Andrew Lewman commited on 2010-02-08 13:28:27
Zeige 1 geänderte Dateien mit 27 Einfügungen und 21 Löschungen.
... | ... |
@@ -140,9 +140,11 @@ Stable packages are released when we believe the features and code will |
140 | 140 |
not change for many months. |
141 | 141 |
</p> |
142 | 142 |
<p> |
143 |
-Unstable packages are released so you can help us test new features and bugfixes. Even though they have a higher version number |
|
144 |
-than the stable versions listed above, there is a much higher chance of |
|
145 |
-serious reliability and security bugs in these downloads. Please be prepared to <a href="https://bugs.torproject.org/">report bugs</a>. |
|
143 |
+Unstable packages are released so you can help us test new features |
|
144 |
+and bugfixes. Even though they have a higher version number than the |
|
145 |
+stable versions listed above, there is a much higher chance of serious |
|
146 |
+reliability and security bugs in these downloads. Please be prepared |
|
147 |
+to <a href="https://bugs.torproject.org/">report bugs</a>. |
|
146 | 148 |
</p> |
147 | 149 |
</div> |
148 | 150 |
|
... | ... |
@@ -212,17 +214,16 @@ into revealing your IP address. For example, that means Youtube is |
212 | 214 |
disabled. If you really need your Youtube, you can <a href="<page |
213 | 215 |
torbutton/faq>#noflash">reconfigure Torbutton</a> to allow it; but |
214 | 216 |
be aware that you're opening yourself up to potential attack. Also, |
215 |
-extensions like Google toolbar look up |
|
216 |
-more information about the websites you type in: |
|
217 |
-they may bypass Tor and/or broadcast sensitive information. Some |
|
218 |
-people prefer using two browsers (one for Tor, one for unsafe browsing). |
|
217 |
+extensions like Google toolbar look up more information about the |
|
218 |
+websites you type in: they may bypass Tor and/or broadcast sensitive |
|
219 |
+information. Some people prefer using two browsers (one for Tor, one |
|
220 |
+for unsafe browsing). |
|
219 | 221 |
</li> |
220 | 222 |
|
221 | 223 |
<li> |
222 |
-Beware of cookies: if you ever browse without Tor |
|
223 |
-and a site gives you a cookie, that cookie could identify you even when |
|
224 |
-you start using Tor again. Torbutton tries to handle your cookies |
|
225 |
-safely. <a |
|
224 |
+Beware of cookies: if you ever browse without Tor and a site gives |
|
225 |
+you a cookie, that cookie could identify you even when you start |
|
226 |
+using Tor again. Torbutton tries to handle your cookies safely. <a |
|
226 | 227 |
href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
227 | 228 |
protect any cookies you do not want to lose. |
228 | 229 |
</li> |
... | ... |
@@ -233,19 +234,18 @@ between you and the Tor network and everything inside the Tor network, |
233 | 234 |
but <a |
234 | 235 |
href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it |
235 | 236 |
can't encrypt your traffic between the Tor network and its final |
236 |
-destination.</a> |
|
237 |
-If you are communicating sensitive information, you should use as much |
|
238 |
-care as you would on the normal scary Internet — use HTTPS or other |
|
239 |
-end-to-end encryption and authentication. |
|
237 |
+destination.</a> If you are communicating sensitive information, you |
|
238 |
+should use as much care as you would on the normal scary Internet — |
|
239 |
+use HTTPS or other end-to-end encryption and authentication. |
|
240 | 240 |
</li> |
241 | 241 |
|
242 | 242 |
<li> |
243 |
-While Tor blocks attackers |
|
244 |
-on your local network from discovering or influencing your destination, |
|
245 |
-it opens new risks: malicious or misconfigured Tor exit nodes can send |
|
246 |
-you the wrong page, or even send you embedded Java applets disguised as |
|
247 |
-domains you trust. Be careful opening documents or applications you |
|
248 |
-download through Tor, unless you've verified their integrity. |
|
243 |
+While Tor blocks attackers on your local network from discovering |
|
244 |
+or influencing your destination, it opens new risks: malicious or |
|
245 |
+misconfigured Tor exit nodes can send you the wrong page, or even send |
|
246 |
+you embedded Java applets disguised as domains you trust. Be careful |
|
247 |
+opening documents or applications you download through Tor, unless you've |
|
248 |
+verified their integrity. |
|
249 | 249 |
</li> |
250 | 250 |
</ol> |
251 | 251 |
|
... | ... |
@@ -266,6 +266,12 @@ entry on verifying package signatures</a>, which allows |
266 | 266 |
you to make sure you've downloaded the file we intended you to get. |
267 | 267 |
</p> |
268 | 268 |
|
269 |
+<p> |
|
270 |
+If you would like to research any past release of Tor source, packages, |
|
271 |
+or other binaries, see <a href="http://archive.torproject.org/">the |
|
272 |
+archive</a>. |
|
273 |
+</p> |
|
274 |
+ |
|
269 | 275 |
<p> |
270 | 276 |
See the <a href="<page documentation>#Developers">developer |
271 | 277 |
documentation</a> for instructions on fetching Tor from Git to get |
272 | 278 |