fix links to design html since mikeperry does something crazy like parse semi-html with xslt transformer.
Andrew Lewman

Andrew Lewman commited on 2010-10-11 19:04:01
Zeige 3 geänderte Dateien mit 7 Einfügungen und 6 Löschungen.

... ...
@@ -58,7 +58,7 @@
58 58
     - Hrmm.. proxy bypass ability?
59 59
 
60 60
 - Test results. Used Incognito Mode with the test suites from:
61
-  https://www.torproject.org/torbutton/design/#SingleStateTesting
61
+  https://www.torproject.org/torbutton/design/index.html.en#SingleStateTesting
62 62
   - Decloak.net:
63 63
     - Recovers IP and DNS via Java
64 64
     - Recovers IP via flash
... ...
@@ -96,7 +96,8 @@
96 96
       onclick="return install(event);">install from this website</a> or 
97 97
     <a href="https://addons.mozilla.org/en-US/firefox/downloads/latest/2275/addon-2275-latest.xpi?src=addondetail">install from Mozilla's Add-On site</a><br/>
98 98
     <strong>Past Releases:</strong> <a href="releases/">Local</a><br/>
99
-    <strong>Developer Documentation:</strong> <a href="design/">Torbutton Design Document</a> and <a href="design/MozillaBrownBag.pdf">Slides (Not actively updated)</a><br/>
99
+    <strong>Developer Documentation:</strong> <a href="design/index.html.en>">Torbutton Design Document</a> and <a href="design/MozillaBrownBag.pdf">Slides (Not actively updated)</a><br/>
100
+
100 101
    <strong>Extras:</strong> 
101 102
     
102 103
     Google search plugins for
... ...
@@ -119,9 +119,9 @@
119 119
     <b>Simply do not use Tor</b> and you will have the same (and in some cases,
120 120
     better) security.  For more information on the types of attacks you are exposed
121 121
     to with a "homegrown" solution, please see <a
122
-    href="design/index.html#adversary">The Torbutton
122
+    href="design/index.html.en#adversary">The Torbutton
123 123
     Adversary Model</a>, in particular the <a
124
-    href="design/index.html#attacks">Adversary
124
+    href="design/index.html.en#attacks">Adversary
125 125
     Capabilities - Attacks</a> subsection. If there are any specific Torbutton
126 126
     behaviors that you do not like, please file a bug on <a
127 127
     href="https://trac.torproject.org/projects/tor/report/14">the
... ...
@@ -204,7 +204,7 @@
204 204
     href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a>
205 205
     and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history
206 206
     disclosure</a>, followed closely by cookie theft by exit nodes and tracking by
207
-    adservers (see the <a href="design/index.html#adversary">Torbutton Adversary
207
+    adservers (see the <a href="design/index.html.en#adversary">Torbutton Adversary
208 208
     Model</a> for more information). However, with Torbutton installed in tandem
209 209
     and always enabled, it is possible to configure FoxyProxy securely (though it
210 210
     is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls,
... ...
@@ -314,7 +314,7 @@
314 314
     
315 315
     <p>
316 316
     There are a few known security issues with Torbutton (all of which are due to
317
-    <a href="design/index.html#FirefoxBugs">unfixed
317
+    <a href="design/index.html.en#FirefoxBugs">unfixed
318 318
     Firefox security bugs</a>). The most important for anonymity is that it is
319 319
     possible to unmask the javascript hooks that wrap the Date object to conceal
320 320
     your timezone in Firefox 2, and the timezone masking code does not work at all
321 321