Andrew Lewman commited on 2010-10-11 19:04:01
Zeige 3 geänderte Dateien mit 7 Einfügungen und 6 Löschungen.
... | ... |
@@ -58,7 +58,7 @@ |
58 | 58 |
- Hrmm.. proxy bypass ability? |
59 | 59 |
|
60 | 60 |
- Test results. Used Incognito Mode with the test suites from: |
61 |
- https://www.torproject.org/torbutton/design/#SingleStateTesting |
|
61 |
+ https://www.torproject.org/torbutton/design/index.html.en#SingleStateTesting |
|
62 | 62 |
- Decloak.net: |
63 | 63 |
- Recovers IP and DNS via Java |
64 | 64 |
- Recovers IP via flash |
... | ... |
@@ -96,7 +96,8 @@ |
96 | 96 |
onclick="return install(event);">install from this website</a> or |
97 | 97 |
<a href="https://addons.mozilla.org/en-US/firefox/downloads/latest/2275/addon-2275-latest.xpi?src=addondetail">install from Mozilla's Add-On site</a><br/> |
98 | 98 |
<strong>Past Releases:</strong> <a href="releases/">Local</a><br/> |
99 |
- <strong>Developer Documentation:</strong> <a href="design/">Torbutton Design Document</a> and <a href="design/MozillaBrownBag.pdf">Slides (Not actively updated)</a><br/> |
|
99 |
+ <strong>Developer Documentation:</strong> <a href="design/index.html.en>">Torbutton Design Document</a> and <a href="design/MozillaBrownBag.pdf">Slides (Not actively updated)</a><br/> |
|
100 |
+ |
|
100 | 101 |
<strong>Extras:</strong> |
101 | 102 |
|
102 | 103 |
Google search plugins for |
... | ... |
@@ -119,9 +119,9 @@ |
119 | 119 |
<b>Simply do not use Tor</b> and you will have the same (and in some cases, |
120 | 120 |
better) security. For more information on the types of attacks you are exposed |
121 | 121 |
to with a "homegrown" solution, please see <a |
122 |
- href="design/index.html#adversary">The Torbutton |
|
122 |
+ href="design/index.html.en#adversary">The Torbutton |
|
123 | 123 |
Adversary Model</a>, in particular the <a |
124 |
- href="design/index.html#attacks">Adversary |
|
124 |
+ href="design/index.html.en#attacks">Adversary |
|
125 | 125 |
Capabilities - Attacks</a> subsection. If there are any specific Torbutton |
126 | 126 |
behaviors that you do not like, please file a bug on <a |
127 | 127 |
href="https://trac.torproject.org/projects/tor/report/14">the |
... | ... |
@@ -204,7 +204,7 @@ |
204 | 204 |
href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
205 | 205 |
and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
206 | 206 |
disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
207 |
- adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
207 |
+ adservers (see the <a href="design/index.html.en#adversary">Torbutton Adversary |
|
208 | 208 |
Model</a> for more information). However, with Torbutton installed in tandem |
209 | 209 |
and always enabled, it is possible to configure FoxyProxy securely (though it |
210 | 210 |
is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls, |
... | ... |
@@ -314,7 +314,7 @@ |
314 | 314 |
|
315 | 315 |
<p> |
316 | 316 |
There are a few known security issues with Torbutton (all of which are due to |
317 |
- <a href="design/index.html#FirefoxBugs">unfixed |
|
317 |
+ <a href="design/index.html.en#FirefoxBugs">unfixed |
|
318 | 318 |
Firefox security bugs</a>). The most important for anonymity is that it is |
319 | 319 |
possible to unmask the javascript hooks that wrap the Date object to conceal |
320 | 320 |
your timezone in Firefox 2, and the timezone masking code does not work at all |
321 | 321 |