Roger Dingledine commited on 2008-08-22 01:29:04
Zeige 2 geänderte Dateien mit 3 Einfügungen und 3 Löschungen.
| ... | ... |
@@ -113,7 +113,7 @@ down, you will be cut off from the Tor network. |
| 113 | 113 |
<p> |
| 114 | 114 |
Another way to find public bridge addresses is to send mail to |
| 115 | 115 |
bridges@torproject.org with the line "get bridges" by itself in the |
| 116 |
-body of the mail. You'll need to send this request from a gmail or yahoo |
|
| 116 |
+body of the mail. You'll need to send this request from a gmail |
|
| 117 | 117 |
account, though — otherwise we make it too easy for an attacker |
| 118 | 118 |
to make a lot of email addresses and learn about all the bridges. |
| 119 | 119 |
Almost instantly, you'll receive a reply that includes: |
| ... | ... |
@@ -60,8 +60,8 @@ email can get a copy of Tor. A user only needs to send us a request with |
| 60 | 60 |
To avoid spamming people accidentally, we only answer emails that are sent |
| 61 | 61 |
from email services that support <a href="http://www.dkim.org/">DKIM</a>, |
| 62 | 62 |
which is an email feature that lets us verify that the address in the |
| 63 |
-"From" line is actually the one who sent the mail. Gmail and Yahoo! mail |
|
| 64 |
-are two such mail services that are known to work. If we get an email |
|
| 63 |
+"From" line is actually the one who sent the mail. Gmail is an example of a |
|
| 64 |
+mail service that is known to work. If we get an email |
|
| 65 | 65 |
from a service that doesn't use DKIM, we'll send a short explanation |
| 66 | 66 |
and then ignore the email address for the next day or so. |
| 67 | 67 |
</p> |
| 68 | 68 |