...
|
...
|
@@ -981,7 +981,7 @@ executive
|
981
|
981
|
it sends. The Tor Browser Bundle tries to keep application-level data,
|
982
|
982
|
like the user-agent string, uniform for all users. The Tor Browser can't
|
983
|
983
|
do anything about text that you type into forms, though. <a
|
984
|
|
- href="https://www.torproject.org/download/download-easy.html.en#warning">Be
|
|
984
|
+ href="<page download/download-easy>#warning">Be
|
985
|
985
|
careful and be smart.</a>
|
986
|
986
|
</p>
|
987
|
987
|
|
...
|
...
|
@@ -1517,7 +1517,7 @@ requires an HTTP or SOCKS Proxy</a></h3>
|
1517
|
1517
|
You can set Proxy IP address, port, and authentication information in
|
1518
|
1518
|
Tor Browser's Network Settings. If you're using Tor another way, check
|
1519
|
1519
|
out the HTTPProxy and HTTPSProxy config options in the <a
|
1520
|
|
-href="https://www.torproject.org/docs/tor-manual.html.en">man page</a>,
|
|
1520
|
+href="<page docs/tor-manual>">man page</a>,
|
1521
|
1521
|
and modify your torrc file accordingly. You will need an HTTP proxy for
|
1522
|
1522
|
doing GET requests to fetch the Tor directory, and you will need an
|
1523
|
1523
|
HTTPS proxy for doing CONNECT requests to get to Tor relays. (It's fine
|
...
|
...
|
@@ -1642,7 +1642,7 @@ href="http://www.crowdstrike.com/community-tools/index.html#tool-79">proposed
|
1642
|
1642
|
|
1643
|
1643
|
<p>You can still verify your Tor Browser download by downloading the
|
1644
|
1644
|
signature file (.asc) along with your package and <a
|
1645
|
|
- href="https://www.torproject.org/docs/verifying-signatures.html.en">
|
|
1645
|
+ href="<page docs/verifying-signatures>">
|
1646
|
1646
|
checking the GPG signature</a> as before. We now have an additional
|
1647
|
1647
|
verification method that allows you to verify the build as well as
|
1648
|
1648
|
the download.</p>
|
...
|
...
|
@@ -1658,7 +1658,7 @@ href="http://www.crowdstrike.com/community-tools/index.html#tool-79">proposed
|
1658
|
1658
|
<pre>gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC</pre>
|
1659
|
1659
|
(This will bring you developer Mike Perry's public key. Other
|
1660
|
1660
|
developers' key IDs can be found on
|
1661
|
|
- <a href="https://www.torproject.org/docs/signing-keys.html.en">this
|
|
1661
|
+ <a href="<page docs/signing-keys>">this
|
1662
|
1662
|
page</a>.)</li>
|
1663
|
1663
|
<li>Verify the sha256sums.txt file by executing this command:
|
1664
|
1664
|
<pre>gpg --verify <NAME OF THE SIGNATURE FILE>.asc sha256sums.txt</pre></li>
|
...
|
...
|
@@ -1794,7 +1794,7 @@ Bridge flashproxy 0.0.1.0:1
|
1794
|
1794
|
</pre>
|
1795
|
1795
|
<p>
|
1796
|
1796
|
If you've installed <a
|
1797
|
|
- href="https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en#instructions">Obfsproxy</a>,
|
|
1797
|
+ href="<page projects/obfsproxy-debian-instructions>#instructions">Obfsproxy</a>,
|
1798
|
1798
|
you'll need to add one more line:
|
1799
|
1799
|
</p>
|
1800
|
1800
|
<pre>
|
...
|
...
|
@@ -2845,7 +2845,7 @@ users
|
2845
|
2845
|
for most flaggings are documented on the <a
|
2846
|
2846
|
href="https://trac.torproject.org/projects/tor/wiki/doc/badRelays">bad
|
2847
|
2847
|
relays wiki</a>. Please <a
|
2848
|
|
- href="https://torproject.org/about/contact.html.en">contact us</a> so
|
|
2848
|
+ href="<page about/contact>">contact us</a> so
|
2849
|
2849
|
we can sort out the issue.</p>
|
2850
|
2850
|
|
2851
|
2851
|
<hr>
|
...
|
...
|
@@ -3400,7 +3400,7 @@ most users, we think it's a smart move.
|
3400
|
3400
|
<p><a href="https://exonerator.torproject.org/">
|
3401
|
3401
|
Exonerator</a> is a web service that can check if an IP address was a
|
3402
|
3402
|
relay at a given time. We can also <a
|
3403
|
|
- href="https://torproject.org/about/contact.html.en">provide a signed
|
|
3403
|
+ href="<page about/contact>">provide a signed
|
3404
|
3404
|
letter</a> if needed.</p>
|
3405
|
3405
|
|
3406
|
3406
|
<hr>
|
...
|
...
|
@@ -3510,7 +3510,7 @@ diversity,
|
3510
|
3510
|
hidden service?</a></h3>
|
3511
|
3511
|
|
3512
|
3512
|
<p>
|
3513
|
|
- See the <a href="https://www.torproject.org/docs/tor-hidden-service.html.en">
|
|
3513
|
+ See the <a href="<page docs/tor-hidden-service>">
|
3514
|
3514
|
official hidden service configuration instructions</a>.
|
3515
|
3515
|
</p>
|
3516
|
3516
|
|
...
|
...
|
@@ -3838,7 +3838,7 @@ diversity,
|
3838
|
3838
|
</p>
|
3839
|
3839
|
<p>
|
3840
|
3840
|
That's where the <a
|
3841
|
|
- href="https://torproject.org/projects/torbrowser.html.en">Tor Browser
|
|
3841
|
+ href="<page projects/torbrowser>">Tor Browser
|
3842
|
3842
|
Bundle</a> comes in. We produce a web browser that is preconfigured to
|
3843
|
3843
|
help you control the risks to your privacy and anonymity while browsing
|
3844
|
3844
|
the Internet. Not only are the above technologies disabled to prevent
|
...
|
...
|
@@ -4123,7 +4123,7 @@ interactive streams while still allowing good throughput for bulk streams.
|
4123
|
4123
|
But since we want to do a lot of work on quality-of-service and better
|
4124
|
4124
|
queuing approaches first, you shouldn't expect this change anytime soon
|
4125
|
4125
|
(if ever). However if you are keen, there are a couple of
|
4126
|
|
-<a href="https://www.torproject.org/getinvolved/volunteer.html.en#Research">
|
|
4126
|
+<a href="<page getinvolved/volunteer>#Research">
|
4127
|
4127
|
research ideas</a> that may involve changing the cell size.
|
4128
|
4128
|
</p>
|
4129
|
4129
|
|
...
|
...
|
@@ -4158,7 +4158,7 @@ government firewalls to access the Tor network.
|
4158
|
4158
|
</p>
|
4159
|
4159
|
<p>
|
4160
|
4160
|
We've made quite a bit of progress on this problem lately. You can read more
|
4161
|
|
-details on the <a href="https://www.torproject.org/docs/pluggable-transports.html.en">
|
|
4161
|
+details on the <a href="<page docs/pluggable-transports>">
|
4162
|
4162
|
pluggable transports page</a>. You may also be interested in
|
4163
|
4163
|
<a href="https://www.youtube.com/watch?v=GwMr8Xl7JMQ">Roger and Jake's talk at
|
4164
|
4164
|
28C3</a>, or <a href="https://www.youtube.com/watch?v=JZg1nqs793M">Runa's
|
...
|
...
|
@@ -4224,10 +4224,10 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
|
4224
|
4224
|
minutes, and often more frequently than that. This makes it extremely
|
4225
|
4225
|
dificult for websites to create any sort of persistent profile of Tor
|
4226
|
4226
|
users (assuming you did not <a
|
4227
|
|
- href="https://torproject.org/download/download.html.en#warning">identify
|
|
4227
|
+ href="<page download/download>#warning">identify
|
4228
|
4228
|
yourself in other ways</a>). No one Tor relay can know enough
|
4229
|
4229
|
information to compromise any Tor user because of Tor's <a
|
4230
|
|
- href="https://www.torproject.org/about/overview.html.en#thesolution">encrypted
|
|
4230
|
+ href="<page about/overview>#thesolution">encrypted
|
4231
|
4231
|
three-hop circuit</a> design.
|
4232
|
4232
|
</p>
|
4233
|
4233
|
|