traumschule commited on 2018-09-09 10:15:16
Zeige 3 geänderte Dateien mit 134 Einfügungen und 231 Löschungen.
... | ... |
@@ -221,111 +221,7 @@ |
221 | 221 |
</div> <!-- END download-donate --> |
222 | 222 |
<div id="maincol-left"> |
223 | 223 |
<!-- BEGIN WARNING --> |
224 |
-<div class="warning"> |
|
225 |
-<a name="warning"></a> |
|
226 |
-<a name="Warning"></a> |
|
227 |
-<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> |
|
228 |
-<p>You need to change some of your habits, as some things won't work |
|
229 |
-exactly as you are used to.</p> |
|
230 |
- |
|
231 |
-<ol> |
|
232 |
- |
|
233 |
-<li><b>Use Tor Browser</b> |
|
234 |
-<p>Tor does not protect all of your computer's Internet traffic when you |
|
235 |
-run it. Tor only protects your applications that are properly configured |
|
236 |
-to send their Internet traffic through Tor. To avoid problems with |
|
237 |
-Tor configuration, we strongly recommend you use the <a href="<page |
|
238 |
-projects/torbrowser>">Tor Browser</a>. It is pre-configured to |
|
239 |
-protect your privacy and anonymity on the web as long as you're browsing |
|
240 |
-with Tor Browser itself. Almost any other web browser configuration |
|
241 |
-is likely to be unsafe to use with Tor.</p> |
|
242 |
-</li> |
|
243 |
-<li><b>Don't torrent over Tor</b> |
|
244 |
-<p> |
|
245 |
-Torrent file-sharing applications have been observed to ignore proxy |
|
246 |
-settings and make direct connections even when they are told to use Tor. |
|
247 |
-Even if your torrent application connects only through Tor, you will |
|
248 |
-often send out your real IP address in the tracker GET request, |
|
249 |
-because that's how torrents work. Not only do you <a |
|
250 |
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea"> |
|
251 |
-deanonymize your torrent traffic and your other simultaneous Tor web |
|
252 |
-traffic</a> this way, you also slow down the entire Tor network for everyone else. |
|
253 |
-</p> |
|
254 |
-</li> |
|
255 |
-<li><b>Don't enable or install browser plugins</b> |
|
256 |
-<p>Tor Browser will block browser plugins such as Flash, RealPlayer, |
|
257 |
-Quicktime, and others: they can be manipulated into revealing your IP |
|
258 |
-address. Similarly, we do not recommend installing additional addons or |
|
259 |
-plugins into Tor Browser, as these may bypass Tor or otherwise harm |
|
260 |
-your anonymity and privacy.</p> |
|
261 |
-</li> |
|
262 |
- |
|
263 |
-<li><b>Use HTTPS versions of websites</b> |
|
264 |
-<p>Tor will encrypt your traffic <a |
|
265 |
-href="<page about/overview>#thesolution">to |
|
266 |
-and within the Tor network</a>, but the encryption of your traffic to |
|
267 |
-the final destination website depends upon on that website. To help |
|
268 |
-ensure private encryption to websites, Tor Browser includes |
|
269 |
-<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> |
|
270 |
-to force the use of HTTPS encryption with major websites that |
|
271 |
-support it. However, you should still watch the browser URL bar to |
|
272 |
-ensure that websites you provide sensitive information to display a <a |
|
273 |
-href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue |
|
274 |
-or green URL bar button</a>, include <b>https://</b> in the URL, and |
|
275 |
-display the proper expected name for the website. |
|
276 |
-Also see EFF's interactive page |
|
277 |
-explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor |
|
278 |
-and HTTPS relate</a>. |
|
279 |
-</p> |
|
280 |
-</li> |
|
281 |
- |
|
282 |
-<li><b>Don't open documents downloaded through Tor while online</b> |
|
283 |
-<p>Tor Browser will warn you before automatically opening |
|
284 |
-documents that are handled by external applications. <b>DO NOT |
|
285 |
-IGNORE THIS WARNING</b>. You should be very careful when downloading |
|
286 |
-documents via Tor (especially DOC and PDF files, unless you use the PDF |
|
287 |
-viewer that's built into Tor Browser) as these documents |
|
288 |
-can contain Internet resources that will be downloaded outside of |
|
289 |
-Tor by the application that opens them. This will reveal your non-Tor |
|
290 |
-IP address. If you must work with DOC and/or PDF files, we strongly |
|
291 |
-recommend either using a disconnected computer, downloading the free <a |
|
292 |
-href="https://www.virtualbox.org/">VirtualBox</a> and using it with a <a |
|
293 |
-href="http://virtualboxes.org/">virtual machine image</a> with networking |
|
294 |
-disabled, or using <a href="https://tails.boum.org/">Tails</a>. |
|
295 |
-Under no circumstances is it safe to use <a |
|
296 |
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
297 |
-and Tor</a> together, however.</p> |
|
298 |
-</li> |
|
299 |
- |
|
300 |
-<li><b>Use bridges and/or find company</b> |
|
301 |
-<p>Tor tries to prevent attackers from learning what destination websites |
|
302 |
-you connect to. However, by default, it does not prevent somebody |
|
303 |
-watching your Internet traffic from learning that you're using Tor. If |
|
304 |
-this matters to you, you can reduce this risk by configuring Tor to use a |
|
305 |
-<a href="<page docs/bridges>">Tor bridge relay</a> rather than connecting |
|
306 |
-directly to the public Tor network. Ultimately the best protection is |
|
307 |
-a social approach: the more Tor users there are near you and the more |
|
308 |
-<a href="<page about/torusers>">diverse</a> their interests, the less |
|
309 |
-dangerous it will be that you are one of them. Convince other people to |
|
310 |
-use Tor, too!</p> |
|
311 |
-</li> |
|
312 |
-</ol> |
|
313 |
-<br> |
|
314 |
-<p>Be smart and learn more. Understand what Tor does and does not offer. |
|
315 |
-This list of pitfalls isn't complete, and we need your help <a href="<page |
|
316 |
-getinvolved/volunteer>#Documentation">identifying and documenting all |
|
317 |
-the issues</a>.</p><br /> |
|
318 |
-<h2><a class="anchor" href="#mirror">Where else can I get Tor?</a></h2> |
|
319 |
-<p>In some countries the Tor Project website is blocked or censored and |
|
320 |
-it is not possible to download Tor directly. The Tor Project hosts a |
|
321 |
-Tor Browser <a |
|
322 |
-href="https://github.com/TheTorProject/gettorbrowser">mirror on Github</a>.</p><br /> |
|
323 |
-<p>Using the <a |
|
324 |
-href="https://www.torproject.org/projects/gettor">GetTor</a> service is |
|
325 |
-another way to download Tor Browser when the Project website and mirrors |
|
326 |
-are blocked.</p> |
|
327 |
- |
|
328 |
-</div> |
|
224 |
+#include <warning.wmi> |
|
329 | 225 |
<!-- END WARNING --> |
330 | 226 |
</div> |
331 | 227 |
<!-- END MAINCOL --> |
... | ... |
@@ -222,132 +222,7 @@ END SMARTPHONE --> |
222 | 222 |
<!-- END DOWNLOADS --> |
223 | 223 |
<br> |
224 | 224 |
<!-- BEGIN WARNING --> |
225 |
-<div class="warning"> |
|
226 |
-<a name="warning"></a> |
|
227 |
-<a name="Warning"></a> |
|
228 |
-<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> |
|
229 |
- <p>You need to change some of your habits, as some things won't work exactly as |
|
230 |
-you are used to.</p> |
|
231 |
- |
|
232 |
-<ol> |
|
233 |
-<li><b>Use Tor Browser</b> |
|
234 |
- |
|
235 |
-<p> |
|
236 |
- |
|
237 |
-Tor does not protect all of your computer's Internet traffic when you |
|
238 |
-run it. Tor only protects your applications that are properly configured to |
|
239 |
-send their Internet traffic through Tor. To avoid problems with Tor |
|
240 |
-configuration, we strongly recommend you use the |
|
241 |
-<a href="<page projects/torbrowser>">Tor Browser</a>. It is pre-configured to protect |
|
242 |
-your privacy and anonymity on the web as long as you're browsing with Tor |
|
243 |
-Browser itself. Almost any other web browser configuration is likely to be |
|
244 |
-unsafe to use with Tor. |
|
245 |
- |
|
246 |
-</p> |
|
247 |
- |
|
248 |
-</li> |
|
249 |
- |
|
250 |
-<li><b>Don't torrent over Tor</b> |
|
251 |
-<p> |
|
252 |
-Torrent file-sharing applications have been observed to ignore proxy |
|
253 |
-settings and make direct connections even when they are told to use Tor. |
|
254 |
-Even if your torrent application connects only through Tor, you will |
|
255 |
-often send out your real IP address in the tracker GET request, |
|
256 |
-because that's how torrents work. Not only do you <a |
|
257 |
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea"> |
|
258 |
-deanonymize your torrent traffic and your other simultaneous Tor web |
|
259 |
-traffic</a> this way, you also slow down the entire Tor network for everyone else. |
|
260 |
-</p> |
|
261 |
-</li> |
|
262 |
- |
|
263 |
-<li><b>Don't enable or install browser plugins</b> |
|
264 |
- |
|
265 |
-<p> |
|
266 |
- |
|
267 |
-Tor Browser will block browser plugins such as Flash, RealPlayer, |
|
268 |
-Quicktime, and others: they can be manipulated into revealing your IP address. |
|
269 |
-Similarly, we do not recommend installing additional addons or plugins into |
|
270 |
-Tor Browser, as these may bypass Tor or otherwise harm your anonymity and |
|
271 |
-privacy. |
|
272 |
- |
|
273 |
-</p> |
|
274 |
- |
|
275 |
-</li> |
|
276 |
- |
|
277 |
-<li><b>Use HTTPS versions of websites</b> |
|
278 |
- |
|
279 |
-<p> |
|
280 |
- |
|
281 |
-Tor will encrypt your traffic |
|
282 |
-<a href="<page about/overview>#thesolution">to and |
|
283 |
-within the Tor network</a>, but the encryption of your traffic to the final |
|
284 |
-destination website depends upon on that website. To help ensure private |
|
285 |
-encryption to websites, Tor Browser includes <a |
|
286 |
-href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the |
|
287 |
-use of HTTPS encryption with major websites that support it. However, you |
|
288 |
-should still watch the browser URL bar to ensure that websites you provide |
|
289 |
-sensitive information to display a |
|
290 |
-<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or |
|
291 |
-green URL bar button</a>, include <b>https://</b> in the URL, and display the |
|
292 |
-proper expected name for the website. Also see EFF's interactive page |
|
293 |
-explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor |
|
294 |
-and HTTPS relate</a>. |
|
295 |
- |
|
296 |
-</p> |
|
297 |
- |
|
298 |
-</li> |
|
299 |
- |
|
300 |
-<li><b>Don't open documents downloaded through Tor while online</b> |
|
301 |
- |
|
302 |
-<p> |
|
303 |
- |
|
304 |
-Tor Browser will warn you before automatically opening documents that are |
|
305 |
-handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>. You |
|
306 |
-should be very careful when downloading documents via Tor (especially DOC and |
|
307 |
-PDF files, unless you use the PDF viewer that's built into Tor Browser) as |
|
308 |
-these documents can contain Internet resources that will be downloaded outside |
|
309 |
-of Tor by the application that opens them. This will reveal your non-Tor IP |
|
310 |
-address. If you must work with DOC and/or PDF files, we strongly recommend |
|
311 |
-either using a disconnected computer, |
|
312 |
-downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and |
|
313 |
-using it with a <a href="http://virtualboxes.org/">virtual machine image</a> |
|
314 |
-with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>. |
|
315 |
-Under no circumstances is it safe to use |
|
316 |
-<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
317 |
-and Tor</a> together, however. |
|
318 |
- |
|
319 |
-</p> |
|
320 |
- |
|
321 |
-</li> |
|
322 |
- |
|
323 |
-<li><b>Use bridges and/or find company</b> |
|
324 |
- |
|
325 |
-<p> |
|
326 |
- |
|
327 |
-Tor tries to prevent attackers from learning what destination websites you |
|
328 |
-connect to. However, by default, it does not prevent somebody watching your Internet |
|
329 |
-traffic from learning that you're using Tor. If this matters to you, you can |
|
330 |
-reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor |
|
331 |
-bridge relay</a> rather than connecting directly to the public Tor network. |
|
332 |
-Ultimately the best protection is a social approach: the more Tor |
|
333 |
-users there are near you and the more |
|
334 |
-<a href="<page about/torusers>">diverse</a> their interests, the less |
|
335 |
-dangerous it will be that you are one of them. Convince other people to use |
|
336 |
-Tor, too! |
|
337 |
- |
|
338 |
-</p> |
|
339 |
- |
|
340 |
-</li> |
|
341 |
- |
|
342 |
-</ol> |
|
343 |
-<br> |
|
344 |
-<p> |
|
345 |
-Be smart and learn more. Understand what Tor does and does not offer. |
|
346 |
-This list of pitfalls isn't complete, and we need your |
|
347 |
-help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting |
|
348 |
-all the issues</a>. |
|
349 |
-</p> |
|
350 |
-</div> |
|
225 |
+#include <warning.wmi> |
|
351 | 226 |
<!-- END WARNING --> |
352 | 227 |
</div> |
353 | 228 |
<!-- END MAINCOL --> |
... | ... |
@@ -0,0 +1,132 @@ |
1 |
+#! /usr/bin/wml |
|
2 |
+<: use strict; :> |
|
3 |
+<: use warnings; :> |
|
4 |
+ |
|
5 |
+#<!-- included by the download pages --> |
|
6 |
+ |
|
7 |
+<div class="warning"> |
|
8 |
+<a name="warning"></a> |
|
9 |
+<a name="Warning"></a> |
|
10 |
+<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> |
|
11 |
+ <p>You need to change some of your habits, as some things won't work exactly as |
|
12 |
+you are used to.</p> |
|
13 |
+ |
|
14 |
+<ol> |
|
15 |
+<li><b>Use Tor Browser</b> |
|
16 |
+ |
|
17 |
+<p> |
|
18 |
+ |
|
19 |
+Tor does not protect all of your computer's Internet traffic when you |
|
20 |
+run it. Tor only protects your applications that are properly configured to |
|
21 |
+send their Internet traffic through Tor. To avoid problems with Tor |
|
22 |
+configuration, we strongly recommend you use the |
|
23 |
+<a href="<page projects/torbrowser>">Tor Browser</a>. It is pre-configured to protect |
|
24 |
+your privacy and anonymity on the web as long as you're browsing with Tor |
|
25 |
+Browser itself. Almost any other web browser configuration is likely to be |
|
26 |
+unsafe to use with Tor. |
|
27 |
+ |
|
28 |
+</p> |
|
29 |
+ |
|
30 |
+</li> |
|
31 |
+ |
|
32 |
+<li><b>Don't torrent over Tor</b> |
|
33 |
+<p> |
|
34 |
+Torrent file-sharing applications have been observed to ignore proxy |
|
35 |
+settings and make direct connections even when they are told to use Tor. |
|
36 |
+Even if your torrent application connects only through Tor, you will |
|
37 |
+often send out your real IP address in the tracker GET request, |
|
38 |
+because that's how torrents work. Not only do you <a |
|
39 |
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea"> |
|
40 |
+deanonymize your torrent traffic and your other simultaneous Tor web |
|
41 |
+traffic</a> this way, you also slow down the entire Tor network for everyone else. |
|
42 |
+</p> |
|
43 |
+</li> |
|
44 |
+ |
|
45 |
+<li><b>Don't enable or install browser plugins</b> |
|
46 |
+ |
|
47 |
+<p> |
|
48 |
+ |
|
49 |
+Tor Browser will block browser plugins such as Flash, RealPlayer, |
|
50 |
+Quicktime, and others: they can be manipulated into revealing your IP address. |
|
51 |
+Similarly, we do not recommend installing additional addons or plugins into |
|
52 |
+Tor Browser, as these may bypass Tor or otherwise harm your anonymity and |
|
53 |
+privacy. |
|
54 |
+ |
|
55 |
+</p> |
|
56 |
+ |
|
57 |
+</li> |
|
58 |
+ |
|
59 |
+<li><b>Use HTTPS versions of websites</b> |
|
60 |
+ |
|
61 |
+<p> |
|
62 |
+ |
|
63 |
+Tor will encrypt your traffic |
|
64 |
+<a href="<page about/overview>#thesolution">to and |
|
65 |
+within the Tor network</a>, but the encryption of your traffic to the final |
|
66 |
+destination website depends upon on that website. To help ensure private |
|
67 |
+encryption to websites, Tor Browser includes <a |
|
68 |
+href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the |
|
69 |
+use of HTTPS encryption with major websites that support it. However, you |
|
70 |
+should still watch the browser URL bar to ensure that websites you provide |
|
71 |
+sensitive information to display a |
|
72 |
+<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or |
|
73 |
+green URL bar button</a>, include <b>https://</b> in the URL, and display the |
|
74 |
+proper expected name for the website. Also see EFF's interactive page |
|
75 |
+explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor |
|
76 |
+and HTTPS relate</a>. |
|
77 |
+ |
|
78 |
+</p> |
|
79 |
+ |
|
80 |
+</li> |
|
81 |
+ |
|
82 |
+<li><b>Don't open documents downloaded through Tor while online</b> |
|
83 |
+ |
|
84 |
+<p> |
|
85 |
+ |
|
86 |
+Tor Browser will warn you before automatically opening documents that are |
|
87 |
+handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>. You |
|
88 |
+should be very careful when downloading documents via Tor (especially DOC and |
|
89 |
+PDF files, unless you use the PDF viewer that's built into Tor Browser) as |
|
90 |
+these documents can contain Internet resources that will be downloaded outside |
|
91 |
+of Tor by the application that opens them. This will reveal your non-Tor IP |
|
92 |
+address. If you must work with DOC and/or PDF files, we strongly recommend |
|
93 |
+either using a disconnected computer, |
|
94 |
+downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and |
|
95 |
+using it with a <a href="http://virtualboxes.org/">virtual machine image</a> |
|
96 |
+with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>. |
|
97 |
+Under no circumstances is it safe to use |
|
98 |
+<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
99 |
+and Tor</a> together, however. |
|
100 |
+ |
|
101 |
+</p> |
|
102 |
+ |
|
103 |
+</li> |
|
104 |
+ |
|
105 |
+<li><b>Use bridges and/or find company</b> |
|
106 |
+ |
|
107 |
+<p> |
|
108 |
+ |
|
109 |
+Tor tries to prevent attackers from learning what destination websites you |
|
110 |
+connect to. However, by default, it does not prevent somebody watching your Internet |
|
111 |
+traffic from learning that you're using Tor. If this matters to you, you can |
|
112 |
+reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor |
|
113 |
+bridge relay</a> rather than connecting directly to the public Tor network. |
|
114 |
+Ultimately the best protection is a social approach: the more Tor |
|
115 |
+users there are near you and the more |
|
116 |
+<a href="<page about/torusers>">diverse</a> their interests, the less |
|
117 |
+dangerous it will be that you are one of them. Convince other people to use |
|
118 |
+Tor, too! |
|
119 |
+ |
|
120 |
+</p> |
|
121 |
+ |
|
122 |
+</li> |
|
123 |
+ |
|
124 |
+</ol> |
|
125 |
+<br> |
|
126 |
+<p> |
|
127 |
+Be smart and learn more. Understand what Tor does and does not offer. |
|
128 |
+This list of pitfalls isn't complete, and we need your |
|
129 |
+help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting |
|
130 |
+all the issues</a>. |
|
131 |
+</p> |
|
132 |
+</div> |
|
0 | 133 |