Mfr commited on 2008-08-06 11:18:39
Zeige 1 geänderte Dateien mit 32 Einfügungen und 32 Löschungen.
... | ... |
@@ -22,13 +22,13 @@ href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently |
22 | 22 |
prevent this.)</p> |
23 | 23 |
|
24 | 24 |
<ul> |
25 |
- <li>Disable plugins on Tor Usage (crucial)</p> |
|
25 |
+ <li>Disable plugins on Tor Usage (crucial)<p> |
|
26 | 26 |
|
27 | 27 |
This option is key to Tor security. Plugins perform their own networking |
28 | 28 |
independent of the browser, and many plugins only partially obey even their own |
29 | 29 |
proxy settings. |
30 | 30 |
</p></li> |
31 |
- <li>Isolate Dynamic Content to Tor State (crucial)</p> |
|
31 |
+ <li>Isolate Dynamic Content to Tor State (crucial)<p> |
|
32 | 32 |
|
33 | 33 |
Another crucial option, this setting causes the plugin to disable Javascript |
34 | 34 |
on tabs that are loaded during a Tor state different than the current one, |
... | ... |
@@ -38,20 +38,20 @@ proxy settings. |
38 | 38 |
state. This serves to block non-Javascript dynamic content such as CSS |
39 | 39 |
popups from revealing your IP address if you disable Tor. |
40 | 40 |
</p></li> |
41 |
- <li>Hook Dangerous Javascript (crucial)</p> |
|
41 |
+ <li>Hook Dangerous Javascript (crucial)<p> |
|
42 | 42 |
|
43 | 43 |
This setting enables the Javascript hooking code. Javascript is injected into |
44 | 44 |
pages to hook the Date object to mask your timezone, and to hook the navigator |
45 | 45 |
object to mask OS and user agent properties not handled by the standard |
46 | 46 |
Firefox user agent override settings. |
47 | 47 |
</p></li> |
48 |
- <li>Resize window dimensions to multiples of 50px on toggle (recommended)</p> |
|
48 |
+ <li>Resize window dimensions to multiples of 50px on toggle (recommended)<p> |
|
49 | 49 |
|
50 | 50 |
To cut down on the amount of state available to fingerprint users uniquely, |
51 | 51 |
this pref causes windows to be resized to a multiple of 50 pixels on each |
52 | 52 |
side when Tor is enabled and pages are loaded. |
53 | 53 |
</p></li> |
54 |
- <li>Disable Updates During Tor (recommended)</p> |
|
54 |
+ <li>Disable Updates During Tor (recommended)<p> |
|
55 | 55 |
|
56 | 56 |
Under Firefox 2, many extension authors did not update their extensions from |
57 | 57 |
SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to |
... | ... |
@@ -60,13 +60,13 @@ authenticated updates, this setting is no longer as important as it once |
60 | 60 |
was (though updates do leak information about which extensions you have, it is |
61 | 61 |
fairly infrequent). |
62 | 62 |
</p></li> |
63 |
- <li>Disable Search Suggestions during Tor (optional)</p> |
|
63 |
+ <li>Disable Search Suggestions during Tor (optional)<p> |
|
64 | 64 |
|
65 | 65 |
This optional setting governs if you get Google search suggestions during Tor |
66 | 66 |
usage. Since no cookie is transmitted during search suggestions, this is a |
67 | 67 |
relatively benign behavior. |
68 | 68 |
</p></li> |
69 |
- <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</p> |
|
69 |
+ <li>Block Tor/Non-Tor access to network from file:// urls (recommended)<p> |
|
70 | 70 |
|
71 | 71 |
These settings prevent local html documents from transmitting local files to |
72 | 72 |
arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that |
... | ... |
@@ -74,7 +74,7 @@ force the browser to save arbitrary pages locally (and also inject script into |
74 | 74 |
arbitrary html files you save to disk via Tor), it is probably a good idea to |
75 | 75 |
leave this setting on. |
76 | 76 |
</p></li> |
77 |
- <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</p> |
|
77 |
+ <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)<p> |
|
78 | 78 |
|
79 | 79 |
These two settings allow you to obtain a greater degree of assurance that |
80 | 80 |
after you toggle out of Tor, the pages are really gone and can't perform any |
... | ... |
@@ -83,7 +83,7 @@ perform activity after toggle, but these options exist as a backup measure |
83 | 83 |
just in case a flaw is discovered. They can also serve as a handy 'Boss |
84 | 84 |
Button' feature for clearing all Tor browsing off your screen in a hurry. |
85 | 85 |
</p></li> |
86 |
- <li>Isolate access to history navigation to Tor state (crucial)</p> |
|
86 |
+ <li>Isolate access to history navigation to Tor state (crucial)<p> |
|
87 | 87 |
|
88 | 88 |
This setting prevents both Javascript and accidental user clicks from causing |
89 | 89 |
the session history to load pages that were fetched in a different Tor state |
... | ... |
@@ -91,7 +91,7 @@ than the current one. Since this can be used to correlate Tor and Non-Tor |
91 | 91 |
activity and thus determine your IP address, it is marked as a crucial |
92 | 92 |
setting. |
93 | 93 |
</p></li> |
94 |
- <li>Block History Reads during Tor (crucial)</p> |
|
94 |
+ <li>Block History Reads during Tor (crucial)<p> |
|
95 | 95 |
|
96 | 96 |
Based on code contributed by <a href="http://www.collinjackson.com/">Collin |
97 | 97 |
Jackson</a>, when enabled and Tor is enabled, this setting prevents the |
... | ... |
@@ -99,11 +99,11 @@ rendering engine from knowing if certain links were visited. This mechanism |
99 | 99 |
defeats all document-based history disclosure attacks, including CSS-only |
100 | 100 |
attacks. |
101 | 101 |
</p></li> |
102 |
- <li>Block History Reads during Non-Tor (recommended)</p> |
|
102 |
+ <li>Block History Reads during Non-Tor (recommended)<p> |
|
103 | 103 |
|
104 | 104 |
This setting accomplishes the same but for your Non-Tor activity. |
105 | 105 |
</p></li> |
106 |
- <li>Block History Writes during Tor (recommended)</p> |
|
106 |
+ <li>Block History Writes during Tor (recommended)<p> |
|
107 | 107 |
|
108 | 108 |
This setting prevents the rendering engine from recording visited URLs, and |
109 | 109 |
also disables download manager history. Note that if you allow writing of Tor history, |
... | ... |
@@ -111,37 +111,37 @@ it is recommended that you disable non-Tor history reads, since malicious |
111 | 111 |
websites you visit without Tor can query your history for .onion sites and |
112 | 112 |
other history recorded during Tor usage (such as Google queries). |
113 | 113 |
</p></li> |
114 |
- <li>Block History Writes during Non-Tor (optional)</p> |
|
114 |
+ <li>Block History Writes during Non-Tor (optional)<p> |
|
115 | 115 |
|
116 | 116 |
This setting also disables recording any history information during Non-Tor |
117 | 117 |
usage. |
118 | 118 |
</p></li> |
119 |
-<li>Clear History During Tor Toggle (optional)</p> |
|
119 |
+<li>Clear History During Tor Toggle (optional)<p> |
|
120 | 120 |
|
121 | 121 |
This is an alternate setting to use instead of (or in addition to) blocking |
122 | 122 |
history reads or writes. |
123 | 123 |
</p></li> |
124 |
- <li>Block Password+Form saving during Tor/Non-Tor</p> |
|
124 |
+ <li>Block Password+Form saving during Tor/Non-Tor<p> |
|
125 | 125 |
|
126 | 126 |
These options govern if the browser writes your passwords and search |
127 | 127 |
submissions to disk for the given state. |
128 | 128 |
</p></li> |
129 |
- <li>Block Tor disk cache and clear all cache on Tor Toggle</p> |
|
129 |
+ <li>Block Tor disk cache and clear all cache on Tor Toggle<p> |
|
130 | 130 |
|
131 | 131 |
Since the browser cache can be leveraged to store unique identifiers, cache |
132 | 132 |
must not persist across Tor sessions. This option keeps the memory cache active |
133 | 133 |
during Tor usage for performance, but blocks disk access for caching. |
134 | 134 |
</p></li> |
135 |
- <li>Block disk and memory cache during Tor</p> |
|
135 |
+ <li>Block disk and memory cache during Tor<p> |
|
136 | 136 |
|
137 | 137 |
This setting entirely blocks the cache during Tor, but preserves it for |
138 | 138 |
Non-Tor usage. |
139 | 139 |
</p></li> |
140 |
- <li>Clear Cookies on Tor Toggle</p> |
|
140 |
+ <li>Clear Cookies on Tor Toggle<p> |
|
141 | 141 |
|
142 | 142 |
Fully clears all cookies on Tor toggle. |
143 | 143 |
</p></li> |
144 |
- <li>Store Non-Tor cookies in a protected jar</p> |
|
144 |
+ <li>Store Non-Tor cookies in a protected jar<p> |
|
145 | 145 |
|
146 | 146 |
This option stores your persistent Non-Tor cookies in a special cookie jar |
147 | 147 |
file, in case you wish to preserve some cookies. Based on code contributed |
... | ... |
@@ -149,14 +149,14 @@ Non-Tor usage. |
149 | 149 |
compatible with third party extensions that you use to manage your Non-Tor |
150 | 150 |
cookies. Your Tor cookies will be cleared on toggle, of course. |
151 | 151 |
</p></li> |
152 |
- <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</p> |
|
152 |
+ <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)<p> |
|
153 | 153 |
|
154 | 154 |
This option stores your persistent Tor and Non-Tor cookies |
155 | 155 |
separate cookie jar files. Note that it is a bad idea to keep Tor |
156 | 156 |
cookies around for any length of time, as they can be retrieved by exit |
157 | 157 |
nodes that inject spoofed forms into plaintext pages you fetch. |
158 | 158 |
</p></li> |
159 |
- <li>Manage My Own Cookies (dangerous)</p> |
|
159 |
+ <li>Manage My Own Cookies (dangerous)<p> |
|
160 | 160 |
|
161 | 161 |
This setting allows you to manage your own cookies with an alternate |
162 | 162 |
extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous, |
... | ... |
@@ -165,13 +165,13 @@ sites you have preserved cookies for (and can then do things like fetch your |
165 | 165 |
entire gmail inbox, even if you were not using gmail or visiting any google |
166 | 166 |
pages at the time!). |
167 | 167 |
</p></li> |
168 |
- <li>Do not write Tor/Non-Tor cookies to disk</p> |
|
168 |
+ <li>Do not write Tor/Non-Tor cookies to disk<p> |
|
169 | 169 |
|
170 | 170 |
These settings prevent Firefox from writing any cookies to disk during the |
171 | 171 |
corresponding Tor state. If cookie jars are enabled, those jars will |
172 | 172 |
exist in memory only, and will be cleared when Firefox exits. |
173 | 173 |
</p></li> |
174 |
- <li>Disable DOM Storage during Tor usage (crucial)</p> |
|
174 |
+ <li>Disable DOM Storage during Tor usage (crucial)<p> |
|
175 | 175 |
|
176 | 176 |
Firefox has recently added the ability to store additional state and |
177 | 177 |
identifiers in persistent tables, called <a |
... | ... |
@@ -179,17 +179,17 @@ pages at the time!). |
179 | 179 |
Obviously this can compromise your anonymity if stored content can be |
180 | 180 |
fetched across Tor-state. |
181 | 181 |
</p></li> |
182 |
- <li>Clear HTTP auth sessions (recommended)</p> |
|
182 |
+ <li>Clear HTTP auth sessions (recommended)<p> |
|
183 | 183 |
|
184 | 184 |
HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. |
185 | 185 |
</p></li> |
186 |
- <li>Clear cookies on Tor/Non-Tor shutdown</p> |
|
186 |
+ <li>Clear cookies on Tor/Non-Tor shutdown<p> |
|
187 | 187 |
|
188 | 188 |
These settings install a shutdown handler to clear cookies on Tor |
189 | 189 |
and/or Non-Tor browser shutdown. It is independent of your Clear Private Data |
190 | 190 |
settings, and does in fact clear the corresponding cookie jars. |
191 | 191 |
</p></li> |
192 |
- <li>Prevent session store from saving Tor-loaded tabs (recommended)</p> |
|
192 |
+ <li>Prevent session store from saving Tor-loaded tabs (recommended)<p> |
|
193 | 193 |
|
194 | 194 |
This option augments the session store to prevent it from writing out |
195 | 195 |
Tor-loaded tabs to disk. Unfortunately, this also disables your ability to |
... | ... |
@@ -198,19 +198,19 @@ settings, and does in fact clear the corresponding cookie jars. |
198 | 198 |
can potentially load a bunch of Tor tabs without Tor. The following option |
199 | 199 |
is another alternative to protect against this. |
200 | 200 |
</p></li> |
201 |
- <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</p> |
|
201 |
+ <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State<p> |
|
202 | 202 |
|
203 | 203 |
This setting allows you to choose which Tor state you want the browser to |
204 | 204 |
start in normally: Tor, Non-Tor, or whatever state the browser shut down in. |
205 | 205 |
</p></li> |
206 |
- <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</p> |
|
206 |
+ <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor<p> |
|
207 | 207 |
|
208 | 208 |
When Firefox crashes, the Tor state upon restart usually is completely |
209 | 209 |
random, and depending on your choice for the above option, may load |
210 | 210 |
a bunch of tabs in the wrong state. This setting allows you to choose |
211 | 211 |
which state the crashed session should always be restored in to. |
212 | 212 |
</p></li> |
213 |
- <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</p> |
|
213 |
+ <li>Prevent session store from saving Non-Tor/Tor-loaded tabs<p> |
|
214 | 214 |
|
215 | 215 |
These two settings allow you to control what the Firefox Session Store |
216 | 216 |
writes to disk. Since the session store state is used to automatically |
... | ... |
@@ -219,7 +219,7 @@ settings, and does in fact clear the corresponding cookie jars. |
219 | 219 |
after a crash (or the reverse, depending upon the crash recovery setting, |
220 | 220 |
of course). |
221 | 221 |
</p></li> |
222 |
- <li>Set user agent during Tor usage (crucial)</p> |
|
222 |
+ <li>Set user agent during Tor usage (crucial)<p> |
|
223 | 223 |
|
224 | 224 |
User agent masking is done with the idea of making all Tor users appear |
225 | 225 |
uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this |
... | ... |
@@ -231,12 +231,12 @@ must also allow Hook Dangerous Javascript ensure that the navigator.* |
231 | 231 |
properties are reset correctly. The browser does not set some of them via the |
232 | 232 |
exposed user agent override preferences. |
233 | 233 |
</p></li> |
234 |
- <li>Spoof US English Browser</p> |
|
234 |
+ <li>Spoof US English Browser<p> |
|
235 | 235 |
|
236 | 236 |
This option causes Firefox to send http headers as if it were an English |
237 | 237 |
browser. Useful for internationalized users. |
238 | 238 |
</p></li> |
239 |
- <li>Don't send referrer during Tor Usage</p> |
|
239 |
+ <li>Don't send referrer during Tor Usage<p> |
|
240 | 240 |
|
241 | 241 |
This option disables the referrer header, preventing sites from determining |
242 | 242 |
where you came from to visit them. This can break some sites, however. <a |
243 | 243 |