Mike Perry commited on 2009-05-16 03:05:29
Zeige 1 geänderte Dateien mit 87 Einfügungen und 34 Löschungen.
... | ... |
@@ -78,6 +78,14 @@ cookies</a>. It is possible to use a LiveCD or VMWare-based solution such as |
78 | 78 |
<a href="http://anonymityanywhere.com/incognito/">Incognito</a> that creates a |
79 | 79 |
secure, transparent proxy to protect you from proxy bypass, however issues |
80 | 80 |
with local IP address discovery and Flash cookies potentially remain. |
81 |
+</p> |
|
82 |
+<p> |
|
83 |
+ |
|
84 |
+If you are not concerned about being tracked by these sites (and others that |
|
85 |
+try to unmask you by pretending to be them), and are unconcerned about your |
|
86 |
+local censors noticing you visit them, you can enable plugins by going into the |
|
87 |
+Torbtuton Preferences->Security Settings->Dynamic Content tab and |
|
88 |
+unchecking "Disable plugins during Tor usage" box. |
|
81 | 89 |
|
82 | 90 |
</p> |
83 | 91 |
|
... | ... |
@@ -89,20 +97,20 @@ annoying. Can't I just use the old version?</a></strong> |
89 | 97 |
|
90 | 98 |
<b>No.</b> Use of the old version, or any other vanilla proxy changer |
91 | 99 |
(including FoxyProxy -- see below) without Torbutton is actively discouraged. |
92 |
-Seriously. Using a vanilla proxy switcher by itself is so insecure that you |
|
93 |
-are not only just wasting your time, you are also actually endangering |
|
94 |
-yourself. Simply do not use Tor and you will have the same (and in some cases, |
|
95 |
-better) security. For more information on the types of attacks you are |
|
96 |
-exposed to with a "homegrown" solution, please see <a |
|
100 |
+Seriously. Using a vanilla proxy switcher by itself is so insecure that you are |
|
101 |
+not only just wasting your time, you are also actually endangering yourself. |
|
102 |
+<b>Simply do not use Tor</b> and you will have the same (and in some cases, |
|
103 |
+better) security. For more information on the types of attacks you are exposed |
|
104 |
+to with a "homegrown" solution, please see <a |
|
97 | 105 |
href="https://www.torproject.org/torbutton/design/#adversary">The Torbutton |
98 |
-Adversary Model</a>, in particular the |
|
99 |
-<a href="https://www.torproject.org/torbutton/design/#attacks">Adversary |
|
106 |
+Adversary Model</a>, in particular the <a |
|
107 |
+href="https://www.torproject.org/torbutton/design/#attacks">Adversary |
|
100 | 108 |
Capabilities - Attacks</a> subsection. If there are any specific Torbutton |
101 | 109 |
behaviors that you do not like, please file a bug on <a |
102 | 110 |
href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">the |
103 |
-bug tracker.</a> Most of Torbutton's security features can also be disabled |
|
104 |
-via its preferences, if you think you have your own protection for those |
|
105 |
-specific cases. |
|
111 |
+bug tracker.</a> Most of Torbutton's security features can also be disabled via |
|
112 |
+its preferences, if you think you have your own protection for those specific |
|
113 |
+cases. |
|
106 | 114 |
|
107 | 115 |
</p> |
108 | 116 |
|
... | ... |
@@ -192,37 +200,15 @@ cooperate with sites to inject images into pages that bypass your filters. |
192 | 200 |
Setting FoxyProxy to only send certain URLs via Non-Tor is much more secure in |
193 | 201 |
this regard, but be very careful with the filters you allow. For example, |
194 | 202 |
something as simple as allowing *google* to go via Non-Tor will still cause you to end up |
195 |
-in all the logs of all websites that use Google Analytics! See <a |
|
196 |
-href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this question</a> on |
|
203 |
+in all the logs of all websites that use Google Analytics! See |
|
204 |
+<a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this question</a> on |
|
197 | 205 |
the FoxyProxy FAQ for more information. |
198 | 206 |
</p></li> |
199 |
- <li>NoScript |
|
200 |
- <p> |
|
201 |
- Torbutton currently mitigates all known anonymity issues with Javascript. |
|
202 |
- While it may be tempting to get better security by disabling Javascript for |
|
203 |
- certain sites, you are far better off with an all-or-nothing approach. |
|
204 |
- NoScript is exceedingly complicated, and has many subtleties that can surprise |
|
205 |
- even advanced users. For example, addons.mozilla.org verifies extension |
|
206 |
- integrity via Javascript over https, but downloads them in the clear. Not |
|
207 |
- adding it to your whitelist effectively |
|
208 |
- means you are pulling down unverified extensions. Worse still, using NoScript |
|
209 |
- can actually disable protections that Torbutton itself provides via |
|
210 |
- Javascript, yet still allow malicious exit nodes to compromise your |
|
211 |
- anonymity via the default whitelist (which they can spoof to inject any script they want). |
|
212 |
-</p></li> |
|
213 | 207 |
</ol> |
214 | 208 |
|
215 | 209 |
<a id="recommendedextensions"></a> |
216 | 210 |
<strong><a class="anchor" href="#recommendedextensions">Which Firefox extensions do you recommend?</a></strong> |
217 | 211 |
<ol> |
218 |
- <li><a href="https://crypto.stanford.edu/forcehttps/">ForceHTTPS</a> |
|
219 |
- <p> |
|
220 |
-Many sites on the Internet are <a |
|
221 |
-href="http://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry">sloppy |
|
222 |
-about their use of HTTPS</a> and secure |
|
223 |
-cookies. This addon can help you ensure that you always use HTTPS for sites |
|
224 |
-that support it, and reduces the chances of your cookies being stolen for |
|
225 |
-sites that do not secure them.</p></li> |
|
226 | 212 |
<li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> |
227 | 213 |
<p> |
228 | 214 |
Mentioned above, this extension allows more fine-grained referrer spoofing |
... | ... |
@@ -236,6 +223,73 @@ identifiers in your cache. This extension applies same origin policy to the |
236 | 223 |
cache, so that elements are retrieved from the cache only if they are fetched |
237 | 224 |
from a document in the same origin domain as the cached element. |
238 | 225 |
</p></li> |
226 |
+ </li> |
|
227 |
+ |
|
228 |
+ <li><a href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better |
|
229 |
+Privacy</a> |
|
230 |
+ <p> |
|
231 |
+ |
|
232 |
+Better Privacy is an excellent extension that protects you from cookies used |
|
233 |
+by Flash applications, which often persist forever and are not clearable via |
|
234 |
+normal Firefox "Private Data" clearing. Flash and all other plugins are |
|
235 |
+disabled by Torbutton by default, but if you are interested in privacy, you |
|
236 |
+may want this extension to allow you to inspect and automatically clear your |
|
237 |
+Flash cookies for your Non-Tor usage. |
|
238 |
+ |
|
239 |
+ </p> |
|
240 |
+ </li> |
|
241 |
+ <li><a href="https://addons.mozilla.org/firefox/addon/1865">AdBlock Plus</a> |
|
242 |
+ <p> |
|
243 |
+ |
|
244 |
+AdBlock Plus is an excellent addon for removing annoying, privacy-invading, |
|
245 |
+and <a |
|
246 |
+href="http://www.wired.com/techbiz/media/news/2007/11/doubleclick">malware-distributing</a> |
|
247 |
+advertisements from the web. It provides |
|
248 |
+<a href="http://adblockplus.org/en/subscriptions">subscriptions</a> that are |
|
249 |
+continually updated to catch the latest efforts of ad networks to circumvent |
|
250 |
+these filters. I recommend the EasyPrivacy+EasyList combination filter |
|
251 |
+subscription in the Miscellaneous section of the subscriptions page. |
|
252 |
+ |
|
253 |
+ </p> |
|
254 |
+ <li><a href="https://addons.mozilla.org/firefox/addon/82">Cookie Culler</a> |
|
255 |
+ <p> |
|
256 |
+ |
|
257 |
+Cookie Culler is a handy extension to give quick access to the cookie manager |
|
258 |
+in Firefox. It also provides the ability to protect certain cookies from |
|
259 |
+deletion, but unfortunately, this behavior does not integrate well with Torbutton. Kory Kirk is working on addressing this for this Google Summer of Code project for 2009. |
|
260 |
+ |
|
261 |
+ </p> |
|
262 |
+ </li> |
|
263 |
+ |
|
264 |
+ <li><a href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> |
|
265 |
+ <p> |
|
266 |
+ Torbutton currently mitigates all known anonymity issues with Javascript. |
|
267 |
+ However, if you are concerned about Javascript exploits against your browser |
|
268 |
+ or against websites you are logged in to, you may want to use NoScript. It |
|
269 |
+ provides the ability to allow Javascript only for particular websites |
|
270 |
+ and also provides mechanisms to force HTTPS urls for sites with |
|
271 |
+<a href="http://fscked.org/category/tags/insecurecookies">insecure |
|
272 |
+ cookies</a>.<br> |
|
273 |
+ |
|
274 |
+ It can be difficult to configure such that the majority sites will work |
|
275 |
+ properly though. In particular, you want to make sure you do not remove the Javascript whitelist for |
|
276 |
+ addons.mozilla.org, as extensions are downloaded via http and verified by |
|
277 |
+ javascript from the https page. |
|
278 |
+ |
|
279 |
+ </p></li> |
|
280 |
+ <li><a href="https://addons.mozilla.org/en-US/firefox/addon/9727/">Request |
|
281 |
+Policy</a> |
|
282 |
+ <p> |
|
283 |
+ |
|
284 |
+Request Policy is similar to NoScript in that it requires that you configure |
|
285 |
+which sites are allowed to load content from other domains. It can be very |
|
286 |
+difficult for novice users to configure properly, but it does provide a good |
|
287 |
+deal of protection against ads, injected content, and cross-site request |
|
288 |
+forgery attacks. |
|
289 |
+ |
|
290 |
+ </p> |
|
291 |
+ </li> |
|
292 |
+ |
|
239 | 293 |
</ol> |
240 | 294 |
|
241 | 295 |
<a id="securityissues"></a> |
242 | 296 |