Made loose information about proxychains into an FAQ entry; other additions.
Matt Pagan

Matt Pagan commited on 2013-12-12 00:15:13
Zeige 1 geänderte Dateien mit 58 Einfügungen und 8 Löschungen.

... ...
@@ -77,7 +77,7 @@ allow JavaScript by default in the Tor Browser Bundle?  Isn't that
77 77
 unsafe?</a></li>
78 78
     <li><a href="#TBBOtherBrowser">I want to use Chrome/IE/Opera/etc
79 79
     with Tor.</a></li>
80
-    <li><a href="#TorbuttonOtherBrowser">Will ​Torbutton be available for other browsers?</a></li>
80
+    <li><a href="#TorbuttonOtherBrowser">Will Torbutton be available for other browsers?</a></li>
81 81
     <li><a href="#TBBCloseBrowser">I want to leave Tor Browser Bundle
82 82
     running but close the browser.</a></li>
83 83
 
... ...
@@ -213,6 +213,8 @@ packets,
213 213
 things?</a></li>
214 214
     <li><a href="#RespondISP">How do I respond to my ISP about my exit
215 215
     relay?</a></li>
216
+    <li><a href="#HelpPoliceOrLawyers">I have questions about
217
+   a Tor IP address for a legal case.</a></li>
216 218
     </ul>
217 219
 
218 220
     <p>For other questions not yet on this version of the FAQ, see the
... ...
@@ -539,10 +541,8 @@ or the
539 541
     <a id="Forum"></a>
540 542
     <h3><a class="anchor" href="#Forum">Is there a Tor forum?</a></h3>
541 543
 
542
-    <p>Not yet, but we're working on it. Most forum software is
543
-    a disaster to maintain and keep secure, and at the same time
544
-    too many of the Tor developers are spread too thin to be able
545
-    to contribute enough to a forum.
544
+    <p>We have <a href="https://tor.stackexchange.com/">a StackExchange 
545
+    page</a> that is currently in public beta.
546 546
     </p>
547 547
 
548 548
     <hr>
... ...
@@ -3138,8 +3138,8 @@ government firewalls to access the Tor network.
3138 3138
 We've made quite a bit of progress on this problem lately. You can read more 
3139 3139
 details on the <a href="https://www.torproject.org/docs/pluggable-transports.html.en">
3140 3140
 pluggable transports page</a>. You may also be interested in 
3141
-<a href="https://www.youtube.com/watch?v=GwMr8Xl7JMQ">Roger and Jake's ​talk at 
3142
-28C3</a>, or <a href="https://www.youtube.com/watch?v=JZg1nqs793M">​Runa's 
3141
+<a href="https://www.youtube.com/watch?v=GwMr8Xl7JMQ">Roger and Jake's talk at 
3142
+28C3</a>, or <a href="https://www.youtube.com/watch?v=JZg1nqs793M">Runa's 
3143 3143
 talk at 44con</a>.
3144 3144
     </p>
3145 3145
 
... ...
@@ -3155,7 +3155,7 @@ talk at 44con</a>.
3155 3155
 These attacks come from examining characteristics of the IP headers or TCP 
3156 3156
 headers and looking for information leaks based on individual hardware 
3157 3157
 signatures. One example is the 
3158
-​<a href="http://www.caida.org/outreach/papers/2005/fingerprinting/">
3158
+<a href="http://www.caida.org/outreach/papers/2005/fingerprinting/">
3159 3159
 Oakland 2005 paper</a> that lets you learn if two packet streams originated 
3160 3160
 from the same hardware, but only if you can see the original TCP timestamps.
3161 3161
 </p>
... ...
@@ -3170,6 +3170,35 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
3170 3170
 
3171 3171
     <hr>
3172 3172
 
3173
+    <a id="Proxychains"></a>
3174
+    <h3><a class="anchor" href="#Proxychains">Aren't 10 proxies 
3175
+    (proxychains) better than Tor with only 3 hops?</a></h3>
3176
+    
3177
+    <p>
3178
+    Proxychains is a program that sends your traffic through a series of 
3179
+    open web proxies that you supply before sending it on to your final 
3180
+    destination. <a href="#KeyManagement">Unlike Tor</a>, proxychains 
3181
+    does not encrypt the connections between each proxy. An open proxy 
3182
+    that wanted to monitor your connection can see all the other proxy 
3183
+    servers you wanted to use between itself and your final destination, 
3184
+    as well as the IP address that proxy hop receives traffic from. 
3185
+    </p>
3186
+    <p>
3187
+    Because the <a 
3188
+    href="https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt">
3189
+    Tor protocol</a> requires encrypted relay-to-relay connections, not 
3190
+    even a misbehaving relay can see the entire path of any Tor user. 
3191
+    </p>
3192
+    <p>
3193
+    While Tor relays are run by volunteers and checked periodically for 
3194
+    suspicious behavior, many open proxies that can be found with a search 
3195
+    engine are worm-compromised machines, misconfigured private proxies 
3196
+    not intended for public use, or honeypots set up to exploit users. 
3197
+    </p>
3198
+    
3199
+    <hr>
3200
+    
3201
+
3173 3202
 <a id="AttacksOnOnionRouting"></a>
3174 3203
     <h3><a class="anchor" href="#AttacksOnOnionRouting">What attacks remain 
3175 3204
     against onion routing?</a></h3>
... ...
@@ -3671,6 +3700,27 @@ about my exit relay?</a></h3>
3671 3700
 
3672 3701
     <hr>
3673 3702
 
3703
+   <a id="HelpPoliceOrLawyers"></a>
3704
+   <h3><a class="anchor" href="#HelpPoliceOrLawyers">I have questions about
3705
+   a Tor IP address for a legal case.</a></h3>
3706
+   
3707
+   <p>
3708
+   Please read the <a 
3709
+   href="https://www.torproject.org/eff/tor-legal-faq">​legal FAQ written 
3710
+   by EFF lawyers</a>. There's a growing <a 
3711
+   href="https://blog.torproject.org/blog/start-tor-legal-support-directory">legal 
3712
+   directory</a> of people who may be able to help you.
3713
+   </p>
3714
+   
3715
+   <p>
3716
+   If you need to check if a certain IP address was acting as a Tor exit 
3717
+   node at a certain date and time, you can use the <a 
3718
+   href="https://exonerator.torproject.org/">ExoneraTor tool</a> to query the
3719
+   historic Tor relay lists and get an answer.
3720
+   </p>
3721
+   
3722
+   <hr>
3723
+   
3674 3724
   </div>
3675 3725
   <!-- END MAINCOL -->
3676 3726
   <div id = "sidecol">
3677 3727