moved warnings to top of the fold, added link to lynx
Shava Nerad

Shava Nerad commited on 2007-03-08 13:26:41
Zeige 1 geänderte Dateien mit 63 Einfügungen und 58 Löschungen.

... ...
@@ -16,6 +16,68 @@ under the <a href="<svnsandbox>LICENSE">3-clause BSD license</a>.
16 16
 href="<page donate>">making a donation to the Tor project</a>.
17 17
 </p>
18 18
 
19
+<a id="Warning"></a>
20
+<h4><a class="anchor" href="#Warning">Warning:  Want Tor to really work?</a></h4>
21
+
22
+# Translators: you might not want to translate this section quite
23
+# yet, since it's likely to change a lot before we like it. -RD
24
+
25
+<p>...then please don't just install it and go on.  You need to change some of your habits, and reconfigure your software!</p>
26
+
27
+<p>Tor by itself is <b>NOT</b> all you need to maintain your anonymity.
28
+There are several major pitfalls to watch out for.
29
+</p>
30
+
31
+<p>First, Tor only protects Internet applications that are configured to
32
+send their traffic through Tor &mdash; it doesn't magically anonymize
33
+all your traffic just because you install it.  We recommend you
34
+use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a
35
+href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension.
36
+<!-- , and follow <a href="comingsoon">other recommendations for other
37
+supported applications</a>. -->
38
+</p>
39
+
40
+<p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer,
41
+Quicktime, Adobe's PDF plugin, and others can be manipulated
42
+into revealing your IP address. We recommend the <a
43
+href="https://addons.mozilla.org/firefox/1237/">QuickJava</a> and <a
44
+href="https://addons.mozilla.org/firefox/433/">FlashBlock</a> extensions,
45
+and you should probably uninstall other <a href="about:plugins">plugins</a>
46
+in general.  YOu may want to have a browser configured with plug-ins, and another browser stripped down for use with Tor, to be able to use plug-ins when anonymity is not important, and use no plug-ins when you use Tor.  You may even want to use a text browser, such as <a href="http://lynx.browser.org/">lynx</a> when you are using Tor.
47
+<!-- You may also find
48
+<a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a
49
+href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. -->
50
+</p>
51
+
52
+<p>Third, beware of cookies: if you ever browse without Tor and Privoxy
53
+and a site gives you a cookie, that cookie could identify you even when
54
+you start using Tor again. You should clear your cookies frequently. <a
55
+href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help
56
+protect any cookies you do not want to lose.
57
+</p>
58
+
59
+<p>Fourth, Tor anonymizes the origin of your traffic,
60
+and it encrypts everything inside the Tor network, but <a
61
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it
62
+can't encrypt your traffic between the Tor network and its final
63
+destination.</a>
64
+If you are communicating sensitive information, you should use as much
65
+care as you would on the normal scary Internet &mdash; use SSL or other
66
+end-to-end encryption and authentication. Also, while Tor blocks attackers
67
+on your local network from discovering or influencing your destination,
68
+it opens new risks: malicious or misconfigured Tor exit nodes can send
69
+you the wrong page, or even send you embedded Java applets disguised as
70
+domains you trust.
71
+</p>
72
+
73
+<p>Last, be smart and learn more. Understand what Tor offers and what
74
+it doesn't offer. This list of pitfalls isn't complete, and we need your
75
+help <a href="<page volunteer>#Documentation">identifying and documenting
76
+all the issues</a>.
77
+</p>
78
+
79
+
80
+
19 81
 <p>The latest stable release is <b><version-stable></b>, and the
20 82
 latest development release is <b><version-alpha></b>.</p>
21 83
 
... ...
@@ -107,64 +169,7 @@ href="<package-oldosx-bundle-stable-sig>">sig</a>),
107 169
 
108 170
 <br />
109 171
 
110
-<a id="Warning"></a>
111
-<h2><a class="anchor" href="#Warning">Warning</a></h2>
112
-
113
-# Translators: you might not want to translate this section quite
114
-# yet, since it's likely to change a lot before we like it. -RD
115
-
116
-<p>Tor by itself is <b>NOT</b> all you need to maintain your anonymity.
117
-There are several major pitfalls to watch out for.
118
-</p>
119
-
120
-<p>First, Tor only protects applications that are configured to
121
-send their traffic through Tor &mdash; it doesn't magically anonymize
122
-all your traffic just because you install it.  We recommend you
123
-use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a
124
-href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension.
125
-<!-- , and follow <a href="comingsoon">other recommendations for other
126
-supported applications</a>. -->
127
-</p>
128
-
129
-<p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer,
130
-Quicktime, Adobe's PDF plugin, and others can be manipulated
131
-into revealing your IP address. We recommend the <a
132
-href="https://addons.mozilla.org/firefox/1237/">QuickJava</a> and <a
133
-href="https://addons.mozilla.org/firefox/433/">FlashBlock</a> extensions,
134
-and you should probably uninstall other <a href="about:plugins">plugins</a>
135
-in general.
136
-<!-- You may also find
137
-<a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a
138
-href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. -->
139
-</p>
140
-
141
-<p>Third, beware of cookies: if you ever browse without Tor and Privoxy
142
-and a site gives you a cookie, that cookie could identify you even when
143
-you start using Tor again. You should clear your cookies frequently. <a
144
-href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help
145
-protect any cookies you do not want to lose.
146
-</p>
147
-
148
-<p>Fourth, Tor anonymizes the origin of your traffic,
149
-and it encrypts everything inside the Tor network, but <a
150
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it
151
-can't encrypt your traffic between the Tor network and its final
152
-destination.</a>
153
-If you are communicating sensitive information, you should use as much
154
-care as you would on the normal scary Internet &mdash; use SSL or other
155
-end-to-end encryption and authentication. Also, while Tor blocks attackers
156
-on your local network from discovering or influencing your destination,
157
-it opens new risks: malicious or misconfigured Tor exit nodes can send
158
-you the wrong page, or even send you embedded Java applets disguised as
159
-domains you trust.
160
-</p>
161
-
162
-<p>Last, be smart and learn more. Understand what Tor offers and what
163
-it doesn't offer. This list of pitfalls isn't complete, and we need your
164
-help <a href="<page volunteer>#Documentation">identifying and documenting
165
-all the issues</a>.
166
-</p>
167
-
172
+ds
168 173
 <h2>More Information</h2>
169 174
 
170 175
 <ul>
171 176