add a link to archive.torproject.org. suggested by barkerjr.
Andrew Lewman

Andrew Lewman commited on 2010-02-08 13:28:27
Zeige 1 geänderte Dateien mit 27 Einfügungen und 21 Löschungen.

... ...
@@ -140,9 +140,11 @@ Stable packages are released when we believe the features and code will
140 140
 not change for many months.
141 141
 </p>
142 142
 <p>
143
-Unstable packages are released so you can help us test new features and bugfixes. Even though they have a higher version number
144
-than the stable versions listed above, there is a much higher chance of
145
-serious reliability and security bugs in these downloads.  Please be prepared to <a href="https://bugs.torproject.org/">report bugs</a>.
143
+Unstable packages are released so you can help us test new features
144
+and bugfixes. Even though they have a higher version number than the
145
+stable versions listed above, there is a much higher chance of serious
146
+reliability and security bugs in these downloads.  Please be prepared
147
+to <a href="https://bugs.torproject.org/">report bugs</a>.
146 148
 </p>
147 149
 </div>
148 150
 
... ...
@@ -212,17 +214,16 @@ into revealing your IP address. For example, that means Youtube is
212 214
 disabled. If you really need your Youtube, you can <a href="<page
213 215
 torbutton/faq>#noflash">reconfigure Torbutton</a> to allow it; but
214 216
 be aware that you're opening yourself up to potential attack. Also,
215
-extensions like Google toolbar look up
216
-more information about the websites you type in:
217
-they may bypass Tor and/or broadcast sensitive information. Some
218
-people prefer using two browsers (one for Tor, one for unsafe browsing).
217
+extensions like Google toolbar look up more information about the
218
+websites you type in: they may bypass Tor and/or broadcast sensitive
219
+information. Some people prefer using two browsers (one for Tor, one
220
+for unsafe browsing).
219 221
 </li>
220 222
 
221 223
 <li>
222
-Beware of cookies: if you ever browse without Tor
223
-and a site gives you a cookie, that cookie could identify you even when
224
-you start using Tor again. Torbutton tries to handle your cookies
225
-safely. <a
224
+Beware of cookies: if you ever browse without Tor and a site gives
225
+you a cookie, that cookie could identify you even when you start
226
+using Tor again. Torbutton tries to handle your cookies safely. <a
226 227
 href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help
227 228
 protect any cookies you do not want to lose.
228 229
 </li>
... ...
@@ -233,19 +234,18 @@ between you and the Tor network and everything inside the Tor network,
233 234
 but <a
234 235
 href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it
235 236
 can't encrypt your traffic between the Tor network and its final
236
-destination.</a>
237
-If you are communicating sensitive information, you should use as much
238
-care as you would on the normal scary Internet &mdash; use HTTPS or other
239
-end-to-end encryption and authentication.
237
+destination.</a> If you are communicating sensitive information, you
238
+should use as much care as you would on the normal scary Internet &mdash;
239
+use HTTPS or other end-to-end encryption and authentication.
240 240
 </li>
241 241
 
242 242
 <li>
243
-While Tor blocks attackers
244
-on your local network from discovering or influencing your destination,
245
-it opens new risks: malicious or misconfigured Tor exit nodes can send
246
-you the wrong page, or even send you embedded Java applets disguised as
247
-domains you trust. Be careful opening documents or applications you
248
-download through Tor, unless you've verified their integrity.
243
+While Tor blocks attackers on your local network from discovering
244
+or influencing your destination, it opens new risks: malicious or
245
+misconfigured Tor exit nodes can send you the wrong page, or even send
246
+you embedded Java applets disguised as domains you trust. Be careful
247
+opening documents or applications you download through Tor, unless you've
248
+verified their integrity.
249 249
 </li>
250 250
 </ol>
251 251
 
... ...
@@ -266,6 +266,12 @@ entry on verifying package signatures</a>, which allows
266 266
 you to make sure you've downloaded the file we intended you to get.
267 267
 </p>
268 268
 
269
+<p>
270
+If you would like to research any past release of Tor source, packages,
271
+or other binaries, see <a href="http://archive.torproject.org/">the
272
+archive</a>.
273
+</p>
274
+
269 275
 <p>
270 276
 See the <a href="<page documentation>#Developers">developer
271 277
 documentation</a> for instructions on fetching Tor from Git to get
272 278