fix HTML Tags
Mfr

Mfr commited on 2008-08-06 11:18:39
Zeige 1 geänderte Dateien mit 32 Einfügungen und 32 Löschungen.

... ...
@@ -22,13 +22,13 @@ href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently
22 22
 prevent this.)</p>
23 23
 
24 24
 <ul>
25
- <li>Disable plugins on Tor Usage (crucial)</p> 
25
+ <li>Disable plugins on Tor Usage (crucial)<p> 
26 26
 
27 27
   This option is key to Tor security. Plugins perform their own networking
28 28
 independent of the browser, and many plugins only partially obey even their own
29 29
 proxy settings.
30 30
 </p></li>
31
-  <li>Isolate Dynamic Content to Tor State (crucial)</p> 
31
+  <li>Isolate Dynamic Content to Tor State (crucial)<p> 
32 32
 
33 33
   Another crucial option, this setting causes the plugin to disable Javascript
34 34
   on tabs that are loaded during a Tor state different than the current one,
... ...
@@ -38,20 +38,20 @@ proxy settings.
38 38
   state. This serves to block non-Javascript dynamic content such as CSS
39 39
   popups from revealing your IP address if you disable Tor.
40 40
 </p></li>
41
-  <li>Hook Dangerous Javascript (crucial)</p> 
41
+  <li>Hook Dangerous Javascript (crucial)<p> 
42 42
 
43 43
 This setting enables the Javascript hooking code. Javascript is injected into
44 44
 pages to hook the Date object to mask your timezone, and to hook the navigator
45 45
 object to mask OS and user agent properties not handled by the standard
46 46
 Firefox user agent override settings.
47 47
 </p></li>
48
-  <li>Resize window dimensions to multiples of 50px on toggle (recommended)</p> 
48
+  <li>Resize window dimensions to multiples of 50px on toggle (recommended)<p> 
49 49
 
50 50
 To cut down on the amount of state available to fingerprint users uniquely, 
51 51
 this pref causes windows to be resized to a multiple of 50 pixels on each
52 52
 side when Tor is enabled and pages are loaded.
53 53
 </p></li>
54
-  <li>Disable Updates During Tor (recommended)</p> 
54
+  <li>Disable Updates During Tor (recommended)<p> 
55 55
 
56 56
 Under Firefox 2, many extension authors did not update their extensions from 
57 57
 SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to 
... ...
@@ -60,13 +60,13 @@ authenticated updates, this setting is no longer as important as it once
60 60
 was (though updates do leak information about which extensions you have, it is
61 61
 fairly infrequent).
62 62
 </p></li>
63
-  <li>Disable Search Suggestions during Tor (optional)</p> 
63
+  <li>Disable Search Suggestions during Tor (optional)<p> 
64 64
 
65 65
 This optional setting governs if you get Google search suggestions during Tor
66 66
 usage. Since no cookie is transmitted during search suggestions, this is a
67 67
 relatively benign behavior.
68 68
 </p></li>
69
-  <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</p> 
69
+  <li>Block Tor/Non-Tor access to network from file:// urls (recommended)<p> 
70 70
 
71 71
 These settings prevent local html documents from transmitting local files to
72 72
 arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that
... ...
@@ -74,7 +74,7 @@ force the browser to save arbitrary pages locally (and also inject script into
74 74
 arbitrary html files you save to disk via Tor), it is probably a good idea to
75 75
 leave this setting on.
76 76
 </p></li>
77
-  <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</p> 
77
+  <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)<p> 
78 78
 
79 79
 These two settings allow you to obtain a greater degree of assurance that
80 80
 after you toggle out of Tor, the pages are really gone and can't perform any
... ...
@@ -83,7 +83,7 @@ perform activity after toggle, but these options exist as a backup measure
83 83
 just in case a flaw is discovered. They can also serve as a handy 'Boss
84 84
 Button' feature for clearing all Tor browsing off your screen in a hurry.
85 85
 </p></li>
86
-  <li>Isolate access to history navigation to Tor state (crucial)</p> 
86
+  <li>Isolate access to history navigation to Tor state (crucial)<p> 
87 87
 
88 88
 This setting prevents both Javascript and accidental user clicks from causing
89 89
 the session history to load pages that were fetched in a different Tor state
... ...
@@ -91,7 +91,7 @@ than the current one. Since this can be used to correlate Tor and Non-Tor
91 91
 activity and thus determine your IP address, it is marked as a crucial 
92 92
 setting.
93 93
 </p></li>
94
-  <li>Block History Reads during Tor (crucial)</p> 
94
+  <li>Block History Reads during Tor (crucial)<p> 
95 95
 
96 96
   Based on code contributed by <a href="http://www.collinjackson.com/">Collin
97 97
   Jackson</a>, when enabled and Tor is enabled, this setting prevents the
... ...
@@ -99,11 +99,11 @@ rendering engine from knowing if certain links were visited.  This mechanism
99 99
 defeats all document-based history disclosure attacks, including CSS-only
100 100
 attacks.
101 101
 </p></li>
102
-  <li>Block History Reads during Non-Tor (recommended)</p> 
102
+  <li>Block History Reads during Non-Tor (recommended)<p> 
103 103
 
104 104
   This setting accomplishes the same but for your Non-Tor activity.
105 105
 </p></li>
106
-  <li>Block History Writes during Tor (recommended)</p> 
106
+  <li>Block History Writes during Tor (recommended)<p> 
107 107
 
108 108
   This setting prevents the rendering engine from recording visited URLs, and
109 109
 also disables download manager history. Note that if you allow writing of Tor history,
... ...
@@ -111,37 +111,37 @@ it is recommended that you disable non-Tor history reads, since malicious
111 111
 websites you visit without Tor can query your history for .onion sites and
112 112
 other history recorded during Tor usage (such as Google queries).
113 113
 </p></li>
114
-  <li>Block History Writes during Non-Tor (optional)</p> 
114
+  <li>Block History Writes during Non-Tor (optional)<p> 
115 115
 
116 116
 This setting also disables recording any history information during Non-Tor
117 117
 usage.
118 118
 </p></li>
119
-<li>Clear History During Tor Toggle (optional)</p> 
119
+<li>Clear History During Tor Toggle (optional)<p> 
120 120
 
121 121
   This is an alternate setting to use instead of (or in addition to) blocking
122 122
 history reads or writes.
123 123
 </p></li>
124
-  <li>Block Password+Form saving during Tor/Non-Tor</p> 
124
+  <li>Block Password+Form saving during Tor/Non-Tor<p> 
125 125
 
126 126
   These options govern if the browser writes your passwords and search
127 127
   submissions to disk for the given state.
128 128
 </p></li>
129
-  <li>Block Tor disk cache and clear all cache on Tor Toggle</p> 
129
+  <li>Block Tor disk cache and clear all cache on Tor Toggle<p> 
130 130
 
131 131
   Since the browser cache can be leveraged to store unique identifiers, cache
132 132
 must not persist across Tor sessions. This option keeps the memory cache active
133 133
 during Tor usage for performance, but blocks disk access for caching.
134 134
 </p></li>
135
-  <li>Block disk and memory cache during Tor</p> 
135
+  <li>Block disk and memory cache during Tor<p> 
136 136
 
137 137
   This setting entirely blocks the cache during Tor, but preserves it for
138 138
 Non-Tor usage.
139 139
 </p></li>
140
-  <li>Clear Cookies on Tor Toggle</p> 
140
+  <li>Clear Cookies on Tor Toggle<p> 
141 141
 
142 142
   Fully clears all cookies on Tor toggle.
143 143
 </p></li>
144
-  <li>Store Non-Tor cookies in a protected jar</p> 
144
+  <li>Store Non-Tor cookies in a protected jar<p> 
145 145
 
146 146
   This option stores your persistent Non-Tor cookies in a special cookie jar
147 147
   file, in case you wish to preserve some cookies. Based on code contributed
... ...
@@ -149,14 +149,14 @@ Non-Tor usage.
149 149
   compatible with third party extensions that you use to manage your Non-Tor
150 150
   cookies. Your Tor cookies will be cleared on toggle, of course.
151 151
 </p></li>
152
-  <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</p> 
152
+  <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)<p> 
153 153
 
154 154
   This option stores your persistent Tor and Non-Tor cookies 
155 155
   separate cookie jar files. Note that it is a bad idea to keep Tor
156 156
   cookies around for any length of time, as they can be retrieved by exit
157 157
   nodes that inject spoofed forms into plaintext pages you fetch.
158 158
 </p></li>
159
-  <li>Manage My Own Cookies (dangerous)</p> 
159
+  <li>Manage My Own Cookies (dangerous)<p> 
160 160
 
161 161
   This setting allows you to manage your own cookies with an alternate
162 162
 extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous,
... ...
@@ -165,13 +165,13 @@ sites you have preserved cookies for (and can then do things like fetch your
165 165
 entire gmail inbox, even if you were not using gmail or visiting any google
166 166
 pages at the time!).
167 167
 </p></li>
168
-  <li>Do not write Tor/Non-Tor cookies to disk</p> 
168
+  <li>Do not write Tor/Non-Tor cookies to disk<p> 
169 169
 
170 170
   These settings prevent Firefox from writing any cookies to disk during the
171 171
   corresponding Tor state. If cookie jars are enabled, those jars will
172 172
   exist in memory only, and will be cleared when Firefox exits.
173 173
 </p></li>
174
-  <li>Disable DOM Storage during Tor usage (crucial)</p> 
174
+  <li>Disable DOM Storage during Tor usage (crucial)<p> 
175 175
 
176 176
   Firefox has recently added the ability to store additional state and
177 177
   identifiers in persistent tables, called <a
... ...
@@ -179,17 +179,17 @@ pages at the time!).
179 179
   Obviously this can compromise your anonymity if stored content can be
180 180
   fetched across Tor-state.
181 181
 </p></li>
182
-  <li>Clear HTTP auth sessions (recommended)</p> 
182
+  <li>Clear HTTP auth sessions (recommended)<p> 
183 183
 
184 184
   HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. 
185 185
 </p></li>
186
-  <li>Clear cookies on Tor/Non-Tor shutdown</p> 
186
+  <li>Clear cookies on Tor/Non-Tor shutdown<p> 
187 187
 
188 188
   These settings install a shutdown handler to clear cookies on Tor
189 189
 and/or Non-Tor browser shutdown. It is independent of your Clear Private Data
190 190
 settings, and does in fact clear the corresponding cookie jars.
191 191
 </p></li>
192
-  <li>Prevent session store from saving Tor-loaded tabs (recommended)</p> 
192
+  <li>Prevent session store from saving Tor-loaded tabs (recommended)<p> 
193 193
 
194 194
   This option augments the session store to prevent it from writing out
195 195
   Tor-loaded tabs to disk. Unfortunately, this also disables your ability to 
... ...
@@ -198,19 +198,19 @@ settings, and does in fact clear the corresponding cookie jars.
198 198
   can potentially load a bunch of Tor tabs without Tor. The following option
199 199
   is another alternative to protect against this.
200 200
 </p></li>
201
-  <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</p> 
201
+  <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State<p> 
202 202
 
203 203
   This setting allows you to choose which Tor state you want the browser to
204 204
   start in normally: Tor, Non-Tor, or whatever state the browser shut down in.
205 205
 </p></li>
206
-  <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</p> 
206
+  <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor<p> 
207 207
 
208 208
   When Firefox crashes, the Tor state upon restart usually is completely
209 209
   random, and depending on your choice for the above option, may load 
210 210
   a bunch of tabs in the wrong state. This setting allows you to choose
211 211
   which state the crashed session should always be restored in to.
212 212
 </p></li>
213
-  <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</p> 
213
+  <li>Prevent session store from saving Non-Tor/Tor-loaded tabs<p> 
214 214
 
215 215
   These two settings allow you to control what the Firefox Session Store
216 216
   writes to disk. Since the session store state is used to automatically
... ...
@@ -219,7 +219,7 @@ settings, and does in fact clear the corresponding cookie jars.
219 219
   after a crash (or the reverse, depending upon the crash recovery setting, 
220 220
   of course).
221 221
 </p></li>
222
-  <li>Set user agent during Tor usage (crucial)</p> 
222
+  <li>Set user agent during Tor usage (crucial)<p> 
223 223
 
224 224
   User agent masking is done with the idea of making all Tor users appear
225 225
 uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this
... ...
@@ -231,12 +231,12 @@ must also allow Hook Dangerous Javascript ensure that the navigator.*
231 231
 properties are reset correctly.  The browser does not set some of them via the
232 232
 exposed user agent override preferences.
233 233
 </p></li>
234
-  <li>Spoof US English Browser</p> 
234
+  <li>Spoof US English Browser<p> 
235 235
 
236 236
 This option causes Firefox to send http headers as if it were an English
237 237
 browser. Useful for internationalized users.
238 238
 </p></li>
239
-  <li>Don't send referrer during Tor Usage</p> 
239
+  <li>Don't send referrer during Tor Usage<p> 
240 240
 
241 241
 This option disables the referrer header, preventing sites from determining
242 242
 where you came from to visit them. This can break some sites, however. <a
243 243