...
|
...
|
@@ -273,6 +273,18 @@ you embedded Java applets disguised as domains you trust. Be careful
|
273
|
273
|
opening documents or applications you download through Tor, unless you've
|
274
|
274
|
verified their integrity.
|
275
|
275
|
</li>
|
|
276
|
+
|
|
277
|
+<li>
|
|
278
|
+Tor tries to prevent attackers from learning what destinations you connect
|
|
279
|
+to. It doesn't prevent somebody watching your traffic from learning that
|
|
280
|
+you're using Tor. You can mitigate (but not fully resolve) the risk
|
|
281
|
+by using a <a href="<page docs/bridges>">Tor bridge relay</a> rather than
|
|
282
|
+connecting directly to the public Tor network, but ultimately the best
|
|
283
|
+protection here is a social approach: the more Tor users there are near
|
|
284
|
+you and the more <a href="<page about/torusers>">diverse</a> their interests,
|
|
285
|
+the less dangerous it will be that you are one of them.
|
|
286
|
+</li>
|
|
287
|
+
|
276
|
288
|
</ol>
|
277
|
289
|
|
278
|
290
|
<br>
|