Browse code

replay 23239, also lost in transition

Roger Dingledine authored on 27/10/2010 12:22:45
Showing 1 changed files
... ...
@@ -273,6 +273,18 @@ you embedded Java applets disguised as domains you trust. Be careful
273 273
 opening documents or applications you download through Tor, unless you've
274 274
 verified their integrity.
275 275
 </li>
276
+
277
+<li>
278
+Tor tries to prevent attackers from learning what destinations you connect
279
+to. It doesn't prevent somebody watching your traffic from learning that
280
+you're using Tor. You can mitigate (but not fully resolve) the risk
281
+by using a <a href="<page docs/bridges>">Tor bridge relay</a> rather than
282
+connecting directly to the public Tor network, but ultimately the best
283
+protection here is a social approach: the more Tor users there are near
284
+you and the more <a href="<page about/torusers>">diverse</a> their interests,
285
+the less dangerous it will be that you are one of them.
286
+</li>
287
+
276 288
 </ol>
277 289
 
278 290
 <br>