turn download warnings into incude file
traumschule

traumschule commited on 2018-09-09 10:15:16
Zeige 3 geänderte Dateien mit 134 Einfügungen und 231 Löschungen.

... ...
@@ -221,111 +221,7 @@
221 221
 	</div> <!-- END download-donate -->
222 222
 	<div id="maincol-left">
223 223
 <!-- BEGIN WARNING -->
224
-<div class="warning">
225
-<a name="warning"></a>
226
-<a name="Warning"></a>
227
-<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
228
-<p>You need to change some of your habits, as some things won't work
229
-exactly as you are used to.</p>
230
-
231
-<ol>
232
-
233
-<li><b>Use Tor Browser</b>
234
-<p>Tor does not protect all of your computer's Internet traffic when you
235
-run it. Tor only protects your applications that are properly configured
236
-to send their Internet traffic through Tor. To avoid problems with
237
-Tor configuration, we strongly recommend you use the <a href="<page
238
-projects/torbrowser>">Tor Browser</a>. It is pre-configured to
239
-protect your privacy and anonymity on the web as long as you're browsing
240
-with Tor Browser itself. Almost any other web browser configuration
241
-is likely to be unsafe to use with Tor.</p>
242
-</li>
243
-<li><b>Don't torrent over Tor</b>
244
-<p>
245
-Torrent file-sharing applications have been observed to ignore proxy
246
-settings and make direct connections even when they are told to use Tor.
247
-Even if your torrent application connects only through Tor, you will
248
-often send out your real IP address in the tracker GET request,
249
-because that's how torrents work. Not only do you <a
250
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
251
-deanonymize your torrent traffic and your other simultaneous Tor web
252
-traffic</a> this way, you also slow down the entire Tor network for everyone else.
253
-</p>
254
-</li>
255
-<li><b>Don't enable or install browser plugins</b>
256
-<p>Tor Browser will block browser plugins such as Flash, RealPlayer,
257
-Quicktime, and others: they can be manipulated into revealing your IP
258
-address.  Similarly, we do not recommend installing additional addons or
259
-plugins into Tor Browser, as these may bypass Tor or otherwise harm
260
-your anonymity and privacy.</p>
261
-</li>
262
-
263
-<li><b>Use HTTPS versions of websites</b>
264
-<p>Tor will encrypt your traffic <a
265
-href="<page about/overview>#thesolution">to
266
-and within the Tor network</a>, but the encryption of your traffic to
267
-the final destination website depends upon on that website. To help
268
-ensure private encryption to websites, Tor Browser includes
269
-<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a>
270
-to force the use of HTTPS encryption with major websites that
271
-support it. However, you should still watch the browser URL bar to
272
-ensure that websites you provide sensitive information to display a <a
273
-href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue
274
-or green URL bar button</a>, include <b>https://</b> in the URL, and
275
-display the proper expected name for the website.
276
-Also see EFF's interactive page
277
-explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor
278
-and HTTPS relate</a>.
279
-</p>
280
-</li>
281
-
282
-<li><b>Don't open documents downloaded through Tor while online</b>
283
-<p>Tor Browser will warn you before automatically opening
284
-documents that are handled by external applications. <b>DO NOT
285
-IGNORE THIS WARNING</b>.  You should be very careful when downloading
286
-documents via Tor (especially DOC and PDF files, unless you use the PDF
287
-viewer that's built into Tor Browser) as these documents
288
-can contain Internet resources that will be downloaded outside of
289
-Tor by the application that opens them. This will reveal your non-Tor
290
-IP address. If you must work with DOC and/or PDF files, we strongly
291
-recommend either using a disconnected computer, downloading the free <a
292
-href="https://www.virtualbox.org/">VirtualBox</a> and using it with a <a
293
-href="http://virtualboxes.org/">virtual machine image</a> with networking
294
-disabled, or using <a href="https://tails.boum.org/">Tails</a>.
295
-Under no circumstances is it safe to use <a
296
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
297
-and Tor</a> together, however.</p>
298
-</li>
299
-
300
-<li><b>Use bridges and/or find company</b>
301
-<p>Tor tries to prevent attackers from learning what destination websites
302
-you connect to. However, by default, it does not prevent somebody
303
-watching your Internet traffic from learning that you're using Tor. If
304
-this matters to you, you can reduce this risk by configuring Tor to use a
305
-<a href="<page docs/bridges>">Tor bridge relay</a> rather than connecting
306
-directly to the public Tor network.  Ultimately the best protection is
307
-a social approach: the more Tor users there are near you and the more
308
-<a href="<page about/torusers>">diverse</a> their interests, the less
309
-dangerous it will be that you are one of them. Convince other people to
310
-use Tor, too!</p>
311
-</li>
312
-</ol>
313
-<br>
314
-<p>Be smart and learn more. Understand what Tor does and does not offer.
315
-This list of pitfalls isn't complete, and we need your help <a href="<page
316
-getinvolved/volunteer>#Documentation">identifying and documenting all
317
-the issues</a>.</p><br />
318
-<h2><a class="anchor" href="#mirror">Where else can I get Tor?</a></h2>
319
-<p>In some countries the Tor Project website is blocked or censored and
320
-it is not possible to download Tor directly. The Tor Project hosts a
321
-Tor Browser <a
322
-href="https://github.com/TheTorProject/gettorbrowser">mirror on Github</a>.</p><br />
323
-<p>Using the <a
324
-href="https://www.torproject.org/projects/gettor">GetTor</a> service is
325
-another way to download Tor Browser when the Project website and mirrors
326
-are blocked.</p>
327
-
328
-</div>
224
+#include <warning.wmi>
329 225
 <!-- END WARNING -->
330 226
 </div>
331 227
 <!-- END MAINCOL -->
... ...
@@ -222,132 +222,7 @@ END SMARTPHONE -->
222 222
 <!-- END DOWNLOADS -->
223 223
 <br>
224 224
 <!-- BEGIN WARNING -->
225
-<div class="warning">
226
-<a name="warning"></a>
227
-<a name="Warning"></a>
228
-<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
229
-	<p>You need to change some of your habits, as some things won't work exactly as
230
-you are used to.</p>
231
-
232
-<ol>
233
-<li><b>Use Tor Browser</b>
234
-
235
-<p>
236
-
237
-Tor does not protect all of your computer's Internet traffic when you
238
-run it. Tor only protects your applications that are properly configured to
239
-send their Internet traffic through Tor. To avoid problems with Tor
240
-configuration, we strongly recommend you use the
241
-<a href="<page projects/torbrowser>">Tor Browser</a>. It is pre-configured to protect
242
-your privacy and anonymity on the web as long as you're browsing with Tor
243
-Browser itself. Almost any other web browser configuration is likely to be
244
-unsafe to use with Tor.
245
-
246
-</p>
247
-
248
-</li>
249
-
250
-<li><b>Don't torrent over Tor</b>
251
-<p>
252
-Torrent file-sharing applications have been observed to ignore proxy
253
-settings and make direct connections even when they are told to use Tor.
254
-Even if your torrent application connects only through Tor, you will
255
-often send out your real IP address in the tracker GET request,
256
-because that's how torrents work. Not only do you <a
257
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
258
-deanonymize your torrent traffic and your other simultaneous Tor web
259
-traffic</a> this way, you also slow down the entire Tor network for everyone else.
260
-</p>
261
-</li>
262
-
263
-<li><b>Don't enable or install browser plugins</b>
264
-
265
-<p>
266
-
267
-Tor Browser will block browser plugins such as Flash, RealPlayer,
268
-Quicktime, and others: they can be manipulated into revealing your IP address.
269
-Similarly, we do not recommend installing additional addons or plugins into
270
-Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
271
-privacy.
272
-
273
-</p>
274
-
275
-</li>
276
-
277
-<li><b>Use HTTPS versions of websites</b>
278
-
279
-<p>
280
-
281
-Tor will encrypt your traffic
282
-<a href="<page about/overview>#thesolution">to and
283
-within the Tor network</a>, but the encryption of your traffic to the final
284
-destination website depends upon on that website. To help ensure private
285
-encryption to websites, Tor Browser includes <a
286
-href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
287
-use of HTTPS encryption with major websites that support it. However, you
288
-should still watch the browser URL bar to ensure that websites you provide
289
-sensitive information to display a
290
-<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or
291
-green URL bar button</a>, include <b>https://</b> in the URL, and display the
292
-proper expected name for the website. Also see EFF's interactive page
293
-explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor
294
-and HTTPS relate</a>.
295
-
296
-</p>
297
-
298
-</li>
299
-
300
-<li><b>Don't open documents downloaded through Tor while online</b>
301
-
302
-<p>
303
-
304
-Tor Browser will warn you before automatically opening documents that are
305
-handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
306
-should be very careful when downloading documents via Tor (especially DOC and
307
-PDF files, unless you use the PDF viewer that's built into Tor Browser) as
308
-these documents can contain Internet resources that will be downloaded outside
309
-of Tor by the application that opens them. This will reveal your non-Tor IP
310
-address. If you must work with DOC and/or PDF files, we strongly recommend
311
-either using a disconnected computer,
312
-downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
313
-using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
314
-with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>.
315
-Under no circumstances is it safe to use
316
-<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
317
-and Tor</a> together, however.
318
-
319
-</p>
320
-
321
-</li>
322
-
323
-<li><b>Use bridges and/or find company</b>
324
-
325
-<p>
326
-
327
-Tor tries to prevent attackers from learning what destination websites you
328
-connect to. However, by default, it does not prevent somebody watching your Internet
329
-traffic from learning that you're using Tor. If this matters to you, you can
330
-reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor
331
-bridge relay</a> rather than connecting directly to the public Tor network.
332
-Ultimately the best protection is a social approach: the more Tor
333
-users there are near you and the more
334
-<a href="<page about/torusers>">diverse</a> their interests, the less
335
-dangerous it will be that you are one of them. Convince other people to use
336
-Tor, too!
337
-
338
-</p>
339
-
340
-</li>
341
-
342
-</ol>
343
-<br>
344
-<p>
345
-Be smart and learn more. Understand what Tor does and does not offer.
346
-This list of pitfalls isn't complete, and we need your
347
-help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting
348
-all the issues</a>.
349
-</p>
350
-</div>
225
+#include <warning.wmi>
351 226
 <!-- END WARNING -->
352 227
 </div>
353 228
 <!-- END MAINCOL -->
... ...
@@ -0,0 +1,132 @@
1
+#! /usr/bin/wml
2
+<: use strict; :>
3
+<: use warnings; :>
4
+
5
+#<!-- included by the download pages -->
6
+
7
+<div class="warning">
8
+<a name="warning"></a>
9
+<a name="Warning"></a>
10
+<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
11
+	<p>You need to change some of your habits, as some things won't work exactly as
12
+you are used to.</p>
13
+
14
+<ol>
15
+<li><b>Use Tor Browser</b>
16
+
17
+<p>
18
+
19
+Tor does not protect all of your computer's Internet traffic when you
20
+run it. Tor only protects your applications that are properly configured to
21
+send their Internet traffic through Tor. To avoid problems with Tor
22
+configuration, we strongly recommend you use the
23
+<a href="<page projects/torbrowser>">Tor Browser</a>. It is pre-configured to protect
24
+your privacy and anonymity on the web as long as you're browsing with Tor
25
+Browser itself. Almost any other web browser configuration is likely to be
26
+unsafe to use with Tor.
27
+
28
+</p>
29
+
30
+</li>
31
+
32
+<li><b>Don't torrent over Tor</b>
33
+<p>
34
+Torrent file-sharing applications have been observed to ignore proxy 
35
+settings and make direct connections even when they are told to use Tor. 
36
+Even if your torrent application connects only through Tor, you will 
37
+often send out your real IP address in the tracker GET request, 
38
+because that's how torrents work. Not only do you <a 
39
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
40
+deanonymize your torrent traffic and your other simultaneous Tor web 
41
+traffic</a> this way, you also slow down the entire Tor network for everyone else. 
42
+</p>
43
+</li>
44
+
45
+<li><b>Don't enable or install browser plugins</b>
46
+
47
+<p>
48
+
49
+Tor Browser will block browser plugins such as Flash, RealPlayer,
50
+Quicktime, and others: they can be manipulated into revealing your IP address.
51
+Similarly, we do not recommend installing additional addons or plugins into
52
+Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
53
+privacy.
54
+
55
+</p>
56
+
57
+</li>
58
+
59
+<li><b>Use HTTPS versions of websites</b>
60
+
61
+<p>
62
+
63
+Tor will encrypt your traffic
64
+<a href="<page about/overview>#thesolution">to and
65
+within the Tor network</a>, but the encryption of your traffic to the final
66
+destination website depends upon on that website. To help ensure private
67
+encryption to websites, Tor Browser includes <a
68
+href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
69
+use of HTTPS encryption with major websites that support it. However, you
70
+should still watch the browser URL bar to ensure that websites you provide
71
+sensitive information to display a
72
+<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or
73
+green URL bar button</a>, include <b>https://</b> in the URL, and display the
74
+proper expected name for the website. Also see EFF's interactive page
75
+explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor
76
+and HTTPS relate</a>.
77
+
78
+</p>
79
+
80
+</li>
81
+
82
+<li><b>Don't open documents downloaded through Tor while online</b>
83
+
84
+<p>
85
+
86
+Tor Browser will warn you before automatically opening documents that are
87
+handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
88
+should be very careful when downloading documents via Tor (especially DOC and
89
+PDF files, unless you use the PDF viewer that's built into Tor Browser) as
90
+these documents can contain Internet resources that will be downloaded outside
91
+of Tor by the application that opens them. This will reveal your non-Tor IP
92
+address. If you must work with DOC and/or PDF files, we strongly recommend
93
+either using a disconnected computer,
94
+downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
95
+using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
96
+with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>.
97
+Under no circumstances is it safe to use
98
+<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
99
+and Tor</a> together, however.
100
+
101
+</p>
102
+
103
+</li>
104
+
105
+<li><b>Use bridges and/or find company</b>
106
+
107
+<p>
108
+
109
+Tor tries to prevent attackers from learning what destination websites you
110
+connect to. However, by default, it does not prevent somebody watching your Internet
111
+traffic from learning that you're using Tor. If this matters to you, you can
112
+reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor
113
+bridge relay</a> rather than connecting directly to the public Tor network.
114
+Ultimately the best protection is a social approach: the more Tor
115
+users there are near you and the more
116
+<a href="<page about/torusers>">diverse</a> their interests, the less
117
+dangerous it will be that you are one of them. Convince other people to use
118
+Tor, too!
119
+
120
+</p>
121
+
122
+</li>
123
+
124
+</ol>
125
+<br>
126
+<p>
127
+Be smart and learn more. Understand what Tor does and does not offer.
128
+This list of pitfalls isn't complete, and we need your
129
+help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting
130
+all the issues</a>.
131
+</p>
132
+</div>
0 133