Shava Nerad commited on 2007-03-08 13:26:41
Zeige 1 geänderte Dateien mit 63 Einfügungen und 58 Löschungen.
... | ... |
@@ -16,6 +16,68 @@ under the <a href="<svnsandbox>LICENSE">3-clause BSD license</a>. |
16 | 16 |
href="<page donate>">making a donation to the Tor project</a>. |
17 | 17 |
</p> |
18 | 18 |
|
19 |
+<a id="Warning"></a> |
|
20 |
+<h4><a class="anchor" href="#Warning">Warning: Want Tor to really work?</a></h4> |
|
21 |
+ |
|
22 |
+# Translators: you might not want to translate this section quite |
|
23 |
+# yet, since it's likely to change a lot before we like it. -RD |
|
24 |
+ |
|
25 |
+<p>...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software!</p> |
|
26 |
+ |
|
27 |
+<p>Tor by itself is <b>NOT</b> all you need to maintain your anonymity. |
|
28 |
+There are several major pitfalls to watch out for. |
|
29 |
+</p> |
|
30 |
+ |
|
31 |
+<p>First, Tor only protects Internet applications that are configured to |
|
32 |
+send their traffic through Tor — it doesn't magically anonymize |
|
33 |
+all your traffic just because you install it. We recommend you |
|
34 |
+use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a |
|
35 |
+href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension. |
|
36 |
+<!-- , and follow <a href="comingsoon">other recommendations for other |
|
37 |
+supported applications</a>. --> |
|
38 |
+</p> |
|
39 |
+ |
|
40 |
+<p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer, |
|
41 |
+Quicktime, Adobe's PDF plugin, and others can be manipulated |
|
42 |
+into revealing your IP address. We recommend the <a |
|
43 |
+href="https://addons.mozilla.org/firefox/1237/">QuickJava</a> and <a |
|
44 |
+href="https://addons.mozilla.org/firefox/433/">FlashBlock</a> extensions, |
|
45 |
+and you should probably uninstall other <a href="about:plugins">plugins</a> |
|
46 |
+in general. YOu may want to have a browser configured with plug-ins, and another browser stripped down for use with Tor, to be able to use plug-ins when anonymity is not important, and use no plug-ins when you use Tor. You may even want to use a text browser, such as <a href="http://lynx.browser.org/">lynx</a> when you are using Tor. |
|
47 |
+<!-- You may also find |
|
48 |
+<a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a |
|
49 |
+href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. --> |
|
50 |
+</p> |
|
51 |
+ |
|
52 |
+<p>Third, beware of cookies: if you ever browse without Tor and Privoxy |
|
53 |
+and a site gives you a cookie, that cookie could identify you even when |
|
54 |
+you start using Tor again. You should clear your cookies frequently. <a |
|
55 |
+href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
|
56 |
+protect any cookies you do not want to lose. |
|
57 |
+</p> |
|
58 |
+ |
|
59 |
+<p>Fourth, Tor anonymizes the origin of your traffic, |
|
60 |
+and it encrypts everything inside the Tor network, but <a |
|
61 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it |
|
62 |
+can't encrypt your traffic between the Tor network and its final |
|
63 |
+destination.</a> |
|
64 |
+If you are communicating sensitive information, you should use as much |
|
65 |
+care as you would on the normal scary Internet — use SSL or other |
|
66 |
+end-to-end encryption and authentication. Also, while Tor blocks attackers |
|
67 |
+on your local network from discovering or influencing your destination, |
|
68 |
+it opens new risks: malicious or misconfigured Tor exit nodes can send |
|
69 |
+you the wrong page, or even send you embedded Java applets disguised as |
|
70 |
+domains you trust. |
|
71 |
+</p> |
|
72 |
+ |
|
73 |
+<p>Last, be smart and learn more. Understand what Tor offers and what |
|
74 |
+it doesn't offer. This list of pitfalls isn't complete, and we need your |
|
75 |
+help <a href="<page volunteer>#Documentation">identifying and documenting |
|
76 |
+all the issues</a>. |
|
77 |
+</p> |
|
78 |
+ |
|
79 |
+ |
|
80 |
+ |
|
19 | 81 |
<p>The latest stable release is <b><version-stable></b>, and the |
20 | 82 |
latest development release is <b><version-alpha></b>.</p> |
21 | 83 |
|
... | ... |
@@ -107,64 +169,7 @@ href="<package-oldosx-bundle-stable-sig>">sig</a>), |
107 | 169 |
|
108 | 170 |
<br /> |
109 | 171 |
|
110 |
-<a id="Warning"></a> |
|
111 |
-<h2><a class="anchor" href="#Warning">Warning</a></h2> |
|
112 |
- |
|
113 |
-# Translators: you might not want to translate this section quite |
|
114 |
-# yet, since it's likely to change a lot before we like it. -RD |
|
115 |
- |
|
116 |
-<p>Tor by itself is <b>NOT</b> all you need to maintain your anonymity. |
|
117 |
-There are several major pitfalls to watch out for. |
|
118 |
-</p> |
|
119 |
- |
|
120 |
-<p>First, Tor only protects applications that are configured to |
|
121 |
-send their traffic through Tor — it doesn't magically anonymize |
|
122 |
-all your traffic just because you install it. We recommend you |
|
123 |
-use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a |
|
124 |
-href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension. |
|
125 |
-<!-- , and follow <a href="comingsoon">other recommendations for other |
|
126 |
-supported applications</a>. --> |
|
127 |
-</p> |
|
128 |
- |
|
129 |
-<p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer, |
|
130 |
-Quicktime, Adobe's PDF plugin, and others can be manipulated |
|
131 |
-into revealing your IP address. We recommend the <a |
|
132 |
-href="https://addons.mozilla.org/firefox/1237/">QuickJava</a> and <a |
|
133 |
-href="https://addons.mozilla.org/firefox/433/">FlashBlock</a> extensions, |
|
134 |
-and you should probably uninstall other <a href="about:plugins">plugins</a> |
|
135 |
-in general. |
|
136 |
-<!-- You may also find |
|
137 |
-<a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a |
|
138 |
-href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. --> |
|
139 |
-</p> |
|
140 |
- |
|
141 |
-<p>Third, beware of cookies: if you ever browse without Tor and Privoxy |
|
142 |
-and a site gives you a cookie, that cookie could identify you even when |
|
143 |
-you start using Tor again. You should clear your cookies frequently. <a |
|
144 |
-href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help |
|
145 |
-protect any cookies you do not want to lose. |
|
146 |
-</p> |
|
147 |
- |
|
148 |
-<p>Fourth, Tor anonymizes the origin of your traffic, |
|
149 |
-and it encrypts everything inside the Tor network, but <a |
|
150 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it |
|
151 |
-can't encrypt your traffic between the Tor network and its final |
|
152 |
-destination.</a> |
|
153 |
-If you are communicating sensitive information, you should use as much |
|
154 |
-care as you would on the normal scary Internet — use SSL or other |
|
155 |
-end-to-end encryption and authentication. Also, while Tor blocks attackers |
|
156 |
-on your local network from discovering or influencing your destination, |
|
157 |
-it opens new risks: malicious or misconfigured Tor exit nodes can send |
|
158 |
-you the wrong page, or even send you embedded Java applets disguised as |
|
159 |
-domains you trust. |
|
160 |
-</p> |
|
161 |
- |
|
162 |
-<p>Last, be smart and learn more. Understand what Tor offers and what |
|
163 |
-it doesn't offer. This list of pitfalls isn't complete, and we need your |
|
164 |
-help <a href="<page volunteer>#Documentation">identifying and documenting |
|
165 |
-all the issues</a>. |
|
166 |
-</p> |
|
167 |
- |
|
172 |
+ds |
|
168 | 173 |
<h2>More Information</h2> |
169 | 174 |
|
170 | 175 |
<ul> |
171 | 176 |