Browse code

clean up the download-easy warning a bit.

Andrew Lewman authored on07/01/2012 19:44:56
Showing1 changed files
... ...
@@ -144,115 +144,86 @@ you are used to. Please read the <a href="#warning">full list of warnings</a> fo
144 144
 <a name="warning"></a>
145 145
 <a name="Warning"></a>
146 146
 <h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
147
-	<p>You need to change some of your habits, as some things won't work exactly as
148
-you are used to.  </p>
147
+<p>You need to change some of your habits, as some things won't work
148
+exactly as you are used to.</p>
149 149
 
150 150
 <ol>
151 151
 
152 152
 <li><b>Use the Tor Browser</b>
153
-
154
-<p>
155
-
156
-Tor does not protect all of your computer's Internet traffic when you
157
-run it. Tor only protects your applications that are properly configured to
158
-send their Internet traffic through Tor. To avoid problems with Tor
159
-configuration, we strongly recommend you use the
160
-<a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect
161
-your privacy and anonymity on the web as long as you're browsing with the Tor
162
-Browser itself. Almost any other web browser configuration is likely to be
163
-unsafe to use with Tor.
164
-
165
-</p>
166
-
153
+<p>Tor does not protect all of your computer's Internet traffic when you
154
+run it. Tor only protects your applications that are properly configured
155
+to send their Internet traffic through Tor. To avoid problems with
156
+Tor configuration, we strongly recommend you use the <a href="<page
157
+projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to
158
+protect your privacy and anonymity on the web as long as you're browsing
159
+with the Tor Browser itself. Almost any other web browser configuration
160
+is likely to be unsafe to use with Tor.</p>
167 161
 </li>
168 162
 
169 163
 <li><b>Don't enable or install browser plugins</b>
170
-
171
-<p>
172
-
173
-The Tor Browser will block browser plugins such as Flash, RealPlayer,
174
-Quicktime, and others: they can be manipulated into revealing your IP address.
175
-Similarly, we do not recommend installing additional addons or plugins into
176
-the Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
177
-privacy. The lack of plugins means that Youtube videos are blocked by default,
178
-but Youtube does provide an experimental opt-in feature
179
-<a href="https://www.youtube.com/html5">(enable it here)</a> that works for some
180
-videos.
181
-
182
-</p>
183
-
164
+<p>The Tor Browser will block browser plugins such as Flash, RealPlayer,
165
+Quicktime, and others: they can be manipulated into revealing your IP
166
+address.  Similarly, we do not recommend installing additional addons or
167
+plugins into the Tor Browser, as these may bypass Tor or otherwise harm
168
+your anonymity and privacy. The lack of plugins means that Youtube videos
169
+are blocked by default, but Youtube does provide an experimental opt-in
170
+feature <a href="https://www.youtube.com/html5">(enable it here)</a>
171
+that works for some videos.</p>
184 172
 </li>
185 173
 
186 174
 <li><b>Use HTTPS versions of websites</b>
187
-
188
-<p>
189
-
190
-Tor will encrypt your traffic
191
-<a href="https://www.torproject.org/about/overview.html.en#thesolution">to and
192
-within the Tor network</a>, but the encryption of your traffic to the final
193
-destination website depends upon on that website. To help ensure private
194
-encryption to websites, the Tor Browser Bundle includes <a
195
-href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
196
-use of HTTPS encryption with major websites that support it. However, you
197
-should still watch the browser URL bar to ensure that websites you provide
198
-sensitive information to display a
199
-<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or
200
-green URL bar button</a>, include <b>https://</b> in the URL, and display the
201
-proper expected name for the website.
202
-
203
-</p>
204
-
175
+<p>Tor will encrypt your traffic <a
176
+href="https://www.torproject.org/about/overview.html.en#thesolution">to
177
+and within the Tor network</a>, but the encryption of your traffic to
178
+the final destination website depends upon on that website. To help
179
+ensure private encryption to websites, the Tor Browser Bundle includes
180
+<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a>
181
+to force the use of HTTPS encryption with major websites that
182
+support it. However, you should still watch the browser URL bar to
183
+ensure that websites you provide sensitive information to display a <a
184
+href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue
185
+or green URL bar button</a>, include <b>https://</b> in the URL, and
186
+display the
187
+proper expected name for the website.</p>
205 188
 </li>
206 189
 
207 190
 <li><b>Don't open documents downloaded through Tor while online</b>
208
-
209
-<p>
210
-
211
-The Tor Browser will warn you before automatically opening documents that are
212
-handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
213
-should be very careful when downloading documents via Tor (especially DOC and
214
-PDF files) as these documents can contain Internet resources that will be
215
-downloaded outside of Tor by the application that opens them. This will reveal
216
-your non-Tor IP address. If you must work with DOC and/or PDF files, we
217
-strongly recommend either using a disconnected computer,
218
-downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
219
-using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
220
-with networking disabled, or using <a href="http://tails.boum.org/">Tails</a>.
221
-Under no circumstances is it safe to use
222
-<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
223
-and Tor</a> together, however.
224
-
225
-</p>
226
-
191
+<p>The Tor Browser will warn you before automatically opening
192
+documents that are handled by external applications. <b>DO NOT
193
+IGNORE THIS WARNING</b>.  You should be very careful when downloading
194
+documents via Tor (especially DOC and PDF files) as these documents
195
+can contain Internet resources that will be downloaded outside of
196
+Tor by the application that opens them. This will reveal your non-Tor
197
+IP address. If you must work with DOC and/or PDF files, we strongly
198
+recommend either using a disconnected computer, downloading the free <a
199
+href="https://www.virtualbox.org/">VirtualBox</a> and using it with a <a
200
+href="http://virtualboxes.org/">virtual machine image</a> with networking
201
+disabled, or using <a href="http://tails.boum.org/">Tails</a>.
202
+Under no circumstances is it safe to use <a
203
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
204
+and Tor</a> together, however.</p>
227 205
 </li>
228 206
 
229 207
 <li><b>Use bridges and/or find company</b>
230
-
231
-<p>
232
-
233
-Tor tries to prevent attackers from learning what destination websites you
234
-connect to. However, by default, it does not prevent somebody watching your Internet
235
-traffic from learning that you're using Tor. If this matters to you, you can
236
-reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor
237
-bridge relay</a> rather than connecting directly to the public Tor network.
238
-Ultimately the best protection is a social approach: the more Tor
239
-users there are near you and the more 
240
-<a href="<page about/torusers>">diverse</a> their interests, the less 
241
-dangerous it will be that you are one of them. Convince other people to use
242
-Tor, too!
243
-
244
-</p>
245
-
208
+<p>Tor tries to prevent attackers from learning what destination websites
209
+you connect to. However, by default, it does not prevent somebody
210
+watching your Internet traffic from learning that you're using Tor. If
211
+this matters to you, you can reduce this risk by configuring Tor to use a
212
+<a href="<page docs/bridges>">Tor bridge relay</a> rather than connecting
213
+directly to the public Tor network.  Ultimately the best protection is
214
+a social approach: the more Tor users there are near you and the more
215
+<a href="<page about/torusers>">diverse</a> their interests, the less
216
+dangerous it will be that you are one of them. Convince other people to
217
+use Tor, too!</p>
246 218
 </li>
247 219
 
248 220
 </ol>
249 221
 <br>
250
-<p>
251
-Be smart and learn more. Understand what Tor does and does not offer.
252
-This list of pitfalls isn't complete, and we need your
253
-help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting
254
-all the issues</a>.
255
-</p>
222
+<p>Be smart and learn more. Understand what Tor does and does not offer.
223
+This list of pitfalls isn't complete, and we need your help <a href="<page
224
+getinvolved/volunteer>#Documentation">identifying and documenting all
225
+the issues</a>.</p>
226
+
256 227
 </div>
257 228
 <!-- END WARNING -->
258 229
 </div>