Browse code

turn download warnings into incude file

traumschule authored on16/08/2018 19:03:00
Showing3 changed files
... ...
@@ -218,111 +218,7 @@
218 218
 	</div> <!-- END download-donate -->
219 219
 	<div id="maincol-left">
220 220
 <!-- BEGIN WARNING -->
221
-<div class="warning">
222
-<a name="warning"></a>
223
-<a name="Warning"></a>
224
-<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
225
-<p>You need to change some of your habits, as some things won't work
226
-exactly as you are used to.</p>
227
-
228
-<ol>
229
-
230
-<li><b>Use Tor Browser</b>
231
-<p>Tor does not protect all of your computer's Internet traffic when you
232
-run it. Tor only protects your applications that are properly configured
233
-to send their Internet traffic through Tor. To avoid problems with
234
-Tor configuration, we strongly recommend you use the <a href="<page
235
-projects/torbrowser>">Tor Browser</a>. It is pre-configured to
236
-protect your privacy and anonymity on the web as long as you're browsing
237
-with Tor Browser itself. Almost any other web browser configuration
238
-is likely to be unsafe to use with Tor.</p>
239
-</li>
240
-<li><b>Don't torrent over Tor</b>
241
-<p>
242
-Torrent file-sharing applications have been observed to ignore proxy
243
-settings and make direct connections even when they are told to use Tor.
244
-Even if your torrent application connects only through Tor, you will
245
-often send out your real IP address in the tracker GET request,
246
-because that's how torrents work. Not only do you <a
247
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
248
-deanonymize your torrent traffic and your other simultaneous Tor web
249
-traffic</a> this way, you also slow down the entire Tor network for everyone else.
250
-</p>
251
-</li>
252
-<li><b>Don't enable or install browser plugins</b>
253
-<p>Tor Browser will block browser plugins such as Flash, RealPlayer,
254
-Quicktime, and others: they can be manipulated into revealing your IP
255
-address.  Similarly, we do not recommend installing additional addons or
256
-plugins into Tor Browser, as these may bypass Tor or otherwise harm
257
-your anonymity and privacy.</p>
258
-</li>
259
-
260
-<li><b>Use HTTPS versions of websites</b>
261
-<p>Tor will encrypt your traffic <a
262
-href="<page about/overview>#thesolution">to
263
-and within the Tor network</a>, but the encryption of your traffic to
264
-the final destination website depends upon on that website. To help
265
-ensure private encryption to websites, Tor Browser includes
266
-<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a>
267
-to force the use of HTTPS encryption with major websites that
268
-support it. However, you should still watch the browser URL bar to
269
-ensure that websites you provide sensitive information to display a <a
270
-href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue
271
-or green URL bar button</a>, include <b>https://</b> in the URL, and
272
-display the proper expected name for the website.
273
-Also see EFF's interactive page
274
-explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor
275
-and HTTPS relate</a>.
276
-</p>
277
-</li>
278
-
279
-<li><b>Don't open documents downloaded through Tor while online</b>
280
-<p>Tor Browser will warn you before automatically opening
281
-documents that are handled by external applications. <b>DO NOT
282
-IGNORE THIS WARNING</b>.  You should be very careful when downloading
283
-documents via Tor (especially DOC and PDF files, unless you use the PDF
284
-viewer that's built into Tor Browser) as these documents
285
-can contain Internet resources that will be downloaded outside of
286
-Tor by the application that opens them. This will reveal your non-Tor
287
-IP address. If you must work with DOC and/or PDF files, we strongly
288
-recommend either using a disconnected computer, downloading the free <a
289
-href="https://www.virtualbox.org/">VirtualBox</a> and using it with a <a
290
-href="http://virtualboxes.org/">virtual machine image</a> with networking
291
-disabled, or using <a href="https://tails.boum.org/">Tails</a>.
292
-Under no circumstances is it safe to use <a
293
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
294
-and Tor</a> together, however.</p>
295
-</li>
296
-
297
-<li><b>Use bridges and/or find company</b>
298
-<p>Tor tries to prevent attackers from learning what destination websites
299
-you connect to. However, by default, it does not prevent somebody
300
-watching your Internet traffic from learning that you're using Tor. If
301
-this matters to you, you can reduce this risk by configuring Tor to use a
302
-<a href="<page docs/bridges>">Tor bridge relay</a> rather than connecting
303
-directly to the public Tor network.  Ultimately the best protection is
304
-a social approach: the more Tor users there are near you and the more
305
-<a href="<page about/torusers>">diverse</a> their interests, the less
306
-dangerous it will be that you are one of them. Convince other people to
307
-use Tor, too!</p>
308
-</li>
309
-</ol>
310
-<br>
311
-<p>Be smart and learn more. Understand what Tor does and does not offer.
312
-This list of pitfalls isn't complete, and we need your help <a href="<page
313
-getinvolved/volunteer>#Documentation">identifying and documenting all
314
-the issues</a>.</p><br />
315
-<h2><a class="anchor" href="#mirror">Where else can I get Tor?</a></h2>
316
-<p>In some countries the Tor Project website is blocked or censored and
317
-it is not possible to download Tor directly. The Tor Project hosts a
318
-Tor Browser <a
319
-href="https://github.com/TheTorProject/gettorbrowser">mirror on Github</a>.</p><br />
320
-<p>Using the <a
321
-href="https://www.torproject.org/projects/gettor">GetTor</a> service is
322
-another way to download Tor Browser when the Project website and mirrors
323
-are blocked.</p>
324
-
325
-</div>
221
+#include <warning.wmi>
326 222
 <!-- END WARNING -->
327 223
 </div>
328 224
 <!-- END MAINCOL -->
... ...
@@ -232,132 +232,7 @@ custom configurations. All an apt-get or yum install away.</p>
232 232
 <!-- END DOWNLOADS -->
233 233
 <br>
234 234
 <!-- BEGIN WARNING -->
235
-<div class="warning">
236
-<a name="warning"></a>
237
-<a name="Warning"></a>
238
-<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
239
-	<p>You need to change some of your habits, as some things won't work exactly as
240
-you are used to.</p>
241
-
242
-<ol>
243
-<li><b>Use Tor Browser</b>
244
-
245
-<p>
246
-
247
-Tor does not protect all of your computer's Internet traffic when you
248
-run it. Tor only protects your applications that are properly configured to
249
-send their Internet traffic through Tor. To avoid problems with Tor
250
-configuration, we strongly recommend you use the
251
-<a href="<page projects/torbrowser>">Tor Browser</a>. It is pre-configured to protect
252
-your privacy and anonymity on the web as long as you're browsing with Tor
253
-Browser itself. Almost any other web browser configuration is likely to be
254
-unsafe to use with Tor.
255
-
256
-</p>
257
-
258
-</li>
259
-
260
-<li><b>Don't torrent over Tor</b>
261
-<p>
262
-Torrent file-sharing applications have been observed to ignore proxy 
263
-settings and make direct connections even when they are told to use Tor. 
264
-Even if your torrent application connects only through Tor, you will 
265
-often send out your real IP address in the tracker GET request, 
266
-because that's how torrents work. Not only do you <a 
267
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
268
-deanonymize your torrent traffic and your other simultaneous Tor web 
269
-traffic</a> this way, you also slow down the entire Tor network for everyone else. 
270
-</p>
271
-</li>
272
-
273
-<li><b>Don't enable or install browser plugins</b>
274
-
275
-<p>
276
-
277
-Tor Browser will block browser plugins such as Flash, RealPlayer,
278
-Quicktime, and others: they can be manipulated into revealing your IP address.
279
-Similarly, we do not recommend installing additional addons or plugins into
280
-Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
281
-privacy.
282
-
283
-</p>
284
-
285
-</li>
286
-
287
-<li><b>Use HTTPS versions of websites</b>
288
-
289
-<p>
290
-
291
-Tor will encrypt your traffic
292
-<a href="<page about/overview>#thesolution">to and
293
-within the Tor network</a>, but the encryption of your traffic to the final
294
-destination website depends upon on that website. To help ensure private
295
-encryption to websites, Tor Browser includes <a
296
-href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
297
-use of HTTPS encryption with major websites that support it. However, you
298
-should still watch the browser URL bar to ensure that websites you provide
299
-sensitive information to display a
300
-<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or
301
-green URL bar button</a>, include <b>https://</b> in the URL, and display the
302
-proper expected name for the website. Also see EFF's interactive page
303
-explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor
304
-and HTTPS relate</a>.
305
-
306
-</p>
307
-
308
-</li>
309
-
310
-<li><b>Don't open documents downloaded through Tor while online</b>
311
-
312
-<p>
313
-
314
-Tor Browser will warn you before automatically opening documents that are
315
-handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
316
-should be very careful when downloading documents via Tor (especially DOC and
317
-PDF files, unless you use the PDF viewer that's built into Tor Browser) as
318
-these documents can contain Internet resources that will be downloaded outside
319
-of Tor by the application that opens them. This will reveal your non-Tor IP
320
-address. If you must work with DOC and/or PDF files, we strongly recommend
321
-either using a disconnected computer,
322
-downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
323
-using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
324
-with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>.
325
-Under no circumstances is it safe to use
326
-<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
327
-and Tor</a> together, however.
328
-
329
-</p>
330
-
331
-</li>
332
-
333
-<li><b>Use bridges and/or find company</b>
334
-
335
-<p>
336
-
337
-Tor tries to prevent attackers from learning what destination websites you
338
-connect to. However, by default, it does not prevent somebody watching your Internet
339
-traffic from learning that you're using Tor. If this matters to you, you can
340
-reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor
341
-bridge relay</a> rather than connecting directly to the public Tor network.
342
-Ultimately the best protection is a social approach: the more Tor
343
-users there are near you and the more
344
-<a href="<page about/torusers>">diverse</a> their interests, the less
345
-dangerous it will be that you are one of them. Convince other people to use
346
-Tor, too!
347
-
348
-</p>
349
-
350
-</li>
351
-
352
-</ol>
353
-<br>
354
-<p>
355
-Be smart and learn more. Understand what Tor does and does not offer.
356
-This list of pitfalls isn't complete, and we need your
357
-help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting
358
-all the issues</a>.
359
-</p>
360
-</div>
235
+#include <warning.wmi>
361 236
 <!-- END WARNING -->
362 237
 </div>
363 238
 <!-- END MAINCOL -->
364 239
new file mode 100644
... ...
@@ -0,0 +1,132 @@
1
+#! /usr/bin/wml
2
+<: use strict; :>
3
+<: use warnings; :>
4
+
5
+#<!-- included by the download pages -->
6
+
7
+<div class="warning">
8
+<a name="warning"></a>
9
+<a name="Warning"></a>
10
+<h2><a class="anchor" href="#warning">Want Tor to really work?</a></h2>
11
+	<p>You need to change some of your habits, as some things won't work exactly as
12
+you are used to.</p>
13
+
14
+<ol>
15
+<li><b>Use Tor Browser</b>
16
+
17
+<p>
18
+
19
+Tor does not protect all of your computer's Internet traffic when you
20
+run it. Tor only protects your applications that are properly configured to
21
+send their Internet traffic through Tor. To avoid problems with Tor
22
+configuration, we strongly recommend you use the
23
+<a href="<page projects/torbrowser>">Tor Browser</a>. It is pre-configured to protect
24
+your privacy and anonymity on the web as long as you're browsing with Tor
25
+Browser itself. Almost any other web browser configuration is likely to be
26
+unsafe to use with Tor.
27
+
28
+</p>
29
+
30
+</li>
31
+
32
+<li><b>Don't torrent over Tor</b>
33
+<p>
34
+Torrent file-sharing applications have been observed to ignore proxy 
35
+settings and make direct connections even when they are told to use Tor. 
36
+Even if your torrent application connects only through Tor, you will 
37
+often send out your real IP address in the tracker GET request, 
38
+because that's how torrents work. Not only do you <a 
39
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
40
+deanonymize your torrent traffic and your other simultaneous Tor web 
41
+traffic</a> this way, you also slow down the entire Tor network for everyone else. 
42
+</p>
43
+</li>
44
+
45
+<li><b>Don't enable or install browser plugins</b>
46
+
47
+<p>
48
+
49
+Tor Browser will block browser plugins such as Flash, RealPlayer,
50
+Quicktime, and others: they can be manipulated into revealing your IP address.
51
+Similarly, we do not recommend installing additional addons or plugins into
52
+Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
53
+privacy.
54
+
55
+</p>
56
+
57
+</li>
58
+
59
+<li><b>Use HTTPS versions of websites</b>
60
+
61
+<p>
62
+
63
+Tor will encrypt your traffic
64
+<a href="<page about/overview>#thesolution">to and
65
+within the Tor network</a>, but the encryption of your traffic to the final
66
+destination website depends upon on that website. To help ensure private
67
+encryption to websites, Tor Browser includes <a
68
+href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
69
+use of HTTPS encryption with major websites that support it. However, you
70
+should still watch the browser URL bar to ensure that websites you provide
71
+sensitive information to display a
72
+<a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or
73
+green URL bar button</a>, include <b>https://</b> in the URL, and display the
74
+proper expected name for the website. Also see EFF's interactive page
75
+explaining <a href="https://www.eff.org/pages/tor-and-https">how Tor
76
+and HTTPS relate</a>.
77
+
78
+</p>
79
+
80
+</li>
81
+
82
+<li><b>Don't open documents downloaded through Tor while online</b>
83
+
84
+<p>
85
+
86
+Tor Browser will warn you before automatically opening documents that are
87
+handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
88
+should be very careful when downloading documents via Tor (especially DOC and
89
+PDF files, unless you use the PDF viewer that's built into Tor Browser) as
90
+these documents can contain Internet resources that will be downloaded outside
91
+of Tor by the application that opens them. This will reveal your non-Tor IP
92
+address. If you must work with DOC and/or PDF files, we strongly recommend
93
+either using a disconnected computer,
94
+downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
95
+using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
96
+with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>.
97
+Under no circumstances is it safe to use
98
+<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
99
+and Tor</a> together, however.
100
+
101
+</p>
102
+
103
+</li>
104
+
105
+<li><b>Use bridges and/or find company</b>
106
+
107
+<p>
108
+
109
+Tor tries to prevent attackers from learning what destination websites you
110
+connect to. However, by default, it does not prevent somebody watching your Internet
111
+traffic from learning that you're using Tor. If this matters to you, you can
112
+reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor
113
+bridge relay</a> rather than connecting directly to the public Tor network.
114
+Ultimately the best protection is a social approach: the more Tor
115
+users there are near you and the more
116
+<a href="<page about/torusers>">diverse</a> their interests, the less
117
+dangerous it will be that you are one of them. Convince other people to use
118
+Tor, too!
119
+
120
+</p>
121
+
122
+</li>
123
+
124
+</ol>
125
+<br>
126
+<p>
127
+Be smart and learn more. Understand what Tor does and does not offer.
128
+This list of pitfalls isn't complete, and we need your
129
+help <a href="<page getinvolved/volunteer>#Documentation">identifying and documenting
130
+all the issues</a>.
131
+</p>
132
+</div>