1 | 1 |
deleted file mode 100644 |
... | ... |
@@ -1,43 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
-# Translation-Priority: 3-low |
|
4 |
- |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8" |
|
6 |
-<div id="content" class="clearfix"> |
|
7 |
- <div id="breadcrumbs"> |
|
8 |
- <a href="<page index>">Home » </a> |
|
9 |
- <a href="<page torbutton/index>">Torbutton » </a> |
|
10 |
- <a href="<page torbutton/torbutton-options>">Torbutton Options</a> |
|
11 |
- </div> |
|
12 |
- <div id="maincol"> |
|
13 |
- <!-- PUT CONTENT AFTER THIS TAG --> |
|
14 |
- |
|
15 |
- <h2>Torbutton</h2> |
|
16 |
- <hr> |
|
17 |
- |
|
18 |
- <p> |
|
19 |
- Torbutton is the component in <a href="<page projects/torbrowser>">Tor |
|
20 |
- Browser Bundle</a> that takes care of application-level |
|
21 |
- security and privacy concerns in Firefox. To keep you safe, |
|
22 |
- Torbutton disables many types of active content. |
|
23 |
- </p> |
|
24 |
- |
|
25 |
- <p> |
|
26 |
- Now that the <a href="<page projects/torbrowser>">Tor Browser |
|
27 |
- Bundle</a> includes a patched version of Firefox, and because we don't |
|
28 |
- have enough developer resources to keep up with the accelerated |
|
29 |
- Firefox release schedule, the toggle model of Torbutton is <a |
|
30 |
- href="https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton">no |
|
31 |
- longer supported</a>. <b>Users should be using Tor Browser Bundle, |
|
32 |
- not installing Torbutton themselves.</b> |
|
33 |
- </p> |
|
34 |
- </div> |
|
35 |
- <!-- END MAINCOL --> |
|
36 |
- <div id = "sidecol"> |
|
37 |
-#include "side.wmi" |
|
38 |
-#include "info.wmi" |
|
39 |
- </div> |
|
40 |
- <!-- END SIDECOL --> |
|
41 |
-</div> |
|
42 |
-<!-- END CONTENT --> |
|
43 |
-#include <foot.wmi> |
... | ... |
@@ -11,257 +11,27 @@ |
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
13 | 13 |
<!-- PUT CONTENT AFTER THIS TAG --> |
14 |
- |
|
15 |
- <h2>Torbutton Options</h2> |
|
14 |
+ |
|
15 |
+ <h2>Torbutton</h2> |
|
16 | 16 |
<hr> |
17 |
- |
|
18 |
- <p>Torbutton 1.2.0 adds several new security features to protect your |
|
19 |
- anonymity from all the major threats we know about. The defaults should be |
|
20 |
- fine (and safest!) for most people, but in case you are the tweaker type, |
|
21 |
- or if you prefer to try to outsource some options to more flexible extensions, |
|
22 |
- here is the complete list. (In an ideal world, these descriptions should all be |
|
23 |
- tooltips in the extension itself, but Firefox bugs <a |
|
24 |
- href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a |
|
25 |
- href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently |
|
26 |
- prevent this.)</p> |
|
27 |
- |
|
28 |
- <ul> |
|
29 |
- <li>Disable plugins on Tor Usage (crucial)<p> |
|
30 |
- |
|
31 |
- This option is key to Tor security. Plugins perform their own networking |
|
32 |
- independent of the browser, and many plugins only partially obey even their own |
|
33 |
- proxy settings. |
|
34 |
- </p></li> |
|
35 |
- <li>Isolate Dynamic Content to Tor State (crucial)<p> |
|
36 |
- |
|
37 |
- Another crucial option, this setting causes the plugin to disable Javascript |
|
38 |
- on tabs that are loaded during a Tor state different than the current one, |
|
39 |
- to prevent delayed fetches of injected URLs that contain unique identifiers, |
|
40 |
- and to prevent meta-refresh tags from revealing your IP when you turn off |
|
41 |
- Tor. It also prevents all fetches from tabs loaded with an opposite Tor |
|
42 |
- state. This serves to block non-Javascript dynamic content such as CSS |
|
43 |
- popups from revealing your IP address if you disable Tor. |
|
44 |
- </p></li> |
|
45 |
- <li>Hook Dangerous Javascript (crucial)<p> |
|
46 |
- |
|
47 |
- This setting enables the Javascript hooking code. Javascript is injected into |
|
48 |
- pages to hook the Date object to mask your timezone, and to hook the navigator |
|
49 |
- object to mask OS and user agent properties not handled by the standard |
|
50 |
- Firefox user agent override settings. |
|
51 |
- </p></li> |
|
52 |
- <li>Resize window dimensions to multiples of 50px on toggle (recommended)<p> |
|
53 |
- |
|
54 |
- To cut down on the amount of state available to fingerprint users uniquely, |
|
55 |
- this pref causes windows to be resized to a multiple of 50 pixels on each |
|
56 |
- side when Tor is enabled and pages are loaded. |
|
57 |
- </p></li> |
|
58 |
- <li>Disable Updates During Tor (recommended)<p> |
|
59 |
- |
|
60 |
- Under Firefox 2, many extension authors did not update their extensions from |
|
61 |
- SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to |
|
62 |
- existing extensions. Since Firefox 3 now enforces encrypted and/or |
|
63 |
- authenticated updates, this setting is no longer as important as it once |
|
64 |
- was (though updates do leak information about which extensions you have, it is |
|
65 |
- fairly infrequent). |
|
66 |
- </p></li> |
|
67 |
- <li>Disable Search Suggestions during Tor (optional)<p> |
|
68 |
- |
|
69 |
- This optional setting governs if you get Google search suggestions during Tor |
|
70 |
- usage. Since no cookie is transmitted during search suggestions, this is a |
|
71 |
- relatively benign behavior. |
|
72 |
- </p></li> |
|
73 |
- <li>Block Livemarks updates during Tor usage (recommended)<p> |
|
74 |
- |
|
75 |
- This setting causes Torbutton to disable your <a |
|
76 |
- href="http://www.mozilla.com/firefox/livebookmarks.html">Live bookmark</a> |
|
77 |
- updates. Since most people use Live bookmarks for RSS feeds from their blog, |
|
78 |
- their friends' blogs, the wikipedia page they edit, and other such things, |
|
79 |
- these updates probably should not happen over Tor. This feature takes effect |
|
80 |
- in Firefox 3.5 and above only. |
|
81 |
- |
|
82 |
- </p></li> |
|
83 |
- <li>Block Tor/Non-Tor access to network from file:// urls (recommended)<p> |
|
84 |
- |
|
85 |
- These settings prevent local html documents from transmitting local files to |
|
86 |
- arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that |
|
87 |
- force the browser to save arbitrary pages locally (and also inject script into |
|
88 |
- arbitrary html files you save to disk via Tor), it is probably a good idea to |
|
89 |
- leave this setting on. |
|
90 |
- </p></li> |
|
91 |
- <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)<p> |
|
92 |
- |
|
93 |
- These two settings allow you to obtain a greater degree of assurance that |
|
94 |
- after you toggle out of Tor, the pages are really gone and can't perform any |
|
95 |
- extra network activity. Currently, there is no known way that pages can still |
|
96 |
- perform activity after toggle, but these options exist as a backup measure |
|
97 |
- just in case a flaw is discovered. They can also serve as a handy 'Boss |
|
98 |
- Button' feature for clearing all Tor browsing off your screen in a hurry. |
|
99 |
- </p></li> |
|
100 |
- <li>Isolate access to history navigation to Tor state (crucial)<p> |
|
101 |
- |
|
102 |
- This setting prevents both Javascript and accidental user clicks from causing |
|
103 |
- the session history to load pages that were fetched in a different Tor state |
|
104 |
- than the current one. Since this can be used to correlate Tor and Non-Tor |
|
105 |
- activity and thus determine your IP address, it is marked as a crucial |
|
106 |
- setting. |
|
107 |
- </p></li> |
|
108 |
- <li>Block History Reads during Tor (crucial)<p> |
|
109 |
- |
|
110 |
- Based on code contributed by <a href="http://www.collinjackson.com/">Collin |
|
111 |
- Jackson</a>, when enabled and Tor is enabled, this setting prevents the |
|
112 |
- rendering engine from knowing if certain links were visited. This mechanism |
|
113 |
- defeats all document-based history disclosure attacks, including CSS-only |
|
114 |
- attacks. |
|
115 |
- </p></li> |
|
116 |
- <li>Block History Reads during Non-Tor (recommended)<p> |
|
117 |
- |
|
118 |
- This setting accomplishes the same but for your Non-Tor activity. |
|
119 |
- </p></li> |
|
120 |
- <li>Block History Writes during Tor (recommended)<p> |
|
121 |
- |
|
122 |
- This setting prevents the rendering engine from recording visited URLs, and |
|
123 |
- also disables download manager history. Note that if you allow writing of Tor history, |
|
124 |
- it is recommended that you disable non-Tor history reads, since malicious |
|
125 |
- websites you visit without Tor can query your history for .onion sites and |
|
126 |
- other history recorded during Tor usage (such as Google queries). |
|
127 |
- </p></li> |
|
128 |
- <li>Block History Writes during Non-Tor (optional)<p> |
|
129 |
- |
|
130 |
- This setting also disables recording any history information during Non-Tor |
|
131 |
- usage. |
|
132 |
- </p></li> |
|
133 |
- <li>Clear History During Tor Toggle (optional)<p> |
|
134 |
- |
|
135 |
- This is an alternate setting to use instead of (or in addition to) blocking |
|
136 |
- history reads or writes. |
|
137 |
- </p></li> |
|
138 |
- <li>Block Password+Form saving during Tor/Non-Tor<p> |
|
139 |
- |
|
140 |
- These options govern if the browser writes your passwords and search |
|
141 |
- submissions to disk for the given state. |
|
142 |
- </p></li> |
|
143 |
- <li>Block Tor disk cache and clear all cache on Tor Toggle<p> |
|
144 |
- |
|
145 |
- Since the browser cache can be leveraged to store unique identifiers, cache |
|
146 |
- must not persist across Tor sessions. This option keeps the memory cache active |
|
147 |
- during Tor usage for performance, but blocks disk access for caching. |
|
148 |
- </p></li> |
|
149 |
- <li>Block disk and memory cache during Tor<p> |
|
150 |
- |
|
151 |
- This setting entirely blocks the cache during Tor, but preserves it for |
|
152 |
- Non-Tor usage. |
|
153 |
- </p></li> |
|
154 |
- <li>Clear Cookies on Tor Toggle<p> |
|
155 |
- |
|
156 |
- Fully clears all cookies on Tor toggle. |
|
157 |
- </p></li> |
|
158 |
- <li>Store Non-Tor cookies in a protected jar<p> |
|
159 |
- |
|
160 |
- This option stores your persistent Non-Tor cookies in a special cookie jar |
|
161 |
- file, in case you wish to preserve some cookies. Based on code contributed |
|
162 |
- by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is |
|
163 |
- compatible with third party extensions that you use to manage your Non-Tor |
|
164 |
- cookies. Your Tor cookies will be cleared on toggle, of course. |
|
165 |
- </p></li> |
|
166 |
- <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)<p> |
|
167 |
- |
|
168 |
- This option stores your persistent Tor and Non-Tor cookies |
|
169 |
- separate cookie jar files. Note that it is a bad idea to keep Tor |
|
170 |
- cookies around for any length of time, as they can be retrieved by exit |
|
171 |
- nodes that inject spoofed forms into plaintext pages you fetch. |
|
172 |
- </p></li> |
|
173 |
- <li>Manage My Own Cookies (dangerous)<p> |
|
174 |
- |
|
175 |
- This setting allows you to manage your own cookies with an alternate |
|
176 |
- extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous, |
|
177 |
- since malicious exit nodes can spoof document elements that appear to be from |
|
178 |
- sites you have preserved cookies for (and can then do things like fetch your |
|
179 |
- entire gmail inbox, even if you were not using gmail or visiting any google |
|
180 |
- pages at the time!). |
|
181 |
- </p></li> |
|
182 |
- <li>Do not write Tor/Non-Tor cookies to disk<p> |
|
183 |
- |
|
184 |
- These settings prevent Firefox from writing any cookies to disk during the |
|
185 |
- corresponding Tor state. If cookie jars are enabled, those jars will |
|
186 |
- exist in memory only, and will be cleared when Firefox exits. |
|
187 |
- </p></li> |
|
188 |
- <li>Disable DOM Storage during Tor usage (crucial)<p> |
|
189 |
- |
|
190 |
- Firefox has recently added the ability to store additional state and |
|
191 |
- identifiers in persistent tables, called <a |
|
192 |
- href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>. |
|
193 |
- Obviously this can compromise your anonymity if stored content can be |
|
194 |
- fetched across Tor-state. |
|
195 |
- </p></li> |
|
196 |
- <li>Clear HTTP auth sessions (recommended)<p> |
|
197 |
- |
|
198 |
- HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. |
|
199 |
- </p></li> |
|
200 |
- <li>Clear cookies on Tor/Non-Tor shutdown<p> |
|
201 |
- |
|
202 |
- These settings install a shutdown handler to clear cookies on Tor |
|
203 |
- and/or Non-Tor browser shutdown. It is independent of your Clear Private Data |
|
204 |
- settings, and does in fact clear the corresponding cookie jars. |
|
205 |
- </p></li> |
|
206 |
- <li>Prevent session store from saving Tor-loaded tabs (recommended)<p> |
|
207 |
- |
|
208 |
- This option augments the session store to prevent it from writing out |
|
209 |
- Tor-loaded tabs to disk. Unfortunately, this also disables your ability to |
|
210 |
- undo closed tabs. The reason why this setting is recommended is because |
|
211 |
- after a session crash, your browser will be in an undefined Tor state, and |
|
212 |
- can potentially load a bunch of Tor tabs without Tor. The following option |
|
213 |
- is another alternative to protect against this. |
|
214 |
- </p></li> |
|
215 |
- <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State<p> |
|
216 |
- |
|
217 |
- This setting allows you to choose which Tor state you want the browser to |
|
218 |
- start in normally: Tor, Non-Tor, or whatever state the browser shut down in. |
|
219 |
- </p></li> |
|
220 |
- <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor<p> |
|
221 |
- |
|
222 |
- When Firefox crashes, the Tor state upon restart usually is completely |
|
223 |
- random, and depending on your choice for the above option, may load |
|
224 |
- a bunch of tabs in the wrong state. This setting allows you to choose |
|
225 |
- which state the crashed session should always be restored in to. |
|
226 |
- </p></li> |
|
227 |
- <li>Prevent session store from saving Non-Tor/Tor-loaded tabs<p> |
|
228 |
- |
|
229 |
- These two settings allow you to control what the Firefox Session Store |
|
230 |
- writes to disk. Since the session store state is used to automatically |
|
231 |
- load websites after a crash or upgrade, it is advisable not to allow |
|
232 |
- Tor tabs to be written to disk, or they may get loaded in Non-Tor |
|
233 |
- after a crash (or the reverse, depending upon the crash recovery setting, |
|
234 |
- of course). |
|
235 |
- </p></li> |
|
236 |
- <li>Set user agent during Tor usage (crucial)<p> |
|
237 |
- |
|
238 |
- User agent masking is done with the idea of making all Tor users appear |
|
239 |
- uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this |
|
240 |
- string and supporting navigator.* properties, and this version will remain the |
|
241 |
- same for all TorButton versions until such time as specific incompatibility |
|
242 |
- issues are demonstrated. Uniformity of this value is obviously very important |
|
243 |
- to anonymity. Note that for this option to have full effectiveness, the user |
|
244 |
- must also allow Hook Dangerous Javascript ensure that the navigator.* |
|
245 |
- properties are reset correctly. The browser does not set some of them via the |
|
246 |
- exposed user agent override preferences. |
|
247 |
- </p></li> |
|
248 |
- <li>Spoof US English Browser<p> |
|
249 |
- |
|
250 |
- This option causes Firefox to send http headers as if it were an English |
|
251 |
- browser. Useful for internationalized users. |
|
252 |
- </p></li> |
|
253 |
- <li>Don't send referrer during Tor Usage<p> |
|
254 |
- |
|
255 |
- This option disables the referrer header, preventing sites from determining |
|
256 |
- where you came from to visit them. This can break some sites, however. <a |
|
257 |
- href="http://www.digg.com">Digg</a> in particular seemed to be broken by this. |
|
258 |
- A more streamlined, less intrusive version of this option should be available |
|
259 |
- eventually. In the meantime, <a |
|
260 |
- href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can |
|
261 |
- provide this functionality via a default option of <b>Forge</b>. |
|
262 |
- </p></li> |
|
263 |
- </ul> |
|
264 |
- </div> |
|
17 |
+ |
|
18 |
+ <p> |
|
19 |
+ Torbutton is the component in <a href="<page projects/torbrowser>">Tor |
|
20 |
+ Browser Bundle</a> that takes care of application-level |
|
21 |
+ security and privacy concerns in Firefox. To keep you safe, |
|
22 |
+ Torbutton disables many types of active content. |
|
23 |
+ </p> |
|
24 |
+ |
|
25 |
+ <p> |
|
26 |
+ Now that the <a href="<page projects/torbrowser>">Tor Browser |
|
27 |
+ Bundle</a> includes a patched version of Firefox, and because we don't |
|
28 |
+ have enough developer resources to keep up with the accelerated |
|
29 |
+ Firefox release schedule, the toggle model of Torbutton is <a |
|
30 |
+ href="https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton">no |
|
31 |
+ longer supported</a>. <b>Users should be using Tor Browser Bundle, |
|
32 |
+ not installing Torbutton themselves.</b> |
|
33 |
+ </p> |
|
34 |
+ </div> |
|
265 | 35 |
<!-- END MAINCOL --> |
266 | 36 |
<div id = "sidecol"> |
267 | 37 |
#include "side.wmi" |
... | ... |
@@ -2,7 +2,7 @@ |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
# Translation-Priority: 3-low |
4 | 4 |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
5 |
+#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8" |
|
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
... | ... |
@@ -2,7 +2,7 @@ |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
# Translation-Priority: 3-low |
4 | 4 |
|
5 |
-#include "head.wmi" TITLE="Tor Project: Projects Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
5 |
+#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
... | ... |
@@ -6,7 +6,7 @@ |
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
9 |
- <a href="<page torbutton/torbutton>">Torbutton » </a> |
|
9 |
+ <a href="<page torbutton/index>">Torbutton » </a> |
|
10 | 10 |
<a href="<page torbutton/torbutton-options>">Torbutton Options</a> |
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
... | ... |
@@ -6,8 +6,8 @@ |
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
9 |
- <a href="<page torbutton>">TorButton » </a> |
|
10 |
- <a href="<page torbutton/torbutton-options>">TorButton Options</a> |
|
9 |
+ <a href="<page torbutton/torbutton>">Torbutton » </a> |
|
10 |
+ <a href="<page torbutton/torbutton-options>">Torbutton Options</a> |
|
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
13 | 13 |
<!-- PUT CONTENT AFTER THIS TAG --> |
... | ... |
@@ -6,9 +6,8 @@ |
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
9 |
- <a href="<page projects/projects>">Projects » </a> |
|
10 |
- <a href="<page projects/torbutton>">TorButton » </a> |
|
11 |
- <a href="<page projects/torbutton-options>">TorButton Options</a> |
|
9 |
+ <a href="<page torbutton>">TorButton » </a> |
|
10 |
+ <a href="<page torbutton/torbutton-options>">TorButton Options</a> |
|
12 | 11 |
</div> |
13 | 12 |
<div id="maincol"> |
14 | 13 |
<!-- PUT CONTENT AFTER THIS TAG --> |
1 | 1 |
new file mode 100644 |
... | ... |
@@ -0,0 +1,274 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision: 0 $ |
|
3 |
+# Translation-Priority: 3-low |
|
4 |
+ |
|
5 |
+#include "head.wmi" TITLE="Tor Project: Projects Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
6 |
+<div id="content" class="clearfix"> |
|
7 |
+ <div id="breadcrumbs"> |
|
8 |
+ <a href="<page index>">Home » </a> |
|
9 |
+ <a href="<page projects/projects>">Projects » </a> |
|
10 |
+ <a href="<page projects/torbutton>">TorButton » </a> |
|
11 |
+ <a href="<page projects/torbutton-options>">TorButton Options</a> |
|
12 |
+ </div> |
|
13 |
+ <div id="maincol"> |
|
14 |
+ <!-- PUT CONTENT AFTER THIS TAG --> |
|
15 |
+ |
|
16 |
+ <h2>Torbutton Options</h2> |
|
17 |
+ <hr /> |
|
18 |
+ |
|
19 |
+ <p>Torbutton 1.2.0 adds several new security features to protect your |
|
20 |
+ anonymity from all the major threats we know about. The defaults should be |
|
21 |
+ fine (and safest!) for most people, but in case you are the tweaker type, |
|
22 |
+ or if you prefer to try to outsource some options to more flexible extensions, |
|
23 |
+ here is the complete list. (In an ideal world, these descriptions should all be |
|
24 |
+ tooltips in the extension itself, but Firefox bugs <a |
|
25 |
+ href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a |
|
26 |
+ href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently |
|
27 |
+ prevent this.)</p> |
|
28 |
+ |
|
29 |
+ <ul> |
|
30 |
+ <li>Disable plugins on Tor Usage (crucial)<p> |
|
31 |
+ |
|
32 |
+ This option is key to Tor security. Plugins perform their own networking |
|
33 |
+ independent of the browser, and many plugins only partially obey even their own |
|
34 |
+ proxy settings. |
|
35 |
+ </p></li> |
|
36 |
+ <li>Isolate Dynamic Content to Tor State (crucial)<p> |
|
37 |
+ |
|
38 |
+ Another crucial option, this setting causes the plugin to disable Javascript |
|
39 |
+ on tabs that are loaded during a Tor state different than the current one, |
|
40 |
+ to prevent delayed fetches of injected URLs that contain unique identifiers, |
|
41 |
+ and to prevent meta-refresh tags from revealing your IP when you turn off |
|
42 |
+ Tor. It also prevents all fetches from tabs loaded with an opposite Tor |
|
43 |
+ state. This serves to block non-Javascript dynamic content such as CSS |
|
44 |
+ popups from revealing your IP address if you disable Tor. |
|
45 |
+ </p></li> |
|
46 |
+ <li>Hook Dangerous Javascript (crucial)<p> |
|
47 |
+ |
|
48 |
+ This setting enables the Javascript hooking code. Javascript is injected into |
|
49 |
+ pages to hook the Date object to mask your timezone, and to hook the navigator |
|
50 |
+ object to mask OS and user agent properties not handled by the standard |
|
51 |
+ Firefox user agent override settings. |
|
52 |
+ </p></li> |
|
53 |
+ <li>Resize window dimensions to multiples of 50px on toggle (recommended)<p> |
|
54 |
+ |
|
55 |
+ To cut down on the amount of state available to fingerprint users uniquely, |
|
56 |
+ this pref causes windows to be resized to a multiple of 50 pixels on each |
|
57 |
+ side when Tor is enabled and pages are loaded. |
|
58 |
+ </p></li> |
|
59 |
+ <li>Disable Updates During Tor (recommended)<p> |
|
60 |
+ |
|
61 |
+ Under Firefox 2, many extension authors did not update their extensions from |
|
62 |
+ SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to |
|
63 |
+ existing extensions. Since Firefox 3 now enforces encrypted and/or |
|
64 |
+ authenticated updates, this setting is no longer as important as it once |
|
65 |
+ was (though updates do leak information about which extensions you have, it is |
|
66 |
+ fairly infrequent). |
|
67 |
+ </p></li> |
|
68 |
+ <li>Disable Search Suggestions during Tor (optional)<p> |
|
69 |
+ |
|
70 |
+ This optional setting governs if you get Google search suggestions during Tor |
|
71 |
+ usage. Since no cookie is transmitted during search suggestions, this is a |
|
72 |
+ relatively benign behavior. |
|
73 |
+ </p></li> |
|
74 |
+ <li>Block Livemarks updates during Tor usage (recommended)<p> |
|
75 |
+ |
|
76 |
+ This setting causes Torbutton to disable your <a |
|
77 |
+ href="http://www.mozilla.com/firefox/livebookmarks.html">Live bookmark</a> |
|
78 |
+ updates. Since most people use Live bookmarks for RSS feeds from their blog, |
|
79 |
+ their friends' blogs, the wikipedia page they edit, and other such things, |
|
80 |
+ these updates probably should not happen over Tor. This feature takes effect |
|
81 |
+ in Firefox 3.5 and above only. |
|
82 |
+ |
|
83 |
+ </p></li> |
|
84 |
+ <li>Block Tor/Non-Tor access to network from file:// urls (recommended)<p> |
|
85 |
+ |
|
86 |
+ These settings prevent local html documents from transmitting local files to |
|
87 |
+ arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that |
|
88 |
+ force the browser to save arbitrary pages locally (and also inject script into |
|
89 |
+ arbitrary html files you save to disk via Tor), it is probably a good idea to |
|
90 |
+ leave this setting on. |
|
91 |
+ </p></li> |
|
92 |
+ <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)<p> |
|
93 |
+ |
|
94 |
+ These two settings allow you to obtain a greater degree of assurance that |
|
95 |
+ after you toggle out of Tor, the pages are really gone and can't perform any |
|
96 |
+ extra network activity. Currently, there is no known way that pages can still |
|
97 |
+ perform activity after toggle, but these options exist as a backup measure |
|
98 |
+ just in case a flaw is discovered. They can also serve as a handy 'Boss |
|
99 |
+ Button' feature for clearing all Tor browsing off your screen in a hurry. |
|
100 |
+ </p></li> |
|
101 |
+ <li>Isolate access to history navigation to Tor state (crucial)<p> |
|
102 |
+ |
|
103 |
+ This setting prevents both Javascript and accidental user clicks from causing |
|
104 |
+ the session history to load pages that were fetched in a different Tor state |
|
105 |
+ than the current one. Since this can be used to correlate Tor and Non-Tor |
|
106 |
+ activity and thus determine your IP address, it is marked as a crucial |
|
107 |
+ setting. |
|
108 |
+ </p></li> |
|
109 |
+ <li>Block History Reads during Tor (crucial)<p> |
|
110 |
+ |
|
111 |
+ Based on code contributed by <a href="http://www.collinjackson.com/">Collin |
|
112 |
+ Jackson</a>, when enabled and Tor is enabled, this setting prevents the |
|
113 |
+ rendering engine from knowing if certain links were visited. This mechanism |
|
114 |
+ defeats all document-based history disclosure attacks, including CSS-only |
|
115 |
+ attacks. |
|
116 |
+ </p></li> |
|
117 |
+ <li>Block History Reads during Non-Tor (recommended)<p> |
|
118 |
+ |
|
119 |
+ This setting accomplishes the same but for your Non-Tor activity. |
|
120 |
+ </p></li> |
|
121 |
+ <li>Block History Writes during Tor (recommended)<p> |
|
122 |
+ |
|
123 |
+ This setting prevents the rendering engine from recording visited URLs, and |
|
124 |
+ also disables download manager history. Note that if you allow writing of Tor history, |
|
125 |
+ it is recommended that you disable non-Tor history reads, since malicious |
|
126 |
+ websites you visit without Tor can query your history for .onion sites and |
|
127 |
+ other history recorded during Tor usage (such as Google queries). |
|
128 |
+ </p></li> |
|
129 |
+ <li>Block History Writes during Non-Tor (optional)<p> |
|
130 |
+ |
|
131 |
+ This setting also disables recording any history information during Non-Tor |
|
132 |
+ usage. |
|
133 |
+ </p></li> |
|
134 |
+ <li>Clear History During Tor Toggle (optional)<p> |
|
135 |
+ |
|
136 |
+ This is an alternate setting to use instead of (or in addition to) blocking |
|
137 |
+ history reads or writes. |
|
138 |
+ </p></li> |
|
139 |
+ <li>Block Password+Form saving during Tor/Non-Tor<p> |
|
140 |
+ |
|
141 |
+ These options govern if the browser writes your passwords and search |
|
142 |
+ submissions to disk for the given state. |
|
143 |
+ </p></li> |
|
144 |
+ <li>Block Tor disk cache and clear all cache on Tor Toggle<p> |
|
145 |
+ |
|
146 |
+ Since the browser cache can be leveraged to store unique identifiers, cache |
|
147 |
+ must not persist across Tor sessions. This option keeps the memory cache active |
|
148 |
+ during Tor usage for performance, but blocks disk access for caching. |
|
149 |
+ </p></li> |
|
150 |
+ <li>Block disk and memory cache during Tor<p> |
|
151 |
+ |
|
152 |
+ This setting entirely blocks the cache during Tor, but preserves it for |
|
153 |
+ Non-Tor usage. |
|
154 |
+ </p></li> |
|
155 |
+ <li>Clear Cookies on Tor Toggle<p> |
|
156 |
+ |
|
157 |
+ Fully clears all cookies on Tor toggle. |
|
158 |
+ </p></li> |
|
159 |
+ <li>Store Non-Tor cookies in a protected jar<p> |
|
160 |
+ |
|
161 |
+ This option stores your persistent Non-Tor cookies in a special cookie jar |
|
162 |
+ file, in case you wish to preserve some cookies. Based on code contributed |
|
163 |
+ by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is |
|
164 |
+ compatible with third party extensions that you use to manage your Non-Tor |
|
165 |
+ cookies. Your Tor cookies will be cleared on toggle, of course. |
|
166 |
+ </p></li> |
|
167 |
+ <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)<p> |
|
168 |
+ |
|
169 |
+ This option stores your persistent Tor and Non-Tor cookies |
|
170 |
+ separate cookie jar files. Note that it is a bad idea to keep Tor |
|
171 |
+ cookies around for any length of time, as they can be retrieved by exit |
|
172 |
+ nodes that inject spoofed forms into plaintext pages you fetch. |
|
173 |
+ </p></li> |
|
174 |
+ <li>Manage My Own Cookies (dangerous)<p> |
|
175 |
+ |
|
176 |
+ This setting allows you to manage your own cookies with an alternate |
|
177 |
+ extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous, |
|
178 |
+ since malicious exit nodes can spoof document elements that appear to be from |
|
179 |
+ sites you have preserved cookies for (and can then do things like fetch your |
|
180 |
+ entire gmail inbox, even if you were not using gmail or visiting any google |
|
181 |
+ pages at the time!). |
|
182 |
+ </p></li> |
|
183 |
+ <li>Do not write Tor/Non-Tor cookies to disk<p> |
|
184 |
+ |
|
185 |
+ These settings prevent Firefox from writing any cookies to disk during the |
|
186 |
+ corresponding Tor state. If cookie jars are enabled, those jars will |
|
187 |
+ exist in memory only, and will be cleared when Firefox exits. |
|
188 |
+ </p></li> |
|
189 |
+ <li>Disable DOM Storage during Tor usage (crucial)<p> |
|
190 |
+ |
|
191 |
+ Firefox has recently added the ability to store additional state and |
|
192 |
+ identifiers in persistent tables, called <a |
|
193 |
+ href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>. |
|
194 |
+ Obviously this can compromise your anonymity if stored content can be |
|
195 |
+ fetched across Tor-state. |
|
196 |
+ </p></li> |
|
197 |
+ <li>Clear HTTP auth sessions (recommended)<p> |
|
198 |
+ |
|
199 |
+ HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. |
|
200 |
+ </p></li> |
|
201 |
+ <li>Clear cookies on Tor/Non-Tor shutdown<p> |
|
202 |
+ |
|
203 |
+ These settings install a shutdown handler to clear cookies on Tor |
|
204 |
+ and/or Non-Tor browser shutdown. It is independent of your Clear Private Data |
|
205 |
+ settings, and does in fact clear the corresponding cookie jars. |
|
206 |
+ </p></li> |
|
207 |
+ <li>Prevent session store from saving Tor-loaded tabs (recommended)<p> |
|
208 |
+ |
|
209 |
+ This option augments the session store to prevent it from writing out |
|
210 |
+ Tor-loaded tabs to disk. Unfortunately, this also disables your ability to |
|
211 |
+ undo closed tabs. The reason why this setting is recommended is because |
|
212 |
+ after a session crash, your browser will be in an undefined Tor state, and |
|
213 |
+ can potentially load a bunch of Tor tabs without Tor. The following option |
|
214 |
+ is another alternative to protect against this. |
|
215 |
+ </p></li> |
|
216 |
+ <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State<p> |
|
217 |
+ |
|
218 |
+ This setting allows you to choose which Tor state you want the browser to |
|
219 |
+ start in normally: Tor, Non-Tor, or whatever state the browser shut down in. |
|
220 |
+ </p></li> |
|
221 |
+ <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor<p> |
|
222 |
+ |
|
223 |
+ When Firefox crashes, the Tor state upon restart usually is completely |
|
224 |
+ random, and depending on your choice for the above option, may load |
|
225 |
+ a bunch of tabs in the wrong state. This setting allows you to choose |
|
226 |
+ which state the crashed session should always be restored in to. |
|
227 |
+ </p></li> |
|
228 |
+ <li>Prevent session store from saving Non-Tor/Tor-loaded tabs<p> |
|
229 |
+ |
|
230 |
+ These two settings allow you to control what the Firefox Session Store |
|
231 |
+ writes to disk. Since the session store state is used to automatically |
|
232 |
+ load websites after a crash or upgrade, it is advisable not to allow |
|
233 |
+ Tor tabs to be written to disk, or they may get loaded in Non-Tor |
|
234 |
+ after a crash (or the reverse, depending upon the crash recovery setting, |
|
235 |
+ of course). |
|
236 |
+ </p></li> |
|
237 |
+ <li>Set user agent during Tor usage (crucial)<p> |
|
238 |
+ |
|
239 |
+ User agent masking is done with the idea of making all Tor users appear |
|
240 |
+ uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this |
|
241 |
+ string and supporting navigator.* properties, and this version will remain the |
|
242 |
+ same for all TorButton versions until such time as specific incompatibility |
|
243 |
+ issues are demonstrated. Uniformity of this value is obviously very important |
|
244 |
+ to anonymity. Note that for this option to have full effectiveness, the user |
|
245 |
+ must also allow Hook Dangerous Javascript ensure that the navigator.* |
|
246 |
+ properties are reset correctly. The browser does not set some of them via the |
|
247 |
+ exposed user agent override preferences. |
|
248 |
+ </p></li> |
|
249 |
+ <li>Spoof US English Browser<p> |
|
250 |
+ |
|
251 |
+ This option causes Firefox to send http headers as if it were an English |
|
252 |
+ browser. Useful for internationalized users. |
|
253 |
+ </p></li> |
|
254 |
+ <li>Don't send referrer during Tor Usage<p> |
|
255 |
+ |
|
256 |
+ This option disables the referrer header, preventing sites from determining |
|
257 |
+ where you came from to visit them. This can break some sites, however. <a |
|
258 |
+ href="http://www.digg.com">Digg</a> in particular seemed to be broken by this. |
|
259 |
+ A more streamlined, less intrusive version of this option should be available |
|
260 |
+ eventually. In the meantime, <a |
|
261 |
+ href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can |
|
262 |
+ provide this functionality via a default option of <b>Forge</b>. |
|
263 |
+ </p></li> |
|
264 |
+ </ul> |
|
265 |
+ </div> |
|
266 |
+ <!-- END MAINCOL --> |
|
267 |
+ <div id = "sidecol"> |
|
268 |
+#include "side.wmi" |
|
269 |
+#include "info.wmi" |
|
270 |
+ </div> |
|
271 |
+ <!-- END SIDECOL --> |
|
272 |
+</div> |
|
273 |
+<!-- END CONTENT --> |
|
274 |
+#include <foot.wmi> |