make the faq work better on website mirrors too
Roger Dingledine

Roger Dingledine commited on 2014-03-24 08:00:12
Zeige 1 geänderte Dateien mit 13 Einfügungen und 13 Löschungen.

... ...
@@ -981,7 +981,7 @@ executive
981 981
     it sends. The Tor Browser Bundle tries to keep application-level data,
982 982
     like the user-agent string, uniform for all users. The Tor Browser can't
983 983
     do anything about text that you type into forms, though. <a
984
-    href="https://www.torproject.org/download/download-easy.html.en#warning">Be
984
+    href="<page download/download-easy>#warning">Be
985 985
     careful and be smart.</a>
986 986
     </p>
987 987
 
... ...
@@ -1517,7 +1517,7 @@ requires an HTTP or SOCKS Proxy</a></h3>
1517 1517
 You can set Proxy IP address, port, and authentication information in
1518 1518
 Tor Browser's Network Settings. If you're using Tor another way, check
1519 1519
 out the HTTPProxy and HTTPSProxy config options in the <a
1520
-href="https://www.torproject.org/docs/tor-manual.html.en">man page</a>,
1520
+href="<page docs/tor-manual>">man page</a>,
1521 1521
 and modify your torrc file accordingly. You will need an HTTP proxy for
1522 1522
 doing GET requests to fetch the Tor directory, and you will need an
1523 1523
 HTTPS proxy for doing CONNECT requests to get to Tor relays. (It's fine
... ...
@@ -1642,7 +1642,7 @@ href="http://www.crowdstrike.com/community-tools/index.html#tool-79">proposed
1642 1642
 
1643 1643
     <p>You can still verify your Tor Browser download by downloading the
1644 1644
     signature file (.asc) along with your package and <a
1645
-    href="https://www.torproject.org/docs/verifying-signatures.html.en">
1645
+    href="<page docs/verifying-signatures>">
1646 1646
     checking the GPG signature</a> as before. We now have an additional
1647 1647
     verification method that allows you to verify the build as well as
1648 1648
     the download.</p>
... ...
@@ -1658,7 +1658,7 @@ href="http://www.crowdstrike.com/community-tools/index.html#tool-79">proposed
1658 1658
       <pre>gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC</pre>
1659 1659
       (This will bring you developer Mike Perry's public key. Other
1660 1660
       developers' key IDs can be found on
1661
-      <a href="https://www.torproject.org/docs/signing-keys.html.en">this
1661
+      <a href="<page docs/signing-keys>">this
1662 1662
       page</a>.)</li>
1663 1663
       <li>Verify the sha256sums.txt file by executing this command:
1664 1664
       <pre>gpg --verify &lt;NAME OF THE SIGNATURE FILE&gt;.asc sha256sums.txt</pre></li>
... ...
@@ -1794,7 +1794,7 @@ Bridge flashproxy 0.0.1.0:1
1794 1794
     </pre>
1795 1795
     <p>
1796 1796
     If you've installed <a
1797
-    href="https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en#instructions">Obfsproxy</a>,
1797
+    href="<page projects/obfsproxy-debian-instructions>#instructions">Obfsproxy</a>,
1798 1798
     you'll need to add one more line:
1799 1799
     </p>
1800 1800
     <pre>
... ...
@@ -2845,7 +2845,7 @@ users
2845 2845
     for most flaggings are documented on the <a
2846 2846
     href="https://trac.torproject.org/projects/tor/wiki/doc/badRelays">bad
2847 2847
     relays wiki</a>. Please <a
2848
-    href="https://torproject.org/about/contact.html.en">contact us</a> so
2848
+    href="<page about/contact>">contact us</a> so
2849 2849
     we can sort out the issue.</p>
2850 2850
 
2851 2851
     <hr>
... ...
@@ -3400,7 +3400,7 @@ most users, we think it's a smart move.
3400 3400
     <p><a href="https://exonerator.torproject.org/">
3401 3401
     Exonerator</a> is a web service that can check if an IP address was a
3402 3402
     relay at a given time. We can also <a
3403
-    href="https://torproject.org/about/contact.html.en">provide a signed
3403
+    href="<page about/contact>">provide a signed
3404 3404
     letter</a> if needed.</p>
3405 3405
 
3406 3406
     <hr>
... ...
@@ -3510,7 +3510,7 @@ diversity,
3510 3510
     hidden service?</a></h3>
3511 3511
  
3512 3512
     <p>
3513
-    See the <a href="https://www.torproject.org/docs/tor-hidden-service.html.en">
3513
+    See the <a href="<page docs/tor-hidden-service>">
3514 3514
     official hidden service configuration instructions</a>.
3515 3515
     </p>
3516 3516
 
... ...
@@ -3838,7 +3838,7 @@ diversity,
3838 3838
     </p>
3839 3839
     <p>
3840 3840
     That's where the <a
3841
-    href="https://torproject.org/projects/torbrowser.html.en">Tor Browser
3841
+    href="<page projects/torbrowser>">Tor Browser
3842 3842
     Bundle</a> comes in. We produce a web browser that is preconfigured to
3843 3843
     help you control the risks to your privacy and anonymity while browsing
3844 3844
     the Internet. Not only are the above technologies disabled to prevent
... ...
@@ -4123,7 +4123,7 @@ interactive streams while still allowing good throughput for bulk streams.
4123 4123
 But since we want to do a lot of work on quality-of-service and better
4124 4124
 queuing approaches first, you shouldn't expect this change anytime soon
4125 4125
 (if ever). However if you are keen, there are a couple of
4126
-<a href="https://www.torproject.org/getinvolved/volunteer.html.en#Research">
4126
+<a href="<page getinvolved/volunteer>#Research">
4127 4127
 research ideas</a> that may involve changing the cell size.
4128 4128
     </p>
4129 4129
 
... ...
@@ -4158,7 +4158,7 @@ government firewalls to access the Tor network.
4158 4158
     </p>
4159 4159
     <p>
4160 4160
 We've made quite a bit of progress on this problem lately. You can read more
4161
-details on the <a href="https://www.torproject.org/docs/pluggable-transports.html.en">
4161
+details on the <a href="<page docs/pluggable-transports>">
4162 4162
 pluggable transports page</a>. You may also be interested in
4163 4163
 <a href="https://www.youtube.com/watch?v=GwMr8Xl7JMQ">Roger and Jake's talk at
4164 4164
 28C3</a>, or <a href="https://www.youtube.com/watch?v=JZg1nqs793M">Runa's
... ...
@@ -4224,10 +4224,10 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
4224 4224
     minutes, and often more frequently than that. This makes it extremely
4225 4225
     dificult for websites to create any sort of persistent profile of Tor
4226 4226
     users (assuming you did not <a
4227
-    href="https://torproject.org/download/download.html.en#warning">identify
4227
+    href="<page download/download>#warning">identify
4228 4228
     yourself in other ways</a>). No one Tor relay can know enough
4229 4229
     information to compromise any Tor user because of Tor's <a
4230
-    href="https://www.torproject.org/about/overview.html.en#thesolution">encrypted
4230
+    href="<page about/overview>#thesolution">encrypted
4231 4231
     three-hop circuit</a> design.
4232 4232
     </p>
4233 4233
 
4234 4234