Andrew Lewman commited on 2010-10-11 19:04:01
Zeige 3 geänderte Dateien mit 7 Einfügungen und 6 Löschungen.
| ... | ... |
@@ -58,7 +58,7 @@ |
| 58 | 58 |
- Hrmm.. proxy bypass ability? |
| 59 | 59 |
|
| 60 | 60 |
- Test results. Used Incognito Mode with the test suites from: |
| 61 |
- https://www.torproject.org/torbutton/design/#SingleStateTesting |
|
| 61 |
+ https://www.torproject.org/torbutton/design/index.html.en#SingleStateTesting |
|
| 62 | 62 |
- Decloak.net: |
| 63 | 63 |
- Recovers IP and DNS via Java |
| 64 | 64 |
- Recovers IP via flash |
| ... | ... |
@@ -96,7 +96,8 @@ |
| 96 | 96 |
onclick="return install(event);">install from this website</a> or |
| 97 | 97 |
<a href="https://addons.mozilla.org/en-US/firefox/downloads/latest/2275/addon-2275-latest.xpi?src=addondetail">install from Mozilla's Add-On site</a><br/> |
| 98 | 98 |
<strong>Past Releases:</strong> <a href="releases/">Local</a><br/> |
| 99 |
- <strong>Developer Documentation:</strong> <a href="design/">Torbutton Design Document</a> and <a href="design/MozillaBrownBag.pdf">Slides (Not actively updated)</a><br/> |
|
| 99 |
+ <strong>Developer Documentation:</strong> <a href="design/index.html.en>">Torbutton Design Document</a> and <a href="design/MozillaBrownBag.pdf">Slides (Not actively updated)</a><br/> |
|
| 100 |
+ |
|
| 100 | 101 |
<strong>Extras:</strong> |
| 101 | 102 |
|
| 102 | 103 |
Google search plugins for |
| ... | ... |
@@ -119,9 +119,9 @@ |
| 119 | 119 |
<b>Simply do not use Tor</b> and you will have the same (and in some cases, |
| 120 | 120 |
better) security. For more information on the types of attacks you are exposed |
| 121 | 121 |
to with a "homegrown" solution, please see <a |
| 122 |
- href="design/index.html#adversary">The Torbutton |
|
| 122 |
+ href="design/index.html.en#adversary">The Torbutton |
|
| 123 | 123 |
Adversary Model</a>, in particular the <a |
| 124 |
- href="design/index.html#attacks">Adversary |
|
| 124 |
+ href="design/index.html.en#attacks">Adversary |
|
| 125 | 125 |
Capabilities - Attacks</a> subsection. If there are any specific Torbutton |
| 126 | 126 |
behaviors that you do not like, please file a bug on <a |
| 127 | 127 |
href="https://trac.torproject.org/projects/tor/report/14">the |
| ... | ... |
@@ -204,7 +204,7 @@ |
| 204 | 204 |
href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
| 205 | 205 |
and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
| 206 | 206 |
disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
| 207 |
- adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
| 207 |
+ adservers (see the <a href="design/index.html.en#adversary">Torbutton Adversary |
|
| 208 | 208 |
Model</a> for more information). However, with Torbutton installed in tandem |
| 209 | 209 |
and always enabled, it is possible to configure FoxyProxy securely (though it |
| 210 | 210 |
is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls, |
| ... | ... |
@@ -314,7 +314,7 @@ |
| 314 | 314 |
|
| 315 | 315 |
<p> |
| 316 | 316 |
There are a few known security issues with Torbutton (all of which are due to |
| 317 |
- <a href="design/index.html#FirefoxBugs">unfixed |
|
| 317 |
+ <a href="design/index.html.en#FirefoxBugs">unfixed |
|
| 318 | 318 |
Firefox security bugs</a>). The most important for anonymity is that it is |
| 319 | 319 |
possible to unmask the javascript hooks that wrap the Date object to conceal |
| 320 | 320 |
your timezone in Firefox 2, and the timezone masking code does not work at all |
| 321 | 321 |