Andrew Lewman commited on 2012-01-07 19:44:56
Zeige 1 geänderte Dateien mit 59 Einfügungen und 88 Löschungen.
... | ... |
@@ -144,115 +144,86 @@ you are used to. Please read the <a href="#warning">full list of warnings</a> fo |
144 | 144 |
<a name="warning"></a> |
145 | 145 |
<a name="Warning"></a> |
146 | 146 |
<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2> |
147 |
- <p>You need to change some of your habits, as some things won't work exactly as |
|
148 |
-you are used to. </p> |
|
147 |
+<p>You need to change some of your habits, as some things won't work |
|
148 |
+exactly as you are used to.</p> |
|
149 | 149 |
|
150 | 150 |
<ol> |
151 | 151 |
|
152 | 152 |
<li><b>Use the Tor Browser</b> |
153 |
- |
|
154 |
-<p> |
|
155 |
- |
|
156 |
-Tor does not protect all of your computer's Internet traffic when you |
|
157 |
-run it. Tor only protects your applications that are properly configured to |
|
158 |
-send their Internet traffic through Tor. To avoid problems with Tor |
|
159 |
-configuration, we strongly recommend you use the |
|
160 |
-<a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect |
|
161 |
-your privacy and anonymity on the web as long as you're browsing with the Tor |
|
162 |
-Browser itself. Almost any other web browser configuration is likely to be |
|
163 |
-unsafe to use with Tor. |
|
164 |
- |
|
165 |
-</p> |
|
166 |
- |
|
153 |
+<p>Tor does not protect all of your computer's Internet traffic when you |
|
154 |
+run it. Tor only protects your applications that are properly configured |
|
155 |
+to send their Internet traffic through Tor. To avoid problems with |
|
156 |
+Tor configuration, we strongly recommend you use the <a href="<page |
|
157 |
+projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to |
|
158 |
+protect your privacy and anonymity on the web as long as you're browsing |
|
159 |
+with the Tor Browser itself. Almost any other web browser configuration |
|
160 |
+is likely to be unsafe to use with Tor.</p> |
|
167 | 161 |
</li> |
168 | 162 |
|
169 | 163 |
<li><b>Don't enable or install browser plugins</b> |
170 |
- |
|
171 |
-<p> |
|
172 |
- |
|
173 |
-The Tor Browser will block browser plugins such as Flash, RealPlayer, |
|
174 |
-Quicktime, and others: they can be manipulated into revealing your IP address. |
|
175 |
-Similarly, we do not recommend installing additional addons or plugins into |
|
176 |
-the Tor Browser, as these may bypass Tor or otherwise harm your anonymity and |
|
177 |
-privacy. The lack of plugins means that Youtube videos are blocked by default, |
|
178 |
-but Youtube does provide an experimental opt-in feature |
|
179 |
-<a href="https://www.youtube.com/html5">(enable it here)</a> that works for some |
|
180 |
-videos. |
|
181 |
- |
|
182 |
-</p> |
|
183 |
- |
|
164 |
+<p>The Tor Browser will block browser plugins such as Flash, RealPlayer, |
|
165 |
+Quicktime, and others: they can be manipulated into revealing your IP |
|
166 |
+address. Similarly, we do not recommend installing additional addons or |
|
167 |
+plugins into the Tor Browser, as these may bypass Tor or otherwise harm |
|
168 |
+your anonymity and privacy. The lack of plugins means that Youtube videos |
|
169 |
+are blocked by default, but Youtube does provide an experimental opt-in |
|
170 |
+feature <a href="https://www.youtube.com/html5">(enable it here)</a> |
|
171 |
+that works for some videos.</p> |
|
184 | 172 |
</li> |
185 | 173 |
|
186 | 174 |
<li><b>Use HTTPS versions of websites</b> |
187 |
- |
|
188 |
-<p> |
|
189 |
- |
|
190 |
-Tor will encrypt your traffic |
|
191 |
-<a href="https://www.torproject.org/about/overview.html.en#thesolution">to and |
|
192 |
-within the Tor network</a>, but the encryption of your traffic to the final |
|
193 |
-destination website depends upon on that website. To help ensure private |
|
194 |
-encryption to websites, the Tor Browser Bundle includes <a |
|
195 |
-href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the |
|
196 |
-use of HTTPS encryption with major websites that support it. However, you |
|
197 |
-should still watch the browser URL bar to ensure that websites you provide |
|
198 |
-sensitive information to display a |
|
199 |
-<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or |
|
200 |
-green URL bar button</a>, include <b>https://</b> in the URL, and display the |
|
201 |
-proper expected name for the website. |
|
202 |
- |
|
203 |
-</p> |
|
204 |
- |
|
175 |
+<p>Tor will encrypt your traffic <a |
|
176 |
+href="https://www.torproject.org/about/overview.html.en#thesolution">to |
|
177 |
+and within the Tor network</a>, but the encryption of your traffic to |
|
178 |
+the final destination website depends upon on that website. To help |
|
179 |
+ensure private encryption to websites, the Tor Browser Bundle includes |
|
180 |
+<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> |
|
181 |
+to force the use of HTTPS encryption with major websites that |
|
182 |
+support it. However, you should still watch the browser URL bar to |
|
183 |
+ensure that websites you provide sensitive information to display a <a |
|
184 |
+href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue |
|
185 |
+or green URL bar button</a>, include <b>https://</b> in the URL, and |
|
186 |
+display the |
|
187 |
+proper expected name for the website.</p> |
|
205 | 188 |
</li> |
206 | 189 |
|
207 | 190 |
<li><b>Don't open documents downloaded through Tor while online</b> |
208 |
- |
|
209 |
-<p> |
|
210 |
- |
|
211 |
-The Tor Browser will warn you before automatically opening documents that are |
|
212 |
-handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>. You |
|
213 |
-should be very careful when downloading documents via Tor (especially DOC and |
|
214 |
-PDF files) as these documents can contain Internet resources that will be |
|
215 |
-downloaded outside of Tor by the application that opens them. This will reveal |
|
216 |
-your non-Tor IP address. If you must work with DOC and/or PDF files, we |
|
217 |
-strongly recommend either using a disconnected computer, |
|
218 |
-downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and |
|
219 |
-using it with a <a href="http://virtualboxes.org/">virtual machine image</a> |
|
220 |
-with networking disabled, or using <a href="http://tails.boum.org/">Tails</a>. |
|
221 |
-Under no circumstances is it safe to use |
|
222 |
-<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
223 |
-and Tor</a> together, however. |
|
224 |
- |
|
225 |
-</p> |
|
226 |
- |
|
191 |
+<p>The Tor Browser will warn you before automatically opening |
|
192 |
+documents that are handled by external applications. <b>DO NOT |
|
193 |
+IGNORE THIS WARNING</b>. You should be very careful when downloading |
|
194 |
+documents via Tor (especially DOC and PDF files) as these documents |
|
195 |
+can contain Internet resources that will be downloaded outside of |
|
196 |
+Tor by the application that opens them. This will reveal your non-Tor |
|
197 |
+IP address. If you must work with DOC and/or PDF files, we strongly |
|
198 |
+recommend either using a disconnected computer, downloading the free <a |
|
199 |
+href="https://www.virtualbox.org/">VirtualBox</a> and using it with a <a |
|
200 |
+href="http://virtualboxes.org/">virtual machine image</a> with networking |
|
201 |
+disabled, or using <a href="http://tails.boum.org/">Tails</a>. |
|
202 |
+Under no circumstances is it safe to use <a |
|
203 |
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent |
|
204 |
+and Tor</a> together, however.</p> |
|
227 | 205 |
</li> |
228 | 206 |
|
229 | 207 |
<li><b>Use bridges and/or find company</b> |
230 |
- |
|
231 |
-<p> |
|
232 |
- |
|
233 |
-Tor tries to prevent attackers from learning what destination websites you |
|
234 |
-connect to. However, by default, it does not prevent somebody watching your Internet |
|
235 |
-traffic from learning that you're using Tor. If this matters to you, you can |
|
236 |
-reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor |
|
237 |
-bridge relay</a> rather than connecting directly to the public Tor network. |
|
238 |
-Ultimately the best protection is a social approach: the more Tor |
|
239 |
-users there are near you and the more |
|
208 |
+<p>Tor tries to prevent attackers from learning what destination websites |
|
209 |
+you connect to. However, by default, it does not prevent somebody |
|
210 |
+watching your Internet traffic from learning that you're using Tor. If |
|
211 |
+this matters to you, you can reduce this risk by configuring Tor to use a |
|
212 |
+<a href="<page docs/bridges>">Tor bridge relay</a> rather than connecting |
|
213 |
+directly to the public Tor network. Ultimately the best protection is |
|
214 |
+a social approach: the more Tor users there are near you and the more |
|
240 | 215 |
<a href="<page about/torusers>">diverse</a> their interests, the less |
241 |
-dangerous it will be that you are one of them. Convince other people to use |
|
242 |
-Tor, too! |
|
243 |
- |
|
244 |
-</p> |
|
245 |
- |
|
216 |
+dangerous it will be that you are one of them. Convince other people to |
|
217 |
+use Tor, too!</p> |
|
246 | 218 |
</li> |
247 | 219 |
|
248 | 220 |
</ol> |
249 | 221 |
<br> |
250 |
-<p> |
|
251 |
-Be smart and learn more. Understand what Tor does and does not offer. |
|
252 |
-This list of pitfalls isn't complete, and we need your |
|
253 |
-help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting |
|
254 |
-all the issues</a>. |
|
255 |
-</p> |
|
222 |
+<p>Be smart and learn more. Understand what Tor does and does not offer. |
|
223 |
+This list of pitfalls isn't complete, and we need your help <a href="<page |
|
224 |
+getinvolved/volunteer>#Documentation">identifying and documenting all |
|
225 |
+the issues</a>.</p> |
|
226 |
+ |
|
256 | 227 |
</div> |
257 | 228 |
<!-- END WARNING --> |
258 | 229 |
</div> |
259 | 230 |