Update FAQ. Also, if I'm going to have to answer the hate mail, I might as well get top billing.
Mike Perry

Mike Perry commited on 2008-08-01 06:34:17
Zeige 2 geänderte Dateien mit 33 Einfügungen und 33 Löschungen.

... ...
@@ -45,11 +45,11 @@ clicking the reload button.
45 45
 </p>
46 46
 
47 47
 
48
-<strong>I can't view videos on youtube and other flash-based sites. Why?</strong>
48
+<strong>I can't view videos on YouTube and other flash-based sites. Why?</strong>
49 49
 
50 50
 <p>
51 51
 
52
-Plugins are binary blobs that get inserted into Firefox, can perform
52
+Plugins are binary blobs that get inserted into Firefox and can perform
53 53
 arbitrary activity on your computer. This includes but is not limited to: <a
54 54
 href="http://www.metasploit.com/research/projects/decloak/">completely
55 55
 disregarding proxy settings</a>, querying your <a
... ...
@@ -69,16 +69,17 @@ annoying. Can't I just use the old version?</strong>
69 69
 <p> 
70 70
 
71 71
 <b>No.</b> Use of the old version, or any other vanilla proxy changer
72
-(including FoxyProxy -- see below) is actively discouraged. Seriously. Using a
73
-vanilla proxy switcher by itself is so insecure that you are not only just
74
-wasting your time, you are also actually endangering yourself. Simply do not
75
-use Tor and you will have the same (or perhaps better!) security. For more
76
-information on the types of attacks you are exposed to with a "homegrown"
77
-solution, please see <a
72
+(including FoxyProxy -- see below) without Torbutton is actively discouraged.
73
+Seriously. Using a vanilla proxy switcher by itself is so insecure that you
74
+are not only just wasting your time, you are also actually endangering
75
+yourself. Simply do not use Tor and you will have the same (and in some cases,
76
+better) security.  For more information on the types of attacks you are
77
+exposed to with a "homegrown" solution, please see <a
78 78
 href="https://www.torproject.org/torbutton/design/#adversary">The Torbutton
79
-Adversary Model</a>, in particular the <b>Adversary Capabilities - Attacks</b>
80
-subsection. If there are any specific Torbutton behaviors that you do not
81
-like, please file a bug on <a
79
+Adversary Model</a>, in particular the 
80
+<a href="https://www.torproject.org/torbutton/design/#attacks">Adversary
81
+Capabilities - Attacks</a> subsection. If there are any specific Torbutton
82
+behaviors that you do not like, please file a bug on <a
82 83
 href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5">the
83 84
 bug tracker.</a> Most of Torbutton's security features can also be disabled
84 85
 via its preferences, if you think you have your own protection for those
... ...
@@ -159,20 +160,19 @@ href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a>
159 160
 and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history
160 161
 disclosure</a>, followed closely by cookie theft by exit nodes and tracking by
161 162
 adservers (see the <a href="design/index.html#adversary">Torbutton Adversary
162
-Model</a> for more information). However, even with Torbutton installed in
163
-tandem and always enabled, it is still very difficult (though not impossible)
164
-to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only
165
-applies to specific urls, and not to an entire tab, setting FoxyProxy to only
166
-send specific sites through Tor will still allow adservers to still learn your
167
-real IP. Worse, if those sites use offsite logging services such as Google
168
-Analytics, you may still end up in their logs with your real IP. Malicious
169
-exit nodes can also cooperate with sites to inject images into pages that
170
-bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor
171
-is much more viable, but be very careful with the filters you allow. For
172
-example, something as simple as allowing *google* to go via Non-Tor will still
173
-cause you to end up in all the logs of all websites that use Google Analytics!
174
-See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this
175
-question</a> on the FoxyProxy FAQ for more information.
163
+Model</a> for more information). However, with Torbutton installed in tandem
164
+and always enabled, it is possible to configure FoxyProxy securely (though it
165
+is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls,
166
+and not to an entire tab, setting FoxyProxy to only send specific sites
167
+through Tor will still allow adservers (whose hosts don't match your filters) to learn your real IP. Worse, when
168
+sites use offsite logging services such as Google Analytics, you will
169
+still end up in their logs with your real IP. Malicious exit nodes can also
170
+cooperate with sites to inject images into pages that bypass your filters.
171
+Setting FoxyProxy to only send certain URLs via Non-Tor is much more secure in
172
+this regard, but be very careful with the filters you allow. For example, something as simple as allowing *google* to go via Non-Tor will still cause you to end up
173
+in all the logs of all websites that use Google Analytics!  See <a
174
+href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this question</a> on
175
+the FoxyProxy FAQ for more information.
176 176
 
177 177
  <li>NoScript</li>
178 178
  Torbutton currently mitigates all known anonymity issues with Javascript.
... ...
@@ -191,6 +191,13 @@ question</a> on the FoxyProxy FAQ for more information.
191 191
 
192 192
 <strong>Which Firefox extensions do you recommend?</strong>
193 193
 <ol>
194
+ <li><a href="https://crypto.stanford.edu/forcehttps/">ForceHTTPS</a></li>
195
+Many sites on the Internet are <a
196
+href="http://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry">sloppy
197
+about their use of HTTPS</a> and secure
198
+cookies. This addon can help you ensure that you always use HTTPS for sites
199
+that support it, and reduces the chances of your cookies being stolen for
200
+sites that do not secure them.
194 201
  <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li>
195 202
  Mentioned above, this extension allows more fine-grained referrer spoofing
196 203
 than Torbutton currently provides. It should break less sites than Torbutton's
... ...
@@ -201,13 +208,6 @@ install this extension to minimize the ability of sites to store long term
201 208
 identifiers in your cache. This extension applies same origin policy to the
202 209
 cache, so that elements are retrieved from the cache only if they are fetched
203 210
 from a document in the same origin domain as the cached element. 
204
- <li><a href="https://crypto.stanford.edu/forcehttps/">ForceHTTPS</a></li>
205
-Many sites on the Internet are <a
206
-href="http://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry">sloppy
207
-about their use of HTTPS</a> and secure
208
-cookies. This addon can help you ensure that you always use HTTPS for sites
209
-that support it, and reduces the chances of your cookies being stolen for
210
-sites that do not secure them.
211 211
 </ol>
212 212
 
213 213
 <strong>Are there any other issues I should be concerned about?</strong>
... ...
@@ -85,7 +85,7 @@ function install (aEvent)
85 85
 
86 86
 <strong>Current version:</strong><version-torbutton><br/>
87 87
 <br/>
88
-<strong>Authors:</strong> Scott Squires &amp; Mike Perry<br/>
88
+<strong>Authors:</strong> Mike Perry &amp; Scott Squires<br/>
89 89
 <br/>
90 90
 <strong>Install:</strong>
91 91
 <a href="http://www.torproject.org/torbutton/torbutton-current.xpi"
92 92