1 | 1 |
deleted file mode 100644 |
... | ... |
@@ -1,44 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
-# Translation-Priority: 3-low |
|
4 |
- |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Torbutton FAQ" CHARSET="UTF-8" |
|
6 |
-<div id="content" class="clearfix"> |
|
7 |
- <div id="breadcrumbs"> |
|
8 |
- <a href="<page index>">Home » </a> |
|
9 |
- <a href="<page torbutton/index>">Torbutton » </a> |
|
10 |
- <a href="<page torbutton/torbutton-faq>">Torbutton FAQ</a> |
|
11 |
- </div> |
|
12 |
- <div id="maincol"> |
|
13 |
- <!-- PUT CONTENT AFTER THIS TAG --> |
|
14 |
- |
|
15 |
- <h2>Torbutton</h2> |
|
16 |
- <hr> |
|
17 |
- |
|
18 |
- <p> |
|
19 |
- Torbutton is the component in <a href="<page projects/torbrowser>">Tor |
|
20 |
- Browser Bundle</a> that takes care of application-level |
|
21 |
- security and privacy concerns in Firefox. To keep you safe, |
|
22 |
- Torbutton disables many types of active content. |
|
23 |
- </p> |
|
24 |
- |
|
25 |
- <p> |
|
26 |
- Now that the <a href="<page projects/torbrowser>">Tor Browser |
|
27 |
- Bundle</a> includes a patched version of Firefox, and because we don't |
|
28 |
- have enough developer resources to keep up with the accelerated |
|
29 |
- Firefox release schedule, the toggle model of Torbutton is <a |
|
30 |
- href="https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton">no |
|
31 |
- longer supported</a>. <b>Users should be using Tor Browser Bundle, |
|
32 |
- not installing Torbutton themselves.</b> |
|
33 |
- </p> |
|
34 |
- |
|
35 |
- </div> |
|
36 |
- <!-- END MAINCOL --> |
|
37 |
- <div id = "sidecol"> |
|
38 |
-#include "side.wmi" |
|
39 |
-#include "info.wmi" |
|
40 |
- </div> |
|
41 |
- <!-- END SIDECOL --> |
|
42 |
-</div> |
|
43 |
-<!-- END CONTENT --> |
|
44 |
-#include <foot.wmi> |
... | ... |
@@ -11,273 +11,28 @@ |
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
13 | 13 |
<!-- PUT CONTENT AFTER THIS TAG --> |
14 |
- |
|
15 |
- <h2>Torbutton FAQ</h2> |
|
14 |
+ |
|
15 |
+ <h2>Torbutton</h2> |
|
16 | 16 |
<hr> |
17 |
- |
|
18 |
- <h3>Questions</h3> |
|
19 |
- <br> |
|
20 |
- <ul> |
|
21 |
- <li><a href="<page torbutton/torbutton-faq>#noflash">I can't view videos on YouTube and other flash-based sites. Why?</a></li> |
|
22 |
- <li><a href="<page torbutton/torbutton-faq>#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find annoying. Can't I just use the old version?</a></li> |
|
23 |
- <li><a href="<page torbutton/torbutton-faq>#noautocomplete">When I use Tor, Firefox is no longer filling in logins/search boxes for me. Why?</a></li> |
|
24 |
- <li><a href="<page torbutton/torbutton-faq>#thunderbird">What about Thunderbird support? I see a page, but it is the wrong version?</a></li> |
|
25 |
- <li><a href="<page torbutton/torbutton-faq>#extensionconflicts">Which Firefox extensions should I avoid using?</a></li> |
|
26 |
- <li><a href="<page torbutton/torbutton-faq>#recommendedextensions">Which Firefox extensions do you recommend?</a></li> |
|
27 |
- <li><a href="<page torbutton/torbutton-faq>#securityissues">Are there any other issues I should be concerned about?</a></li> |
|
28 |
- </ul> |
|
29 |
- <br> |
|
30 |
- |
|
31 |
- <a id="noflash"></a> |
|
32 |
- <strong><a class="anchor" href="#noflash">I can't view videos on YouTube and |
|
33 |
- other Flash-based sites. Why?</a></strong> |
|
34 |
- |
|
35 |
- <p> |
|
36 |
- YouTube and similar sites require third party browser plugins such as Flash. |
|
37 |
- Plugins operate independently from Firefox and can perform |
|
38 |
- activity on your computer that ruins your anonymity. This includes |
|
39 |
- but is not limited to: <a href="http://decloak.net">completely disregarding |
|
40 |
- proxy settings</a>, querying your <a |
|
41 |
- href="http://forums.sun.com/thread.jspa?threadID=5162138&messageID=9618376">local |
|
42 |
- IP address</a>, and <a |
|
43 |
- href="http://epic.org/privacy/cookies/flash.html">storing their own |
|
44 |
- cookies</a>. It is possible to use a LiveCD solution such as |
|
45 |
- or <a href="https://tails.boum.org/">The Amnesic Incognito Live System</a> that creates a |
|
46 |
- secure, transparent proxy to protect you from proxy bypass, however issues |
|
47 |
- with local IP address discovery and Flash cookies still remain. </p> |
|
48 |
- |
|
49 |
- <p> |
|
50 |
- If you are not concerned about being tracked by these sites (and sites that |
|
51 |
- try to unmask you by pretending to be them), and are unconcerned about your |
|
52 |
- local censors potentially noticing you visit them, you can enable plugins by |
|
53 |
- going into the Torbutton Preferences->Security Settings |
|
54 |
- tab and unchecking "Disable browser plugins (such as Flash)" box. If you do this |
|
55 |
- without The Amnesic Incognito Live System or appropriate firewall |
|
56 |
- rules, we strongly suggest you at least use <a |
|
57 |
- href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> to <a |
|
58 |
- href="http://noscript.net/features#contentblocking">block plugins</a>. You do |
|
59 |
- not need to use the NoScript per-domain permissions if you check the <b>Apply |
|
60 |
- these restrictions to trusted sites too</b> option under the NoScript Plugins |
|
61 |
- preference tab. In fact, with this setting you can even have NoScript allow |
|
62 |
- Javascript globally, but still block all plugins until you click on their |
|
63 |
- placeholders in a page. We also recommend <a |
|
64 |
- href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better Privacy</a> |
|
65 |
- in this case to help you clear your Flash cookies. |
|
66 |
- </p> |
|
67 |
- |
|
68 |
- <a id="oldtorbutton"></a> |
|
69 |
- <strong><a class="anchor" href="#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find |
|
70 |
- annoying. Can't I just use the old version?</a></strong> |
|
71 |
- |
|
72 |
- <p> |
|
73 |
- |
|
74 |
- <b>No.</b> Use of the old version, or any other vanilla proxy changer |
|
75 |
- (including FoxyProxy -- see below) without Torbutton is actively discouraged. |
|
76 |
- Seriously. Using a vanilla proxy switcher by itself is so insecure that you are |
|
77 |
- not only just wasting your time, you are also actually endangering yourself. |
|
78 |
- <b>Simply do not use Tor</b> and you will have the same (and in some cases, |
|
79 |
- better) security. For more information on the types of attacks you are exposed |
|
80 |
- to with a "homegrown" solution, please see <a |
|
81 |
- href="design/index.html.en#adversary">The Torbutton |
|
82 |
- Adversary Model</a>, in particular the <a |
|
83 |
- href="design/index.html.en#attacks">Adversary |
|
84 |
- Capabilities - Attacks</a> subsection. If there are any specific Torbutton |
|
85 |
- behaviors that you do not like, please file a bug on <a |
|
86 |
- href="https://trac.torproject.org/projects/tor/report/14">the |
|
87 |
- bug tracker.</a> Most of Torbutton's security features can also be disabled via |
|
88 |
- its preferences, if you think you have your own protection for those specific |
|
89 |
- cases. |
|
90 |
- |
|
91 |
- </p> |
|
92 |
- |
|
93 |
- <a id="noautocomplete"></a> |
|
94 |
- <strong><a class="anchor" href="#noautocomplete">When I use Tor, Firefox is no longer filling in logins/search boxes |
|
95 |
- for me. Why?</a></strong> |
|
96 |
- |
|
97 |
- <p> |
|
98 |
- Currently, this is tied to the "<b>Block history writes during Tor</b>" |
|
99 |
- setting. If you have enabled that setting, all formfill functionality (both |
|
100 |
- saving and reading) is disabled. If this bothers you, you can uncheck that |
|
101 |
- option, but both history and forms will be saved. To prevent history |
|
102 |
- disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor |
|
103 |
- history reads if you allow history writing during Tor. |
|
104 |
- </p> |
|
105 |
- |
|
106 |
- <a id="thunderbird"></a> |
|
107 |
- <strong><a class="anchor" href="#thunderbird">What about Thunderbird support? I see a page, but it is the wrong |
|
108 |
- version?</a></strong> |
|
109 |
- |
|
110 |
- <p> |
|
111 |
- The Tor plugin for Thunderbird is called <a href="https://trac.torproject.org/projects/tor/wiki/torbirdy"> |
|
112 |
- TorBirdy</a>. |
|
113 |
- </p> |
|
114 |
- |
|
115 |
- <a id="extensionconflicts"></a> |
|
116 |
- <strong><a class="anchor" href="#extensionconflicts">Which Firefox extensions should I avoid using?</a></strong> |
|
117 |
- |
|
118 |
- <p> |
|
119 |
- This is a tough one. There are thousands of Firefox extensions: making a |
|
120 |
- complete list of ones that are bad for anonymity is near impossible. However, |
|
121 |
- here are a few examples that should get you started as to what sorts of |
|
122 |
- behavior are dangerous. |
|
123 |
- </p> |
|
124 |
- |
|
125 |
- <ol> |
|
126 |
- <li>StumbleUpon, et al |
|
127 |
- <p> |
|
128 |
- These extensions will send all sorts of information about the websites you |
|
129 |
- visit to the stumbleupon servers, and correlate this information with a |
|
130 |
- unique identifier. This is obviously terrible for your anonymity. |
|
131 |
- More generally, any sort of extension that requires registration, or even |
|
132 |
- extensions that provide information about websites you visit should be |
|
133 |
- suspect. |
|
134 |
- </p></li> |
|
135 |
- <li>FoxyProxy |
|
136 |
- <p> |
|
137 |
- While FoxyProxy is a nice idea in theory, in practice it is impossible to |
|
138 |
- configure securely for Tor usage without Torbutton. Like all vanilla third |
|
139 |
- party proxy plugins, the main risks are <a |
|
140 |
- href="http://www.decloak.net/">plugin leakage</a> |
|
141 |
- and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
|
142 |
- disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
|
143 |
- adservers (see the <a href="design/index.html.en#adversary">Torbutton Adversary |
|
144 |
- Model</a> for more information). However, with Torbutton installed in tandem |
|
145 |
- and always enabled, it is possible to configure FoxyProxy securely (though it |
|
146 |
- is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls, |
|
147 |
- and not to an entire tab, setting FoxyProxy to only send specific sites |
|
148 |
- through Tor will still allow adservers (whose hosts don't match your filters) to learn your real IP. Worse, when |
|
149 |
- sites use offsite logging services such as Google Analytics, you will |
|
150 |
- still end up in their logs with your real IP. Malicious exit nodes can also |
|
151 |
- cooperate with sites to inject images into pages that bypass your filters. |
|
152 |
- Setting FoxyProxy to only send certain URLs via Non-Tor is much more secure in |
|
153 |
- this regard, but be very careful with the filters you allow. For example, |
|
154 |
- something as simple as allowing *google* to go via Non-Tor will still cause you to end up |
|
155 |
- in all the logs of all websites that use Google Analytics! See |
|
156 |
- <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this question</a> on |
|
157 |
- the FoxyProxy FAQ for more information. |
|
158 |
- </p></li> |
|
159 |
- </ol> |
|
160 |
- |
|
161 |
- <a id="recommendedextensions"></a> |
|
162 |
- <strong><a class="anchor" href="#recommendedextensions">Which Firefox extensions do you recommend?</a></strong> |
|
163 |
- <ol> |
|
164 |
- <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> |
|
165 |
- <p> |
|
166 |
- Mentioned above, this extension allows more fine-grained referrer spoofing |
|
167 |
- than Torbutton currently provides. It should break less sites than Torbutton's |
|
168 |
- referrer spoofing option.</p></li> |
|
169 |
- |
|
170 |
- <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a> |
|
171 |
- <p> |
|
172 |
- If you use Tor excessively, and rarely disable it, you probably want to |
|
173 |
- install this extension to minimize the ability of sites to store long term |
|
174 |
- identifiers in your cache. This extension applies same origin policy to the |
|
175 |
- cache, so that elements are retrieved from the cache only if they are fetched |
|
176 |
- from a document in the same origin domain as the cached element. |
|
177 |
- </p></li> |
|
178 |
- |
|
179 |
- <li><a href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better |
|
180 |
- Privacy</a> |
|
181 |
- <p> |
|
182 |
- |
|
183 |
- Better Privacy is an excellent extension that protects you from cookies used |
|
184 |
- by Flash applications, which often persist forever and are not clearable via |
|
185 |
- normal Firefox "Private Data" clearing. Flash and all other plugins are |
|
186 |
- disabled by Torbutton by default, but if you are interested in privacy, you |
|
187 |
- may want this extension to allow you to inspect and automatically clear your |
|
188 |
- Flash cookies for your Non-Tor usage. |
|
189 |
- |
|
190 |
- </p> |
|
191 |
- </li> |
|
192 |
- <li><a href="https://addons.mozilla.org/firefox/addon/1865">AdBlock Plus</a> |
|
193 |
- <p> |
|
194 |
- |
|
195 |
- AdBlock Plus is an excellent addon for removing annoying, privacy-invading, |
|
196 |
- and <a |
|
197 |
- href="http://www.wired.com/techbiz/media/news/2007/11/doubleclick">malware-distributing</a> |
|
198 |
- advertisements from the web. It provides |
|
199 |
- <a href="http://adblockplus.org/en/subscriptions">subscriptions</a> that are |
|
200 |
- continually updated to catch the latest efforts of ad networks to circumvent |
|
201 |
- these filters. I recommend the EasyPrivacy+EasyList combination filter |
|
202 |
- subscription in the Miscellaneous section of the subscriptions page. |
|
203 |
- |
|
204 |
- </p> |
|
205 |
- </li> |
|
206 |
- <li><a href="https://addons.mozilla.org/firefox/addon/82">Cookie Culler</a> |
|
207 |
- <p> |
|
208 |
- |
|
209 |
- Cookie Culler is a handy extension to give quick access to the cookie manager |
|
210 |
- in Firefox. It also provides the ability to protect certain cookies from |
|
211 |
- deletion, but unfortunately, this behavior does not integrate well with Torbutton. |
|
212 |
- |
|
213 |
- </p> |
|
214 |
- </li> |
|
215 |
- |
|
216 |
- <li><a href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> |
|
217 |
- <p> |
|
218 |
- Torbutton currently mitigates all known anonymity issues with Javascript. |
|
219 |
- However, if you are concerned about Javascript exploits against your browser |
|
220 |
- or against websites you are logged in to, you may want to use NoScript. It |
|
221 |
- provides the ability to allow Javascript only for particular websites |
|
222 |
- and also provides mechanisms to force HTTPS urls for sites with |
|
223 |
- <a href="http://fscked.org/category/tags/insecurecookies">insecure |
|
224 |
- cookies</a>.<br> |
|
225 |
- |
|
226 |
- It can be difficult to configure such that the most sites will work |
|
227 |
- properly though. In particular, you want to make sure you do not remove |
|
228 |
- the Javascript whitelist for |
|
229 |
- addons.mozilla.org, as extensions are downloaded via http and verified by |
|
230 |
- javascript from the https page. |
|
231 |
- |
|
232 |
- </p></li> |
|
233 |
- <li><a href="https://addons.mozilla.org/en-US/firefox/addon/9727/">Request |
|
234 |
- Policy</a> |
|
235 |
- <p> |
|
236 |
- |
|
237 |
- Request Policy is similar to NoScript in that it requires that you configure |
|
238 |
- which sites are allowed to load content from other domains. It can be very |
|
239 |
- difficult for novice users to configure properly, but it does provide a good |
|
240 |
- deal of protection against ads, injected content, and cross-site request |
|
241 |
- forgery attacks. |
|
242 |
- |
|
243 |
- </p> |
|
244 |
- </li> |
|
245 |
- |
|
246 |
- </ol> |
|
247 |
- |
|
248 |
- <a id="securityissues"></a> |
|
249 |
- <strong><a class="anchor" href="#securityissues">Are there any other issues I should be concerned about?</a></strong> |
|
250 |
- |
|
17 |
+ |
|
251 | 18 |
<p> |
252 |
- There are a few known security issues with Torbutton (all of which are due to |
|
253 |
- <a href="design/index.html.en#FirefoxBugs">unfixed |
|
254 |
- Firefox security bugs</a>). The most important for anonymity is that it is |
|
255 |
- possible to unmask the javascript hooks that wrap the Date object to conceal |
|
256 |
- your timezone in Firefox 2, and the timezone masking code does not work at all |
|
257 |
- on Firefox 3. We are working with the Firefox team to fix one of <a |
|
258 |
- href="https://bugzilla.mozilla.org/show_bug.cgi?id=392274">Bug 399274</a> or |
|
259 |
- <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=419598">Bug 419598</a> |
|
260 |
- to address this. In the meantime, it is possible to set the <b>TZ</b> |
|
261 |
- environment variable to <b>UTC</b> to cause the browser to use UTC as your |
|
262 |
- timezone. Under Linux, you can add an <b>export TZ=UTC</b> to the |
|
263 |
- /usr/bin/firefox script, or edit your system bashrc to do the same. Under |
|
264 |
- Windows, you can set either a <a |
|
265 |
- href="http://support.microsoft.com/kb/310519">User or System Environment |
|
266 |
- Variable</a> for TZ via My Computer's properties. In MacOS, the situation is |
|
267 |
- <a |
|
268 |
- href="http://developer.apple.com/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/EnvironmentVars.html#//apple_ref/doc/uid/20002093-BCIJIJBH">a |
|
269 |
- lot more complicated</a>, unfortunately. |
|
19 |
+ Torbutton is the component in <a href="<page projects/torbrowser>">Tor |
|
20 |
+ Browser Bundle</a> that takes care of application-level |
|
21 |
+ security and privacy concerns in Firefox. To keep you safe, |
|
22 |
+ Torbutton disables many types of active content. |
|
270 | 23 |
</p> |
271 |
- |
|
24 |
+ |
|
272 | 25 |
<p> |
273 |
- In addition, RSS readers such as Firefox Livemarks can perform |
|
274 |
- periodic fetches. Due to <a |
|
275 |
- href="https://bugzilla.mozilla.org/show_bug.cgi?id=436250">Firefox Bug |
|
276 |
- 436250</a>, there is no way to disable Livemark fetches during Tor. This can |
|
277 |
- be a problem if you have a lot of custom Livemark urls that can give away |
|
278 |
- information about your identity. |
|
26 |
+ Now that the <a href="<page projects/torbrowser>">Tor Browser |
|
27 |
+ Bundle</a> includes a patched version of Firefox, and because we don't |
|
28 |
+ have enough developer resources to keep up with the accelerated |
|
29 |
+ Firefox release schedule, the toggle model of Torbutton is <a |
|
30 |
+ href="https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton">no |
|
31 |
+ longer supported</a>. <b>Users should be using Tor Browser Bundle, |
|
32 |
+ not installing Torbutton themselves.</b> |
|
279 | 33 |
</p> |
280 |
- </div> |
|
34 |
+ |
|
35 |
+ </div> |
|
281 | 36 |
<!-- END MAINCOL --> |
282 | 37 |
<div id = "sidecol"> |
283 | 38 |
#include "side.wmi" |
... | ... |
@@ -18,11 +18,8 @@ |
18 | 18 |
<h3>Questions</h3> |
19 | 19 |
<br> |
20 | 20 |
<ul> |
21 |
- <li><a href="<page torbutton/torbutton-faq>#nojavascript">When I toggle Tor, my sites that use javascript stop working. Why?</a></li> |
|
22 |
- <li><a href="<page torbutton/torbutton-faq>#noreloads">I can't click on links or hit reload after I toggle Tor! Why?</a></li> |
|
23 | 21 |
<li><a href="<page torbutton/torbutton-faq>#noflash">I can't view videos on YouTube and other flash-based sites. Why?</a></li> |
24 | 22 |
<li><a href="<page torbutton/torbutton-faq>#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find annoying. Can't I just use the old version?</a></li> |
25 |
- <li><a href="<page torbutton/torbutton-faq>#weirdstate">My browser is in some weird state where nothing works right!</a></li> |
|
26 | 23 |
<li><a href="<page torbutton/torbutton-faq>#noautocomplete">When I use Tor, Firefox is no longer filling in logins/search boxes for me. Why?</a></li> |
27 | 24 |
<li><a href="<page torbutton/torbutton-faq>#thunderbird">What about Thunderbird support? I see a page, but it is the wrong version?</a></li> |
28 | 25 |
<li><a href="<page torbutton/torbutton-faq>#extensionconflicts">Which Firefox extensions should I avoid using?</a></li> |
... | ... |
@@ -31,41 +28,6 @@ |
31 | 28 |
</ul> |
32 | 29 |
<br> |
33 | 30 |
|
34 |
- <a id="nojavascript"></a> |
|
35 |
- <strong><a class="anchor" href="#nojavascript">When I toggle Tor, my sites that use javascript stop working. Why?</a></strong> |
|
36 |
- |
|
37 |
- <p> |
|
38 |
- Javascript can do things like wait until you have disabled Tor before trying |
|
39 |
- to contact its source site, thus revealing your IP address. As such, Torbutton |
|
40 |
- must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor |
|
41 |
- state changes from the state that was used to load a given page. These features |
|
42 |
- are re-enabled when Torbutton goes back into the state that was used to load |
|
43 |
- the page, but in some cases (particularly with Javascript and CSS) it is |
|
44 |
- sometimes not possible to fully recover from the resulting errors, and the |
|
45 |
- page is broken. Unfortunately, the only thing you can do (and still remain |
|
46 |
- safe from having your IP address leak) is to reload the page when you toggle |
|
47 |
- Tor, or just ensure you do all your work in a page before switching tor state. |
|
48 |
- </p> |
|
49 |
- |
|
50 |
- <a id="noreloads"></a> |
|
51 |
- <strong><a class="anchor" href="#noreloads">I can't click on links or hit reload after I toggle Tor! Why?</a></strong> |
|
52 |
- |
|
53 |
- <p> |
|
54 |
- Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox |
|
55 |
- Bug 409737</a>, pages can still open popups and perform Javascript redirects |
|
56 |
- and history access after Tor has been toggled. These popups and redirects can |
|
57 |
- be blocked, but unfortunately they are indistinguishable from normal user |
|
58 |
- interactions with the page (such as clicking on links, opening them in new |
|
59 |
- tabs/windows, or using the history buttons), and so those are blocked as a |
|
60 |
- side effect. Once that Firefox bug is fixed, this degree of isolation will |
|
61 |
- become optional (for people who do not want to accidentally click on links and |
|
62 |
- give away information via referrers). A workaround is to right click on the |
|
63 |
- link, and open it in a new tab or window. The tab or window won't load |
|
64 |
- automatically, but you can hit enter in the URL bar, and it will begin |
|
65 |
- loading. Hitting enter in the URL bar will also reload the page without |
|
66 |
- clicking the reload button. |
|
67 |
- </p> |
|
68 |
- |
|
69 | 31 |
<a id="noflash"></a> |
70 | 32 |
<strong><a class="anchor" href="#noflash">I can't view videos on YouTube and |
71 | 33 |
other Flash-based sites. Why?</a></strong> |
... | ... |
@@ -88,8 +50,8 @@ |
88 | 50 |
If you are not concerned about being tracked by these sites (and sites that |
89 | 51 |
try to unmask you by pretending to be them), and are unconcerned about your |
90 | 52 |
local censors potentially noticing you visit them, you can enable plugins by |
91 |
- going into the Torbutton Preferences->Security Settings->Dynamic Content |
|
92 |
- tab and unchecking "Disable plugins during Tor usage" box. If you do this |
|
53 |
+ going into the Torbutton Preferences->Security Settings |
|
54 |
+ tab and unchecking "Disable browser plugins (such as Flash)" box. If you do this |
|
93 | 55 |
without The Amnesic Incognito Live System or appropriate firewall |
94 | 56 |
rules, we strongly suggest you at least use <a |
95 | 57 |
href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> to <a |
... | ... |
@@ -102,10 +64,6 @@ |
102 | 64 |
href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better Privacy</a> |
103 | 65 |
in this case to help you clear your Flash cookies. |
104 | 66 |
</p> |
105 |
- |
|
106 |
- <p><em>The Tor Browser Bundle does not work with Flash or other plugins |
|
107 |
- by design. If you wish to run these plugins over Tor, you need to |
|
108 |
- install Tor and configure your own instance of Firefox.</em></p> |
|
109 | 67 |
|
110 | 68 |
<a id="oldtorbutton"></a> |
111 | 69 |
<strong><a class="anchor" href="#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find |
... | ... |
@@ -132,18 +90,6 @@ |
132 | 90 |
|
133 | 91 |
</p> |
134 | 92 |
|
135 |
- <a id="weirdstate"></a> |
|
136 |
- <strong><a class="anchor" href="#weirdstate">My browser is in some weird state where nothing works right!</a></strong> |
|
137 |
- |
|
138 |
- <p> |
|
139 |
- Try to disable Tor by clicking on the button, and then open a new window. If |
|
140 |
- that doesn't fix the issue, go to the preferences page and hit 'Restore |
|
141 |
- Defaults'. This should reset the extension and Firefox to a known good |
|
142 |
- configuration. If you can manage to reproduce whatever issue gets your |
|
143 |
- Firefox wedged, please file details at <a |
|
144 |
- href="https://trac.torproject.org/projects/tor/report/14">the bug tracker</a>. |
|
145 |
- </p> |
|
146 |
- |
|
147 | 93 |
<a id="noautocomplete"></a> |
148 | 94 |
<strong><a class="anchor" href="#noautocomplete">When I use Tor, Firefox is no longer filling in logins/search boxes |
149 | 95 |
for me. Why?</a></strong> |
... | ... |
@@ -162,19 +108,8 @@ |
162 | 108 |
version?</a></strong> |
163 | 109 |
|
164 | 110 |
<p> |
165 |
- Torbutton used to support basic proxy switching on Thunderbird back in the 1.0 |
|
166 |
- days, but that support has been removed because it has not been analyzed for |
|
167 |
- security. My developer tools page on addons.mozilla.org clearly lists Firefox |
|
168 |
- support only, so I don't know why they didn't delete that Thunderbird listing. |
|
169 |
- I am not a Thunderbird user and unfortunately, I don't have time to analyze |
|
170 |
- the security issues involved with toggling proxy settings in that app. It |
|
171 |
- likely suffers from similar (but not identical) state and proxy leak issues |
|
172 |
- with html mail, embedded images, javascript, plugins and automatic network |
|
173 |
- access. My recommendation is to create a completely separate Thunderbird |
|
174 |
- profile for your Tor accounts and use that instead of trying to toggle proxy |
|
175 |
- settings. But if you really like to roll fast and loose with your IP, you |
|
176 |
- could try another proxy switcher like ProxyButton, SwitchProxy or FoxyProxy |
|
177 |
- (if any of those happen to support thunderbird). |
|
111 |
+ The Tor plugin for Thunderbird is called <a href="https://trac.torproject.org/projects/tor/wiki/torbirdy"> |
|
112 |
+ TorBirdy</a>. |
|
178 | 113 |
</p> |
179 | 114 |
|
180 | 115 |
<a id="extensionconflicts"></a> |
... | ... |
@@ -273,7 +208,7 @@ |
273 | 208 |
|
274 | 209 |
Cookie Culler is a handy extension to give quick access to the cookie manager |
275 | 210 |
in Firefox. It also provides the ability to protect certain cookies from |
276 |
- deletion, but unfortunately, this behavior does not integrate well with Torbutton. Kory Kirk is working on addressing this for this Google Summer of Code project for 2009. |
|
211 |
+ deletion, but unfortunately, this behavior does not integrate well with Torbutton. |
|
277 | 212 |
|
278 | 213 |
</p> |
279 | 214 |
</li> |
... | ... |
@@ -202,7 +202,7 @@ |
202 | 202 |
While FoxyProxy is a nice idea in theory, in practice it is impossible to |
203 | 203 |
configure securely for Tor usage without Torbutton. Like all vanilla third |
204 | 204 |
party proxy plugins, the main risks are <a |
205 |
- href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
|
205 |
+ href="http://www.decloak.net/">plugin leakage</a> |
|
206 | 206 |
and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
207 | 207 |
disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
208 | 208 |
adservers (see the <a href="design/index.html.en#adversary">Torbutton Adversary |
... | ... |
@@ -2,7 +2,7 @@ |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
# Translation-Priority: 3-low |
4 | 4 |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Torbutton FAQ" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
5 |
+#include "head.wmi" TITLE="Tor Project: Torbutton FAQ" CHARSET="UTF-8" |
|
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
... | ... |
@@ -80,7 +80,7 @@ |
80 | 80 |
IP address</a>, and <a |
81 | 81 |
href="http://epic.org/privacy/cookies/flash.html">storing their own |
82 | 82 |
cookies</a>. It is possible to use a LiveCD solution such as |
83 |
- or <a href="https://amnesia.boum.org/">The (Amnesic) Incognito Live System</a> that creates a |
|
83 |
+ or <a href="https://tails.boum.org/">The Amnesic Incognito Live System</a> that creates a |
|
84 | 84 |
secure, transparent proxy to protect you from proxy bypass, however issues |
85 | 85 |
with local IP address discovery and Flash cookies still remain. </p> |
86 | 86 |
|
... | ... |
@@ -90,7 +90,7 @@ |
90 | 90 |
local censors potentially noticing you visit them, you can enable plugins by |
91 | 91 |
going into the Torbutton Preferences->Security Settings->Dynamic Content |
92 | 92 |
tab and unchecking "Disable plugins during Tor usage" box. If you do this |
93 |
- without The (Amnesic) Incognito Live System or appropriate firewall |
|
93 |
+ without The Amnesic Incognito Live System or appropriate firewall |
|
94 | 94 |
rules, we strongly suggest you at least use <a |
95 | 95 |
href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> to <a |
96 | 96 |
href="http://noscript.net/features#contentblocking">block plugins</a>. You do |
... | ... |
@@ -103,9 +103,9 @@ |
103 | 103 |
in this case to help you clear your Flash cookies. |
104 | 104 |
</p> |
105 | 105 |
|
106 |
- <p> The Tor Browser Bundle does not work with Flash or other plugins |
|
106 |
+ <p><em>The Tor Browser Bundle does not work with Flash or other plugins |
|
107 | 107 |
by design. If you wish to run these plugins over Tor, you need to |
108 |
- install Tor and configure your own instance of Firefox.</p> |
|
108 |
+ install Tor and configure your own instance of Firefox.</em></p> |
|
109 | 109 |
|
110 | 110 |
<a id="oldtorbutton"></a> |
111 | 111 |
<strong><a class="anchor" href="#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find |
... | ... |
@@ -104,8 +104,8 @@ |
104 | 104 |
</p> |
105 | 105 |
|
106 | 106 |
<p> The Tor Browser Bundle does not work with Flash or other plugins |
107 |
-by design. If you wish to run these plugins over Tor, you need to |
|
108 |
-install Tor and configure your own instance of Firefox.</p> |
|
107 |
+ by design. If you wish to run these plugins over Tor, you need to |
|
108 |
+ install Tor and configure your own instance of Firefox.</p> |
|
109 | 109 |
|
110 | 110 |
<a id="oldtorbutton"></a> |
111 | 111 |
<strong><a class="anchor" href="#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find |
... | ... |
@@ -2,7 +2,7 @@ |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
# Translation-Priority: 3-low |
4 | 4 |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Projects Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
5 |
+#include "head.wmi" TITLE="Tor Project: Torbutton FAQ" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
... | ... |
@@ -71,7 +71,6 @@ |
71 | 71 |
other Flash-based sites. Why?</a></strong> |
72 | 72 |
|
73 | 73 |
<p> |
74 |
- |
|
75 | 74 |
YouTube and similar sites require third party browser plugins such as Flash. |
76 | 75 |
Plugins operate independently from Firefox and can perform |
77 | 76 |
activity on your computer that ruins your anonymity. This includes |
... | ... |
@@ -86,14 +85,13 @@ |
86 | 85 |
with local IP address discovery and Flash cookies still remain. </p> |
87 | 86 |
|
88 | 87 |
<p> |
89 |
- |
|
90 | 88 |
If you are not concerned about being tracked by these sites (and sites that |
91 | 89 |
try to unmask you by pretending to be them), and are unconcerned about your |
92 | 90 |
local censors potentially noticing you visit them, you can enable plugins by |
93 | 91 |
going into the Torbutton Preferences->Security Settings->Dynamic Content |
94 | 92 |
tab and unchecking "Disable plugins during Tor usage" box. If you do this |
95 |
- without Tor VM, The (Amnesic) Incognito Live System or appropriate |
|
96 |
- firewall rules, we strongly suggest you at least use <a |
|
93 |
+ without The (Amnesic) Incognito Live System or appropriate firewall |
|
94 |
+ rules, we strongly suggest you at least use <a |
|
97 | 95 |
href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> to <a |
98 | 96 |
href="http://noscript.net/features#contentblocking">block plugins</a>. You do |
99 | 97 |
not need to use the NoScript per-domain permissions if you check the <b>Apply |
... | ... |
@@ -103,8 +101,11 @@ |
103 | 101 |
placeholders in a page. We also recommend <a |
104 | 102 |
href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better Privacy</a> |
105 | 103 |
in this case to help you clear your Flash cookies. |
106 |
- |
|
107 | 104 |
</p> |
105 |
+ |
|
106 |
+ <p> The Tor Browser Bundle does not work with Flash or other plugins |
|
107 |
+by design. If you wish to run these plugins over Tor, you need to |
|
108 |
+install Tor and configure your own instance of Firefox.</p> |
|
108 | 109 |
|
109 | 110 |
<a id="oldtorbutton"></a> |
110 | 111 |
<strong><a class="anchor" href="#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find |
... | ... |
@@ -119,9 +119,9 @@ |
119 | 119 |
<b>Simply do not use Tor</b> and you will have the same (and in some cases, |
120 | 120 |
better) security. For more information on the types of attacks you are exposed |
121 | 121 |
to with a "homegrown" solution, please see <a |
122 |
- href="design/index.html#adversary">The Torbutton |
|
122 |
+ href="design/index.html.en#adversary">The Torbutton |
|
123 | 123 |
Adversary Model</a>, in particular the <a |
124 |
- href="design/index.html#attacks">Adversary |
|
124 |
+ href="design/index.html.en#attacks">Adversary |
|
125 | 125 |
Capabilities - Attacks</a> subsection. If there are any specific Torbutton |
126 | 126 |
behaviors that you do not like, please file a bug on <a |
127 | 127 |
href="https://trac.torproject.org/projects/tor/report/14">the |
... | ... |
@@ -204,7 +204,7 @@ |
204 | 204 |
href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
205 | 205 |
and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
206 | 206 |
disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
207 |
- adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
207 |
+ adservers (see the <a href="design/index.html.en#adversary">Torbutton Adversary |
|
208 | 208 |
Model</a> for more information). However, with Torbutton installed in tandem |
209 | 209 |
and always enabled, it is possible to configure FoxyProxy securely (though it |
210 | 210 |
is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls, |
... | ... |
@@ -314,7 +314,7 @@ |
314 | 314 |
|
315 | 315 |
<p> |
316 | 316 |
There are a few known security issues with Torbutton (all of which are due to |
317 |
- <a href="design/index.html#FirefoxBugs">unfixed |
|
317 |
+ <a href="design/index.html.en#FirefoxBugs">unfixed |
|
318 | 318 |
Firefox security bugs</a>). The most important for anonymity is that it is |
319 | 319 |
possible to unmask the javascript hooks that wrap the Date object to conceal |
320 | 320 |
your timezone in Firefox 2, and the timezone masking code does not work at all |
... | ... |
@@ -13,10 +13,10 @@ |
13 | 13 |
<!-- PUT CONTENT AFTER THIS TAG --> |
14 | 14 |
|
15 | 15 |
<h2>Torbutton FAQ</h2> |
16 |
- <hr /> |
|
16 |
+ <hr> |
|
17 | 17 |
|
18 | 18 |
<h3>Questions</h3> |
19 |
- <br /> |
|
19 |
+ <br> |
|
20 | 20 |
<ul> |
21 | 21 |
<li><a href="<page torbutton/torbutton-faq>#nojavascript">When I toggle Tor, my sites that use javascript stop working. Why?</a></li> |
22 | 22 |
<li><a href="<page torbutton/torbutton-faq>#noreloads">I can't click on links or hit reload after I toggle Tor! Why?</a></li> |
... | ... |
@@ -29,7 +29,7 @@ |
29 | 29 |
<li><a href="<page torbutton/torbutton-faq>#recommendedextensions">Which Firefox extensions do you recommend?</a></li> |
30 | 30 |
<li><a href="<page torbutton/torbutton-faq>#securityissues">Are there any other issues I should be concerned about?</a></li> |
31 | 31 |
</ul> |
32 |
- <br /> |
|
32 |
+ <br> |
|
33 | 33 |
|
34 | 34 |
<a id="nojavascript"></a> |
35 | 35 |
<strong><a class="anchor" href="#nojavascript">When I toggle Tor, my sites that use javascript stop working. Why?</a></strong> |
... | ... |
@@ -6,8 +6,8 @@ |
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
9 |
- <a href="<page torbutton/>">TorButton » </a> |
|
10 |
- <a href="<page torbutton/torbutton-faq>">TorButton FAQ</a> |
|
9 |
+ <a href="<page torbutton/index>">Torbutton » </a> |
|
10 |
+ <a href="<page torbutton/torbutton-faq>">Torbutton FAQ</a> |
|
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
13 | 13 |
<!-- PUT CONTENT AFTER THIS TAG --> |
... | ... |
@@ -124,7 +124,7 @@ |
124 | 124 |
href="design/index.html#attacks">Adversary |
125 | 125 |
Capabilities - Attacks</a> subsection. If there are any specific Torbutton |
126 | 126 |
behaviors that you do not like, please file a bug on <a |
127 |
- href="https://trac.torproject.org/">the |
|
127 |
+ href="https://trac.torproject.org/projects/tor/report/14">the |
|
128 | 128 |
bug tracker.</a> Most of Torbutton's security features can also be disabled via |
129 | 129 |
its preferences, if you think you have your own protection for those specific |
130 | 130 |
cases. |
... | ... |
@@ -140,7 +140,7 @@ |
140 | 140 |
Defaults'. This should reset the extension and Firefox to a known good |
141 | 141 |
configuration. If you can manage to reproduce whatever issue gets your |
142 | 142 |
Firefox wedged, please file details at <a |
143 |
- href="https://trac.torproject.org/">the bug tracker</a>. |
|
143 |
+ href="https://trac.torproject.org/projects/tor/report/14">the bug tracker</a>. |
|
144 | 144 |
</p> |
145 | 145 |
|
146 | 146 |
<a id="noautocomplete"></a> |
1 | 1 |
new file mode 100644 |
... | ... |
@@ -0,0 +1,353 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision: 0 $ |
|
3 |
+# Translation-Priority: 3-low |
|
4 |
+ |
|
5 |
+#include "head.wmi" TITLE="Tor Project: Projects Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
6 |
+<div id="content" class="clearfix"> |
|
7 |
+ <div id="breadcrumbs"> |
|
8 |
+ <a href="<page index>">Home » </a> |
|
9 |
+ <a href="<page torbutton/>">TorButton » </a> |
|
10 |
+ <a href="<page torbutton/torbutton-faq>">TorButton FAQ</a> |
|
11 |
+ </div> |
|
12 |
+ <div id="maincol"> |
|
13 |
+ <!-- PUT CONTENT AFTER THIS TAG --> |
|
14 |
+ |
|
15 |
+ <h2>Torbutton FAQ</h2> |
|
16 |
+ <hr /> |
|
17 |
+ |
|
18 |
+ <h3>Questions</h3> |
|
19 |
+ <br /> |
|
20 |
+ <ul> |
|
21 |
+ <li><a href="<page torbutton/torbutton-faq>#nojavascript">When I toggle Tor, my sites that use javascript stop working. Why?</a></li> |
|
22 |
+ <li><a href="<page torbutton/torbutton-faq>#noreloads">I can't click on links or hit reload after I toggle Tor! Why?</a></li> |
|
23 |
+ <li><a href="<page torbutton/torbutton-faq>#noflash">I can't view videos on YouTube and other flash-based sites. Why?</a></li> |
|
24 |
+ <li><a href="<page torbutton/torbutton-faq>#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find annoying. Can't I just use the old version?</a></li> |
|
25 |
+ <li><a href="<page torbutton/torbutton-faq>#weirdstate">My browser is in some weird state where nothing works right!</a></li> |
|
26 |
+ <li><a href="<page torbutton/torbutton-faq>#noautocomplete">When I use Tor, Firefox is no longer filling in logins/search boxes for me. Why?</a></li> |
|
27 |
+ <li><a href="<page torbutton/torbutton-faq>#thunderbird">What about Thunderbird support? I see a page, but it is the wrong version?</a></li> |
|
28 |
+ <li><a href="<page torbutton/torbutton-faq>#extensionconflicts">Which Firefox extensions should I avoid using?</a></li> |
|
29 |
+ <li><a href="<page torbutton/torbutton-faq>#recommendedextensions">Which Firefox extensions do you recommend?</a></li> |
|
30 |
+ <li><a href="<page torbutton/torbutton-faq>#securityissues">Are there any other issues I should be concerned about?</a></li> |
|
31 |
+ </ul> |
|
32 |
+ <br /> |
|
33 |
+ |
|
34 |
+ <a id="nojavascript"></a> |
|
35 |
+ <strong><a class="anchor" href="#nojavascript">When I toggle Tor, my sites that use javascript stop working. Why?</a></strong> |
|
36 |
+ |
|
37 |
+ <p> |
|
38 |
+ Javascript can do things like wait until you have disabled Tor before trying |
|
39 |
+ to contact its source site, thus revealing your IP address. As such, Torbutton |
|
40 |
+ must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor |
|
41 |
+ state changes from the state that was used to load a given page. These features |
|
42 |
+ are re-enabled when Torbutton goes back into the state that was used to load |
|
43 |
+ the page, but in some cases (particularly with Javascript and CSS) it is |
|
44 |
+ sometimes not possible to fully recover from the resulting errors, and the |
|
45 |
+ page is broken. Unfortunately, the only thing you can do (and still remain |
|
46 |
+ safe from having your IP address leak) is to reload the page when you toggle |
|
47 |
+ Tor, or just ensure you do all your work in a page before switching tor state. |
|
48 |
+ </p> |
|
49 |
+ |
|
50 |
+ <a id="noreloads"></a> |
|
51 |
+ <strong><a class="anchor" href="#noreloads">I can't click on links or hit reload after I toggle Tor! Why?</a></strong> |
|
52 |
+ |
|
53 |
+ <p> |
|
54 |
+ Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox |
|
55 |
+ Bug 409737</a>, pages can still open popups and perform Javascript redirects |
|
56 |
+ and history access after Tor has been toggled. These popups and redirects can |
|
57 |
+ be blocked, but unfortunately they are indistinguishable from normal user |
|
58 |
+ interactions with the page (such as clicking on links, opening them in new |
|
59 |
+ tabs/windows, or using the history buttons), and so those are blocked as a |
|
60 |
+ side effect. Once that Firefox bug is fixed, this degree of isolation will |
|
61 |
+ become optional (for people who do not want to accidentally click on links and |
|
62 |
+ give away information via referrers). A workaround is to right click on the |
|
63 |
+ link, and open it in a new tab or window. The tab or window won't load |
|
64 |
+ automatically, but you can hit enter in the URL bar, and it will begin |
|
65 |
+ loading. Hitting enter in the URL bar will also reload the page without |
|
66 |
+ clicking the reload button. |
|
67 |
+ </p> |
|
68 |
+ |
|
69 |
+ <a id="noflash"></a> |
|
70 |
+ <strong><a class="anchor" href="#noflash">I can't view videos on YouTube and |
|
71 |
+ other Flash-based sites. Why?</a></strong> |
|
72 |
+ |
|
73 |
+ <p> |
|
74 |
+ |
|
75 |
+ YouTube and similar sites require third party browser plugins such as Flash. |
|
76 |
+ Plugins operate independently from Firefox and can perform |
|
77 |
+ activity on your computer that ruins your anonymity. This includes |
|
78 |
+ but is not limited to: <a href="http://decloak.net">completely disregarding |
|
79 |
+ proxy settings</a>, querying your <a |
|
80 |
+ href="http://forums.sun.com/thread.jspa?threadID=5162138&messageID=9618376">local |
|
81 |
+ IP address</a>, and <a |
|
82 |
+ href="http://epic.org/privacy/cookies/flash.html">storing their own |
|
83 |
+ cookies</a>. It is possible to use a LiveCD solution such as |
|
84 |
+ or <a href="https://amnesia.boum.org/">The (Amnesic) Incognito Live System</a> that creates a |
|
85 |
+ secure, transparent proxy to protect you from proxy bypass, however issues |
|
86 |
+ with local IP address discovery and Flash cookies still remain. </p> |
|
87 |
+ |
|
88 |
+ <p> |
|
89 |
+ |
|
90 |
+ If you are not concerned about being tracked by these sites (and sites that |
|
91 |
+ try to unmask you by pretending to be them), and are unconcerned about your |
|
92 |
+ local censors potentially noticing you visit them, you can enable plugins by |
|
93 |
+ going into the Torbutton Preferences->Security Settings->Dynamic Content |
|
94 |
+ tab and unchecking "Disable plugins during Tor usage" box. If you do this |
|
95 |
+ without Tor VM, The (Amnesic) Incognito Live System or appropriate |
|
96 |
+ firewall rules, we strongly suggest you at least use <a |
|
97 |
+ href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> to <a |
|
98 |
+ href="http://noscript.net/features#contentblocking">block plugins</a>. You do |
|
99 |
+ not need to use the NoScript per-domain permissions if you check the <b>Apply |
|
100 |
+ these restrictions to trusted sites too</b> option under the NoScript Plugins |
|
101 |
+ preference tab. In fact, with this setting you can even have NoScript allow |
|
102 |
+ Javascript globally, but still block all plugins until you click on their |
|
103 |
+ placeholders in a page. We also recommend <a |
|
104 |
+ href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better Privacy</a> |
|
105 |
+ in this case to help you clear your Flash cookies. |
|
106 |
+ |
|
107 |
+ </p> |
|
108 |
+ |
|
109 |
+ <a id="oldtorbutton"></a> |
|
110 |
+ <strong><a class="anchor" href="#oldtorbutton">Torbutton sure seems to do a lot of things, some of which I find |
|
111 |
+ annoying. Can't I just use the old version?</a></strong> |
|
112 |
+ |
|
113 |
+ <p> |
|
114 |
+ |
|
115 |
+ <b>No.</b> Use of the old version, or any other vanilla proxy changer |
|
116 |
+ (including FoxyProxy -- see below) without Torbutton is actively discouraged. |
|
117 |
+ Seriously. Using a vanilla proxy switcher by itself is so insecure that you are |
|
118 |
+ not only just wasting your time, you are also actually endangering yourself. |
|
119 |
+ <b>Simply do not use Tor</b> and you will have the same (and in some cases, |
|
120 |
+ better) security. For more information on the types of attacks you are exposed |
|
121 |
+ to with a "homegrown" solution, please see <a |
|
122 |
+ href="design/index.html#adversary">The Torbutton |
|
123 |
+ Adversary Model</a>, in particular the <a |
|
124 |
+ href="design/index.html#attacks">Adversary |
|
125 |
+ Capabilities - Attacks</a> subsection. If there are any specific Torbutton |
|
126 |
+ behaviors that you do not like, please file a bug on <a |
|
127 |
+ href="https://trac.torproject.org/">the |
|
128 |
+ bug tracker.</a> Most of Torbutton's security features can also be disabled via |
|
129 |
+ its preferences, if you think you have your own protection for those specific |
|
130 |
+ cases. |
|
131 |
+ |
|
132 |
+ </p> |
|
133 |
+ |
|
134 |
+ <a id="weirdstate"></a> |
|
135 |
+ <strong><a class="anchor" href="#weirdstate">My browser is in some weird state where nothing works right!</a></strong> |
|
136 |
+ |
|
137 |
+ <p> |
|
138 |
+ Try to disable Tor by clicking on the button, and then open a new window. If |
|
139 |
+ that doesn't fix the issue, go to the preferences page and hit 'Restore |
|
140 |
+ Defaults'. This should reset the extension and Firefox to a known good |
|
141 |
+ configuration. If you can manage to reproduce whatever issue gets your |
|
142 |
+ Firefox wedged, please file details at <a |
|
143 |
+ href="https://trac.torproject.org/">the bug tracker</a>. |
|
144 |
+ </p> |
|
145 |
+ |
|
146 |
+ <a id="noautocomplete"></a> |
|
147 |
+ <strong><a class="anchor" href="#noautocomplete">When I use Tor, Firefox is no longer filling in logins/search boxes |
|
148 |
+ for me. Why?</a></strong> |
|
149 |
+ |
|
150 |
+ <p> |
|
151 |
+ Currently, this is tied to the "<b>Block history writes during Tor</b>" |
|
152 |
+ setting. If you have enabled that setting, all formfill functionality (both |
|
153 |
+ saving and reading) is disabled. If this bothers you, you can uncheck that |
|
154 |
+ option, but both history and forms will be saved. To prevent history |
|
155 |
+ disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor |
|
156 |
+ history reads if you allow history writing during Tor. |
|
157 |
+ </p> |
|
158 |
+ |
|
159 |
+ <a id="thunderbird"></a> |
|
160 |
+ <strong><a class="anchor" href="#thunderbird">What about Thunderbird support? I see a page, but it is the wrong |
|
161 |
+ version?</a></strong> |
|
162 |
+ |
|
163 |
+ <p> |
|
164 |
+ Torbutton used to support basic proxy switching on Thunderbird back in the 1.0 |
|
165 |
+ days, but that support has been removed because it has not been analyzed for |
|
166 |
+ security. My developer tools page on addons.mozilla.org clearly lists Firefox |
|
167 |
+ support only, so I don't know why they didn't delete that Thunderbird listing. |
|
168 |
+ I am not a Thunderbird user and unfortunately, I don't have time to analyze |
|
169 |
+ the security issues involved with toggling proxy settings in that app. It |
|
170 |
+ likely suffers from similar (but not identical) state and proxy leak issues |
|
171 |
+ with html mail, embedded images, javascript, plugins and automatic network |
|
172 |
+ access. My recommendation is to create a completely separate Thunderbird |
|
173 |
+ profile for your Tor accounts and use that instead of trying to toggle proxy |
|
174 |
+ settings. But if you really like to roll fast and loose with your IP, you |
|
175 |
+ could try another proxy switcher like ProxyButton, SwitchProxy or FoxyProxy |
|
176 |
+ (if any of those happen to support thunderbird). |
|
177 |
+ </p> |
|
178 |
+ |
|
179 |
+ <a id="extensionconflicts"></a> |
|
180 |
+ <strong><a class="anchor" href="#extensionconflicts">Which Firefox extensions should I avoid using?</a></strong> |
|
181 |
+ |
|
182 |
+ <p> |
|
183 |
+ This is a tough one. There are thousands of Firefox extensions: making a |
|
184 |
+ complete list of ones that are bad for anonymity is near impossible. However, |
|
185 |
+ here are a few examples that should get you started as to what sorts of |
|
186 |
+ behavior are dangerous. |
|
187 |
+ </p> |
|
188 |
+ |
|
189 |
+ <ol> |
|
190 |
+ <li>StumbleUpon, et al |
|
191 |
+ <p> |
|
192 |
+ These extensions will send all sorts of information about the websites you |
|
193 |
+ visit to the stumbleupon servers, and correlate this information with a |
|
194 |
+ unique identifier. This is obviously terrible for your anonymity. |
|
195 |
+ More generally, any sort of extension that requires registration, or even |
|
196 |
+ extensions that provide information about websites you visit should be |
|
197 |
+ suspect. |
|
198 |
+ </p></li> |
|
199 |
+ <li>FoxyProxy |
|
200 |
+ <p> |
|
201 |
+ While FoxyProxy is a nice idea in theory, in practice it is impossible to |
|
202 |
+ configure securely for Tor usage without Torbutton. Like all vanilla third |
|
203 |
+ party proxy plugins, the main risks are <a |
|
204 |
+ href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
|
205 |
+ and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
|
206 |
+ disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
|
207 |
+ adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
208 |
+ Model</a> for more information). However, with Torbutton installed in tandem |
|
209 |
+ and always enabled, it is possible to configure FoxyProxy securely (though it |
|
210 |
+ is tricky). Since FoxyProxy's 'Patterns' mode only applies to specific urls, |
|
211 |
+ and not to an entire tab, setting FoxyProxy to only send specific sites |
|
212 |
+ through Tor will still allow adservers (whose hosts don't match your filters) to learn your real IP. Worse, when |
|
213 |
+ sites use offsite logging services such as Google Analytics, you will |
|
214 |
+ still end up in their logs with your real IP. Malicious exit nodes can also |
|
215 |
+ cooperate with sites to inject images into pages that bypass your filters. |
|
216 |
+ Setting FoxyProxy to only send certain URLs via Non-Tor is much more secure in |
|