Andrew Lewman commited on 2010-02-08 13:28:27
Zeige 1 geänderte Dateien mit 27 Einfügungen und 21 Löschungen.
| ... | ... |
@@ -140,9 +140,11 @@ Stable packages are released when we believe the features and code will |
| 140 | 140 |
not change for many months. |
| 141 | 141 |
</p> |
| 142 | 142 |
<p> |
| 143 |
-Unstable packages are released so you can help us test new features and bugfixes. Even though they have a higher version number |
|
| 144 |
-than the stable versions listed above, there is a much higher chance of |
|
| 145 |
-serious reliability and security bugs in these downloads. Please be prepared to <a href="https://bugs.torproject.org/">report bugs</a>. |
|
| 143 |
+Unstable packages are released so you can help us test new features |
|
| 144 |
+and bugfixes. Even though they have a higher version number than the |
|
| 145 |
+stable versions listed above, there is a much higher chance of serious |
|
| 146 |
+reliability and security bugs in these downloads. Please be prepared |
|
| 147 |
+to <a href="https://bugs.torproject.org/">report bugs</a>. |
|
| 146 | 148 |
</p> |
| 147 | 149 |
</div> |
| 148 | 150 |
|
| ... | ... |
@@ -212,17 +214,16 @@ into revealing your IP address. For example, that means Youtube is |
| 212 | 214 |
disabled. If you really need your Youtube, you can <a href="<page |
| 213 | 215 |
torbutton/faq>#noflash">reconfigure Torbutton</a> to allow it; but |
| 214 | 216 |
be aware that you're opening yourself up to potential attack. Also, |
| 215 |
-extensions like Google toolbar look up |
|
| 216 |
-more information about the websites you type in: |
|
| 217 |
-they may bypass Tor and/or broadcast sensitive information. Some |
|
| 218 |
-people prefer using two browsers (one for Tor, one for unsafe browsing). |
|
| 217 |
+extensions like Google toolbar look up more information about the |
|
| 218 |
+websites you type in: they may bypass Tor and/or broadcast sensitive |
|
| 219 |
+information. Some people prefer using two browsers (one for Tor, one |
|
| 220 |
+for unsafe browsing). |
|
| 219 | 221 |
</li> |
| 220 | 222 |
|
| 221 | 223 |
<li> |
| 222 |
-Beware of cookies: if you ever browse without Tor |
|
| 223 |
-and a site gives you a cookie, that cookie could identify you even when |
|
| 224 |
-you start using Tor again. Torbutton tries to handle your cookies |
|
| 225 |
-safely. <a |
|
| 224 |
+Beware of cookies: if you ever browse without Tor and a site gives |
|
| 225 |
+you a cookie, that cookie could identify you even when you start |
|
| 226 |
+using Tor again. Torbutton tries to handle your cookies safely. <a |
|
| 226 | 227 |
href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
| 227 | 228 |
protect any cookies you do not want to lose. |
| 228 | 229 |
</li> |
| ... | ... |
@@ -233,19 +234,18 @@ between you and the Tor network and everything inside the Tor network, |
| 233 | 234 |
but <a |
| 234 | 235 |
href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it |
| 235 | 236 |
can't encrypt your traffic between the Tor network and its final |
| 236 |
-destination.</a> |
|
| 237 |
-If you are communicating sensitive information, you should use as much |
|
| 238 |
-care as you would on the normal scary Internet — use HTTPS or other |
|
| 239 |
-end-to-end encryption and authentication. |
|
| 237 |
+destination.</a> If you are communicating sensitive information, you |
|
| 238 |
+should use as much care as you would on the normal scary Internet — |
|
| 239 |
+use HTTPS or other end-to-end encryption and authentication. |
|
| 240 | 240 |
</li> |
| 241 | 241 |
|
| 242 | 242 |
<li> |
| 243 |
-While Tor blocks attackers |
|
| 244 |
-on your local network from discovering or influencing your destination, |
|
| 245 |
-it opens new risks: malicious or misconfigured Tor exit nodes can send |
|
| 246 |
-you the wrong page, or even send you embedded Java applets disguised as |
|
| 247 |
-domains you trust. Be careful opening documents or applications you |
|
| 248 |
-download through Tor, unless you've verified their integrity. |
|
| 243 |
+While Tor blocks attackers on your local network from discovering |
|
| 244 |
+or influencing your destination, it opens new risks: malicious or |
|
| 245 |
+misconfigured Tor exit nodes can send you the wrong page, or even send |
|
| 246 |
+you embedded Java applets disguised as domains you trust. Be careful |
|
| 247 |
+opening documents or applications you download through Tor, unless you've |
|
| 248 |
+verified their integrity. |
|
| 249 | 249 |
</li> |
| 250 | 250 |
</ol> |
| 251 | 251 |
|
| ... | ... |
@@ -266,6 +266,12 @@ entry on verifying package signatures</a>, which allows |
| 266 | 266 |
you to make sure you've downloaded the file we intended you to get. |
| 267 | 267 |
</p> |
| 268 | 268 |
|
| 269 |
+<p> |
|
| 270 |
+If you would like to research any past release of Tor source, packages, |
|
| 271 |
+or other binaries, see <a href="http://archive.torproject.org/">the |
|
| 272 |
+archive</a>. |
|
| 273 |
+</p> |
|
| 274 |
+ |
|
| 269 | 275 |
<p> |
| 270 | 276 |
See the <a href="<page documentation>#Developers">developer |
| 271 | 277 |
documentation</a> for instructions on fetching Tor from Git to get |
| 272 | 278 |