javascript.
|
...
|
...
|
@@ -191,6 +191,13 @@ question</a> on the FoxyProxy FAQ for more information.
|
191
|
191
|
|
192
|
192
|
<strong>Which Firefox extensions do you recommend?</strong>
|
193
|
193
|
<ol>
|
|
194
|
+ <li><a href="https://crypto.stanford.edu/forcehttps/">ForceHTTPS</a></li>
|
|
195
|
+Many sites on the Internet are <a
|
|
196
|
+href="http://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry">sloppy
|
|
197
|
+about their use of HTTPS</a> and secure
|
|
198
|
+cookies. This addon can help you ensure that you always use HTTPS for sites
|
|
199
|
+that support it, and reduces the chances of your cookies being stolen for
|
|
200
|
+sites that do not secure them.
|
194
|
201
|
<li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li>
|
195
|
202
|
Mentioned above, this extension allows more fine-grained referrer spoofing
|
196
|
203
|
than Torbutton currently provides. It should break less sites than Torbutton's
|
...
|
...
|
@@ -201,13 +208,6 @@ install this extension to minimize the ability of sites to store long term
|
201
|
208
|
identifiers in your cache. This extension applies same origin policy to the
|
202
|
209
|
cache, so that elements are retrieved from the cache only if they are fetched
|
203
|
210
|
from a document in the same origin domain as the cached element.
|
204
|
|
- <li><a href="https://crypto.stanford.edu/forcehttps/">ForceHTTPS</a></li>
|
205
|
|
-Many sites on the Internet are <a
|
206
|
|
-href="http://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry">sloppy
|
207
|
|
-about their use of HTTPS</a> and secure
|
208
|
|
-cookies. This addon can help you ensure that you always use HTTPS for sites
|
209
|
|
-that support it, and reduces the chances of your cookies being stolen for
|
210
|
|
-sites that do not secure them.
|
211
|
211
|
</ol>
|
212
|
212
|
|
213
|
213
|
<strong>Are there any other issues I should be concerned about?</strong>
|