Browse code

move manpages to docs, move torbutton to docs, update rewrite rules for new paths.

Andrew Lewman authored on 24/04/2014 16:39:20
Showing 1 changed files
1 1
deleted file mode 100644
... ...
@@ -1,43 +0,0 @@
1
-## translation metadata
2
-# Revision: $Revision$
3
-# Translation-Priority: 3-low
4
-
5
-#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8"
6
-<div id="content" class="clearfix">
7
-	<div id="breadcrumbs">
8
-    <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page torbutton/index>">Torbutton &raquo; </a>
10
-    <a href="<page torbutton/torbutton-options>">Torbutton Options</a>
11
-  </div>
12
-	<div id="maincol">  
13
-    <!-- PUT CONTENT AFTER THIS TAG -->
14
-
15
-    <h2>Torbutton</h2>
16
-    <hr>
17
-
18
-    <p>
19
-    Torbutton is the component in <a href="<page projects/torbrowser>">Tor
20
-    Browser Bundle</a> that takes care of application-level
21
-    security and privacy concerns in Firefox.  To keep you safe,
22
-    Torbutton disables many types of active content.
23
-    </p>
24
-  
25
-    <p>
26
-    Now that the <a href="<page projects/torbrowser>">Tor Browser
27
-    Bundle</a> includes a patched version of Firefox, and because we don't
28
-    have enough developer resources to keep up with the accelerated
29
-    Firefox release schedule, the toggle model of Torbutton is <a
30
-    href="https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton">no
31
-    longer supported</a>. <b>Users should be using Tor Browser Bundle,
32
-    not installing Torbutton themselves.</b>
33
-    </p>
34
-    </div>
35
-  <!-- END MAINCOL -->
36
-  <div id = "sidecol">
37
-#include "side.wmi"
38
-#include "info.wmi"
39
-  </div>
40
-  <!-- END SIDECOL -->
41
-</div>
42
-<!-- END CONTENT -->
43
-#include <foot.wmi>       
Browse code

removed torbutton pages, moved 2 questions to general FAQ (#6567)

Moritz Bartl authored on 26/03/2013 05:38:32
Showing 1 changed files
... ...
@@ -11,257 +11,27 @@
11 11
   </div>
12 12
 	<div id="maincol">  
13 13
     <!-- PUT CONTENT AFTER THIS TAG -->
14
-    
15
-    <h2>Torbutton Options</h2>
14
+
15
+    <h2>Torbutton</h2>
16 16
     <hr>
17
-    
18
-    <p>Torbutton 1.2.0 adds several new security features to protect your
19
-    anonymity from all the major threats we know about. The defaults should be
20
-    fine (and safest!) for most people, but in case you are the tweaker type,
21
-    or if you prefer to try to outsource some options to more flexible extensions,
22
-    here is the complete list. (In an ideal world, these descriptions should all be
23
-    tooltips in the extension itself, but Firefox bugs <a
24
-    href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a
25
-    href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently
26
-    prevent this.)</p>
27
-    
28
-    <ul>
29
-     <li>Disable plugins on Tor Usage (crucial)<p> 
30
-    
31
-      This option is key to Tor security. Plugins perform their own networking
32
-    independent of the browser, and many plugins only partially obey even their own
33
-    proxy settings.
34
-    </p></li>
35
-      <li>Isolate Dynamic Content to Tor State (crucial)<p> 
36
-    
37
-      Another crucial option, this setting causes the plugin to disable Javascript
38
-      on tabs that are loaded during a Tor state different than the current one,
39
-      to prevent delayed fetches of injected URLs that contain unique identifiers,
40
-      and to prevent meta-refresh tags from revealing your IP when you turn off
41
-      Tor. It also prevents all fetches from tabs loaded with an opposite Tor
42
-      state. This serves to block non-Javascript dynamic content such as CSS
43
-      popups from revealing your IP address if you disable Tor.
44
-    </p></li>
45
-      <li>Hook Dangerous Javascript (crucial)<p> 
46
-    
47
-    This setting enables the Javascript hooking code. Javascript is injected into
48
-    pages to hook the Date object to mask your timezone, and to hook the navigator
49
-    object to mask OS and user agent properties not handled by the standard
50
-    Firefox user agent override settings.
51
-    </p></li>
52
-      <li>Resize window dimensions to multiples of 50px on toggle (recommended)<p> 
53
-    
54
-    To cut down on the amount of state available to fingerprint users uniquely, 
55
-    this pref causes windows to be resized to a multiple of 50 pixels on each
56
-    side when Tor is enabled and pages are loaded.
57
-    </p></li>
58
-      <li>Disable Updates During Tor (recommended)<p> 
59
-    
60
-    Under Firefox 2, many extension authors did not update their extensions from 
61
-    SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to 
62
-    existing extensions. Since Firefox 3 now enforces encrypted and/or
63
-    authenticated updates, this setting is no longer as important as it once
64
-    was (though updates do leak information about which extensions you have, it is
65
-    fairly infrequent).
66
-    </p></li>
67
-      <li>Disable Search Suggestions during Tor (optional)<p> 
68
-    
69
-    This optional setting governs if you get Google search suggestions during Tor
70
-    usage. Since no cookie is transmitted during search suggestions, this is a
71
-    relatively benign behavior.
72
-    </p></li>
73
-      <li>Block Livemarks updates during Tor usage (recommended)<p> 
74
-    
75
-    This setting causes Torbutton to disable your <a
76
-    href="http://www.mozilla.com/firefox/livebookmarks.html">Live bookmark</a>
77
-    updates. Since most people use Live bookmarks for RSS feeds from their blog,
78
-    their friends' blogs, the wikipedia page they edit, and other such things,
79
-    these updates probably should not happen over Tor. This feature takes effect
80
-    in Firefox 3.5 and above only.
81
-    
82
-    </p></li>
83
-      <li>Block Tor/Non-Tor access to network from file:// urls (recommended)<p> 
84
-    
85
-    These settings prevent local html documents from transmitting local files to
86
-    arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that
87
-    force the browser to save arbitrary pages locally (and also inject script into
88
-    arbitrary html files you save to disk via Tor), it is probably a good idea to
89
-    leave this setting on.
90
-    </p></li>
91
-      <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)<p> 
92
-    
93
-    These two settings allow you to obtain a greater degree of assurance that
94
-    after you toggle out of Tor, the pages are really gone and can't perform any
95
-    extra network activity. Currently, there is no known way that pages can still
96
-    perform activity after toggle, but these options exist as a backup measure
97
-    just in case a flaw is discovered. They can also serve as a handy 'Boss
98
-    Button' feature for clearing all Tor browsing off your screen in a hurry.
99
-    </p></li>
100
-      <li>Isolate access to history navigation to Tor state (crucial)<p> 
101
-    
102
-    This setting prevents both Javascript and accidental user clicks from causing
103
-    the session history to load pages that were fetched in a different Tor state
104
-    than the current one. Since this can be used to correlate Tor and Non-Tor
105
-    activity and thus determine your IP address, it is marked as a crucial 
106
-    setting.
107
-    </p></li>
108
-      <li>Block History Reads during Tor (crucial)<p> 
109
-    
110
-      Based on code contributed by <a href="http://www.collinjackson.com/">Collin
111
-      Jackson</a>, when enabled and Tor is enabled, this setting prevents the
112
-    rendering engine from knowing if certain links were visited.  This mechanism
113
-    defeats all document-based history disclosure attacks, including CSS-only
114
-    attacks.
115
-    </p></li>
116
-      <li>Block History Reads during Non-Tor (recommended)<p> 
117
-    
118
-      This setting accomplishes the same but for your Non-Tor activity.
119
-    </p></li>
120
-      <li>Block History Writes during Tor (recommended)<p> 
121
-    
122
-      This setting prevents the rendering engine from recording visited URLs, and
123
-    also disables download manager history. Note that if you allow writing of Tor history,
124
-    it is recommended that you disable non-Tor history reads, since malicious
125
-    websites you visit without Tor can query your history for .onion sites and
126
-    other history recorded during Tor usage (such as Google queries).
127
-    </p></li>
128
-      <li>Block History Writes during Non-Tor (optional)<p> 
129
-    
130
-    This setting also disables recording any history information during Non-Tor
131
-    usage.
132
-    </p></li>
133
-    <li>Clear History During Tor Toggle (optional)<p> 
134
-    
135
-      This is an alternate setting to use instead of (or in addition to) blocking
136
-    history reads or writes.
137
-    </p></li>
138
-      <li>Block Password+Form saving during Tor/Non-Tor<p> 
139
-    
140
-      These options govern if the browser writes your passwords and search
141
-      submissions to disk for the given state.
142
-    </p></li>
143
-      <li>Block Tor disk cache and clear all cache on Tor Toggle<p> 
144
-    
145
-      Since the browser cache can be leveraged to store unique identifiers, cache
146
-    must not persist across Tor sessions. This option keeps the memory cache active
147
-    during Tor usage for performance, but blocks disk access for caching.
148
-    </p></li>
149
-      <li>Block disk and memory cache during Tor<p> 
150
-    
151
-      This setting entirely blocks the cache during Tor, but preserves it for
152
-    Non-Tor usage.
153
-    </p></li>
154
-      <li>Clear Cookies on Tor Toggle<p> 
155
-    
156
-      Fully clears all cookies on Tor toggle.
157
-    </p></li>
158
-      <li>Store Non-Tor cookies in a protected jar<p> 
159
-    
160
-      This option stores your persistent Non-Tor cookies in a special cookie jar
161
-      file, in case you wish to preserve some cookies. Based on code contributed
162
-      by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is
163
-      compatible with third party extensions that you use to manage your Non-Tor
164
-      cookies. Your Tor cookies will be cleared on toggle, of course.
165
-    </p></li>
166
-      <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)<p> 
167
-    
168
-      This option stores your persistent Tor and Non-Tor cookies 
169
-      separate cookie jar files. Note that it is a bad idea to keep Tor
170
-      cookies around for any length of time, as they can be retrieved by exit
171
-      nodes that inject spoofed forms into plaintext pages you fetch.
172
-    </p></li>
173
-      <li>Manage My Own Cookies (dangerous)<p> 
174
-    
175
-      This setting allows you to manage your own cookies with an alternate
176
-    extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous,
177
-    since malicious exit nodes can spoof document elements that appear to be from
178
-    sites you have preserved cookies for (and can then do things like fetch your
179
-    entire gmail inbox, even if you were not using gmail or visiting any google
180
-    pages at the time!).
181
-    </p></li>
182
-      <li>Do not write Tor/Non-Tor cookies to disk<p> 
183
-    
184
-      These settings prevent Firefox from writing any cookies to disk during the
185
-      corresponding Tor state. If cookie jars are enabled, those jars will
186
-      exist in memory only, and will be cleared when Firefox exits.
187
-    </p></li>
188
-      <li>Disable DOM Storage during Tor usage (crucial)<p> 
189
-    
190
-      Firefox has recently added the ability to store additional state and
191
-      identifiers in persistent tables, called <a
192
-      href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>.
193
-      Obviously this can compromise your anonymity if stored content can be
194
-      fetched across Tor-state.
195
-    </p></li>
196
-      <li>Clear HTTP auth sessions (recommended)<p> 
197
-    
198
-      HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. 
199
-    </p></li>
200
-      <li>Clear cookies on Tor/Non-Tor shutdown<p> 
201
-    
202
-      These settings install a shutdown handler to clear cookies on Tor
203
-    and/or Non-Tor browser shutdown. It is independent of your Clear Private Data
204
-    settings, and does in fact clear the corresponding cookie jars.
205
-    </p></li>
206
-      <li>Prevent session store from saving Tor-loaded tabs (recommended)<p> 
207
-    
208
-      This option augments the session store to prevent it from writing out
209
-      Tor-loaded tabs to disk. Unfortunately, this also disables your ability to 
210
-      undo closed tabs. The reason why this setting is recommended is because
211
-      after a session crash, your browser will be in an undefined Tor state, and
212
-      can potentially load a bunch of Tor tabs without Tor. The following option
213
-      is another alternative to protect against this.
214
-    </p></li>
215
-      <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State<p> 
216
-    
217
-      This setting allows you to choose which Tor state you want the browser to
218
-      start in normally: Tor, Non-Tor, or whatever state the browser shut down in.
219
-    </p></li>
220
-      <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor<p> 
221
-    
222
-      When Firefox crashes, the Tor state upon restart usually is completely
223
-      random, and depending on your choice for the above option, may load 
224
-      a bunch of tabs in the wrong state. This setting allows you to choose
225
-      which state the crashed session should always be restored in to.
226
-    </p></li>
227
-      <li>Prevent session store from saving Non-Tor/Tor-loaded tabs<p> 
228
-    
229
-      These two settings allow you to control what the Firefox Session Store
230
-      writes to disk. Since the session store state is used to automatically
231
-      load websites after a crash or upgrade, it is advisable not to allow
232
-      Tor tabs to be written to disk, or they may get loaded in Non-Tor
233
-      after a crash (or the reverse, depending upon the crash recovery setting, 
234
-      of course).
235
-    </p></li>
236
-      <li>Set user agent during Tor usage (crucial)<p> 
237
-    
238
-      User agent masking is done with the idea of making all Tor users appear
239
-    uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this
240
-    string and supporting navigator.* properties, and this version will remain the
241
-    same for all TorButton versions until such time as specific incompatibility
242
-    issues are demonstrated. Uniformity of this value is obviously very important
243
-    to anonymity. Note that for this option to have full effectiveness, the user
244
-    must also allow Hook Dangerous Javascript ensure that the navigator.*
245
-    properties are reset correctly.  The browser does not set some of them via the
246
-    exposed user agent override preferences.
247
-    </p></li>
248
-      <li>Spoof US English Browser<p> 
249
-    
250
-    This option causes Firefox to send http headers as if it were an English
251
-    browser. Useful for internationalized users.
252
-    </p></li>
253
-      <li>Don't send referrer during Tor Usage<p> 
254
-    
255
-    This option disables the referrer header, preventing sites from determining
256
-    where you came from to visit them. This can break some sites, however. <a
257
-    href="http://www.digg.com">Digg</a> in particular seemed to be broken by this.
258
-    A more streamlined, less intrusive version of this option should be available
259
-    eventually. In the meantime, <a
260
-    href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can
261
-    provide this functionality via a default option of <b>Forge</b>.
262
-    </p></li>
263
-    </ul>
264
-  </div>
17
+
18
+    <p>
19
+    Torbutton is the component in <a href="<page projects/torbrowser>">Tor
20
+    Browser Bundle</a> that takes care of application-level
21
+    security and privacy concerns in Firefox.  To keep you safe,
22
+    Torbutton disables many types of active content.
23
+    </p>
24
+  
25
+    <p>
26
+    Now that the <a href="<page projects/torbrowser>">Tor Browser
27
+    Bundle</a> includes a patched version of Firefox, and because we don't
28
+    have enough developer resources to keep up with the accelerated
29
+    Firefox release schedule, the toggle model of Torbutton is <a
30
+    href="https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton">no
31
+    longer supported</a>. <b>Users should be using Tor Browser Bundle,
32
+    not installing Torbutton themselves.</b>
33
+    </p>
34
+    </div>
265 35
   <!-- END MAINCOL -->
266 36
   <div id = "sidecol">
267 37
 #include "side.wmi"
Browse code

Remove the ANNOUNCE_RSS hack as per ticket 4951

Sebastian Hahn authored on 25/01/2012 00:54:07
Showing 1 changed files
... ...
@@ -2,7 +2,7 @@
2 2
 # Revision: $Revision$
3 3
 # Translation-Priority: 3-low
4 4
 
5
-#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
5
+#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8"
6 6
 <div id="content" class="clearfix">
7 7
 	<div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
Browse code

fix page titles en masse, add a TBB blurb to the torbutton-faq

Andrew Lewman authored on 28/10/2010 19:55:23
Showing 1 changed files
... ...
@@ -2,7 +2,7 @@
2 2
 # Revision: $Revision$
3 3
 # Translation-Priority: 3-low
4 4
 
5
-#include "head.wmi" TITLE="Tor Project: Projects Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
5
+#include "head.wmi" TITLE="Tor Project: Torbutton Options" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
6 6
 <div id="content" class="clearfix">
7 7
 	<div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
Browse code

looks like we never set the keywords either

Roger Dingledine authored on 27/10/2010 12:31:57
Showing 1 changed files
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Revision: $Revision: 0 $
2
+# Revision: $Revision$
3 3
 # Translation-Priority: 3-low
4 4
 
5 5
 #include "head.wmi" TITLE="Tor Project: Projects Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
Browse code

We decided to go with HTML in favor of XHTML.

Sebastian Hahn authored on 10/10/2010 03:34:47
Showing 1 changed files
... ...
@@ -13,7 +13,7 @@
13 13
     <!-- PUT CONTENT AFTER THIS TAG -->
14 14
     
15 15
     <h2>Torbutton Options</h2>
16
-    <hr />
16
+    <hr>
17 17
     
18 18
     <p>Torbutton 1.2.0 adds several new security features to protect your
19 19
     anonymity from all the major threats we know about. The defaults should be
Browse code

torbutton section builds clean.

Andrew Lewman authored on 07/10/2010 22:56:38
Showing 1 changed files
... ...
@@ -6,7 +6,7 @@
6 6
 <div id="content" class="clearfix">
7 7
 	<div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page torbutton/torbutton>">Torbutton &raquo; </a>
9
+    <a href="<page torbutton/index>">Torbutton &raquo; </a>
10 10
     <a href="<page torbutton/torbutton-options>">Torbutton Options</a>
11 11
   </div>
12 12
 	<div id="maincol">  
Browse code

fix links to torbutton section.

Andrew Lewman authored on 07/10/2010 22:37:20
Showing 1 changed files
... ...
@@ -6,8 +6,8 @@
6 6
 <div id="content" class="clearfix">
7 7
 	<div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page torbutton>">TorButton &raquo; </a>
10
-    <a href="<page torbutton/torbutton-options>">TorButton Options</a>
9
+    <a href="<page torbutton/torbutton>">Torbutton &raquo; </a>
10
+    <a href="<page torbutton/torbutton-options>">Torbutton Options</a>
11 11
   </div>
12 12
 	<div id="maincol">  
13 13
     <!-- PUT CONTENT AFTER THIS TAG -->
Browse code

fix links to trac, and the nav headers.

Andrew Lewman authored on 18/08/2010 14:14:15
Showing 1 changed files
... ...
@@ -6,9 +6,8 @@
6 6
 <div id="content" class="clearfix">
7 7
 	<div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page projects/projects>">Projects &raquo; </a>
10
-    <a href="<page projects/torbutton>">TorButton &raquo; </a>
11
-    <a href="<page projects/torbutton-options>">TorButton Options</a>
9
+    <a href="<page torbutton>">TorButton &raquo; </a>
10
+    <a href="<page torbutton/torbutton-options>">TorButton Options</a>
12 11
   </div>
13 12
 	<div id="maincol">  
14 13
     <!-- PUT CONTENT AFTER THIS TAG -->
Browse code

move torbutton back to a main path rather than buried in projects, update versions.wmi to be current, update the mirrors table, need a better blurb in info.wmi.

Andrew Lewman authored on 18/08/2010 14:06:31
Showing 1 changed files
1 1
new file mode 100644
... ...
@@ -0,0 +1,274 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Tor Project: Projects Overview" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
6
+<div id="content" class="clearfix">
7
+	<div id="breadcrumbs">
8
+    <a href="<page index>">Home &raquo; </a>
9
+    <a href="<page projects/projects>">Projects &raquo; </a>
10
+    <a href="<page projects/torbutton>">TorButton &raquo; </a>
11
+    <a href="<page projects/torbutton-options>">TorButton Options</a>
12
+  </div>
13
+	<div id="maincol">  
14
+    <!-- PUT CONTENT AFTER THIS TAG -->
15
+    
16
+    <h2>Torbutton Options</h2>
17
+    <hr />
18
+    
19
+    <p>Torbutton 1.2.0 adds several new security features to protect your
20
+    anonymity from all the major threats we know about. The defaults should be
21
+    fine (and safest!) for most people, but in case you are the tweaker type,
22
+    or if you prefer to try to outsource some options to more flexible extensions,
23
+    here is the complete list. (In an ideal world, these descriptions should all be
24
+    tooltips in the extension itself, but Firefox bugs <a
25
+    href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a
26
+    href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently
27
+    prevent this.)</p>
28
+    
29
+    <ul>
30
+     <li>Disable plugins on Tor Usage (crucial)<p> 
31
+    
32
+      This option is key to Tor security. Plugins perform their own networking
33
+    independent of the browser, and many plugins only partially obey even their own
34
+    proxy settings.
35
+    </p></li>
36
+      <li>Isolate Dynamic Content to Tor State (crucial)<p> 
37
+    
38
+      Another crucial option, this setting causes the plugin to disable Javascript
39
+      on tabs that are loaded during a Tor state different than the current one,
40
+      to prevent delayed fetches of injected URLs that contain unique identifiers,
41
+      and to prevent meta-refresh tags from revealing your IP when you turn off
42
+      Tor. It also prevents all fetches from tabs loaded with an opposite Tor
43
+      state. This serves to block non-Javascript dynamic content such as CSS
44
+      popups from revealing your IP address if you disable Tor.
45
+    </p></li>
46
+      <li>Hook Dangerous Javascript (crucial)<p> 
47
+    
48
+    This setting enables the Javascript hooking code. Javascript is injected into
49
+    pages to hook the Date object to mask your timezone, and to hook the navigator
50
+    object to mask OS and user agent properties not handled by the standard
51
+    Firefox user agent override settings.
52
+    </p></li>
53
+      <li>Resize window dimensions to multiples of 50px on toggle (recommended)<p> 
54
+    
55
+    To cut down on the amount of state available to fingerprint users uniquely, 
56
+    this pref causes windows to be resized to a multiple of 50 pixels on each
57
+    side when Tor is enabled and pages are loaded.
58
+    </p></li>
59
+      <li>Disable Updates During Tor (recommended)<p> 
60
+    
61
+    Under Firefox 2, many extension authors did not update their extensions from 
62
+    SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to 
63
+    existing extensions. Since Firefox 3 now enforces encrypted and/or
64
+    authenticated updates, this setting is no longer as important as it once
65
+    was (though updates do leak information about which extensions you have, it is
66
+    fairly infrequent).
67
+    </p></li>
68
+      <li>Disable Search Suggestions during Tor (optional)<p> 
69
+    
70
+    This optional setting governs if you get Google search suggestions during Tor
71
+    usage. Since no cookie is transmitted during search suggestions, this is a
72
+    relatively benign behavior.
73
+    </p></li>
74
+      <li>Block Livemarks updates during Tor usage (recommended)<p> 
75
+    
76
+    This setting causes Torbutton to disable your <a
77
+    href="http://www.mozilla.com/firefox/livebookmarks.html">Live bookmark</a>
78
+    updates. Since most people use Live bookmarks for RSS feeds from their blog,
79
+    their friends' blogs, the wikipedia page they edit, and other such things,
80
+    these updates probably should not happen over Tor. This feature takes effect
81
+    in Firefox 3.5 and above only.
82
+    
83
+    </p></li>
84
+      <li>Block Tor/Non-Tor access to network from file:// urls (recommended)<p> 
85
+    
86
+    These settings prevent local html documents from transmitting local files to
87
+    arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that
88
+    force the browser to save arbitrary pages locally (and also inject script into
89
+    arbitrary html files you save to disk via Tor), it is probably a good idea to
90
+    leave this setting on.
91
+    </p></li>
92
+      <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)<p> 
93
+    
94
+    These two settings allow you to obtain a greater degree of assurance that
95
+    after you toggle out of Tor, the pages are really gone and can't perform any
96
+    extra network activity. Currently, there is no known way that pages can still
97
+    perform activity after toggle, but these options exist as a backup measure
98
+    just in case a flaw is discovered. They can also serve as a handy 'Boss
99
+    Button' feature for clearing all Tor browsing off your screen in a hurry.
100
+    </p></li>
101
+      <li>Isolate access to history navigation to Tor state (crucial)<p> 
102
+    
103
+    This setting prevents both Javascript and accidental user clicks from causing
104
+    the session history to load pages that were fetched in a different Tor state
105
+    than the current one. Since this can be used to correlate Tor and Non-Tor
106
+    activity and thus determine your IP address, it is marked as a crucial 
107
+    setting.
108
+    </p></li>
109
+      <li>Block History Reads during Tor (crucial)<p> 
110
+    
111
+      Based on code contributed by <a href="http://www.collinjackson.com/">Collin
112
+      Jackson</a>, when enabled and Tor is enabled, this setting prevents the
113
+    rendering engine from knowing if certain links were visited.  This mechanism
114
+    defeats all document-based history disclosure attacks, including CSS-only
115
+    attacks.
116
+    </p></li>
117
+      <li>Block History Reads during Non-Tor (recommended)<p> 
118
+    
119
+      This setting accomplishes the same but for your Non-Tor activity.
120
+    </p></li>
121
+      <li>Block History Writes during Tor (recommended)<p> 
122
+    
123
+      This setting prevents the rendering engine from recording visited URLs, and
124
+    also disables download manager history. Note that if you allow writing of Tor history,
125
+    it is recommended that you disable non-Tor history reads, since malicious
126
+    websites you visit without Tor can query your history for .onion sites and
127
+    other history recorded during Tor usage (such as Google queries).
128
+    </p></li>
129
+      <li>Block History Writes during Non-Tor (optional)<p> 
130
+    
131
+    This setting also disables recording any history information during Non-Tor
132
+    usage.
133
+    </p></li>
134
+    <li>Clear History During Tor Toggle (optional)<p> 
135
+    
136
+      This is an alternate setting to use instead of (or in addition to) blocking
137
+    history reads or writes.
138
+    </p></li>
139
+      <li>Block Password+Form saving during Tor/Non-Tor<p> 
140
+    
141
+      These options govern if the browser writes your passwords and search
142
+      submissions to disk for the given state.
143
+    </p></li>
144
+      <li>Block Tor disk cache and clear all cache on Tor Toggle<p> 
145
+    
146
+      Since the browser cache can be leveraged to store unique identifiers, cache
147
+    must not persist across Tor sessions. This option keeps the memory cache active
148
+    during Tor usage for performance, but blocks disk access for caching.
149
+    </p></li>
150
+      <li>Block disk and memory cache during Tor<p> 
151
+    
152
+      This setting entirely blocks the cache during Tor, but preserves it for
153
+    Non-Tor usage.
154
+    </p></li>
155
+      <li>Clear Cookies on Tor Toggle<p> 
156
+    
157
+      Fully clears all cookies on Tor toggle.
158
+    </p></li>
159
+      <li>Store Non-Tor cookies in a protected jar<p> 
160
+    
161
+      This option stores your persistent Non-Tor cookies in a special cookie jar
162
+      file, in case you wish to preserve some cookies. Based on code contributed
163
+      by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is
164
+      compatible with third party extensions that you use to manage your Non-Tor
165
+      cookies. Your Tor cookies will be cleared on toggle, of course.
166
+    </p></li>
167
+      <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)<p> 
168
+    
169
+      This option stores your persistent Tor and Non-Tor cookies 
170
+      separate cookie jar files. Note that it is a bad idea to keep Tor
171
+      cookies around for any length of time, as they can be retrieved by exit
172
+      nodes that inject spoofed forms into plaintext pages you fetch.
173
+    </p></li>
174
+      <li>Manage My Own Cookies (dangerous)<p> 
175
+    
176
+      This setting allows you to manage your own cookies with an alternate
177
+    extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous,
178
+    since malicious exit nodes can spoof document elements that appear to be from
179
+    sites you have preserved cookies for (and can then do things like fetch your
180
+    entire gmail inbox, even if you were not using gmail or visiting any google
181
+    pages at the time!).
182
+    </p></li>
183
+      <li>Do not write Tor/Non-Tor cookies to disk<p> 
184
+    
185
+      These settings prevent Firefox from writing any cookies to disk during the
186
+      corresponding Tor state. If cookie jars are enabled, those jars will
187
+      exist in memory only, and will be cleared when Firefox exits.
188
+    </p></li>
189
+      <li>Disable DOM Storage during Tor usage (crucial)<p> 
190
+    
191
+      Firefox has recently added the ability to store additional state and
192
+      identifiers in persistent tables, called <a
193
+      href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>.
194
+      Obviously this can compromise your anonymity if stored content can be
195
+      fetched across Tor-state.
196
+    </p></li>
197
+      <li>Clear HTTP auth sessions (recommended)<p> 
198
+    
199
+      HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. 
200
+    </p></li>
201
+      <li>Clear cookies on Tor/Non-Tor shutdown<p> 
202
+    
203
+      These settings install a shutdown handler to clear cookies on Tor
204
+    and/or Non-Tor browser shutdown. It is independent of your Clear Private Data
205
+    settings, and does in fact clear the corresponding cookie jars.
206
+    </p></li>
207
+      <li>Prevent session store from saving Tor-loaded tabs (recommended)<p> 
208
+    
209
+      This option augments the session store to prevent it from writing out
210
+      Tor-loaded tabs to disk. Unfortunately, this also disables your ability to 
211
+      undo closed tabs. The reason why this setting is recommended is because
212
+      after a session crash, your browser will be in an undefined Tor state, and
213
+      can potentially load a bunch of Tor tabs without Tor. The following option
214
+      is another alternative to protect against this.
215
+    </p></li>
216
+      <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State<p> 
217
+    
218
+      This setting allows you to choose which Tor state you want the browser to
219
+      start in normally: Tor, Non-Tor, or whatever state the browser shut down in.
220
+    </p></li>
221
+      <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor<p> 
222
+    
223
+      When Firefox crashes, the Tor state upon restart usually is completely
224
+      random, and depending on your choice for the above option, may load 
225
+      a bunch of tabs in the wrong state. This setting allows you to choose
226
+      which state the crashed session should always be restored in to.
227
+    </p></li>
228
+      <li>Prevent session store from saving Non-Tor/Tor-loaded tabs<p> 
229
+    
230
+      These two settings allow you to control what the Firefox Session Store
231
+      writes to disk. Since the session store state is used to automatically
232
+      load websites after a crash or upgrade, it is advisable not to allow
233
+      Tor tabs to be written to disk, or they may get loaded in Non-Tor
234
+      after a crash (or the reverse, depending upon the crash recovery setting, 
235
+      of course).
236
+    </p></li>
237
+      <li>Set user agent during Tor usage (crucial)<p> 
238
+    
239
+      User agent masking is done with the idea of making all Tor users appear
240
+    uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this
241
+    string and supporting navigator.* properties, and this version will remain the
242
+    same for all TorButton versions until such time as specific incompatibility
243
+    issues are demonstrated. Uniformity of this value is obviously very important
244
+    to anonymity. Note that for this option to have full effectiveness, the user
245
+    must also allow Hook Dangerous Javascript ensure that the navigator.*
246
+    properties are reset correctly.  The browser does not set some of them via the
247
+    exposed user agent override preferences.
248
+    </p></li>
249
+      <li>Spoof US English Browser<p> 
250
+    
251
+    This option causes Firefox to send http headers as if it were an English
252
+    browser. Useful for internationalized users.
253
+    </p></li>
254
+      <li>Don't send referrer during Tor Usage<p> 
255
+    
256
+    This option disables the referrer header, preventing sites from determining
257
+    where you came from to visit them. This can break some sites, however. <a
258
+    href="http://www.digg.com">Digg</a> in particular seemed to be broken by this.
259
+    A more streamlined, less intrusive version of this option should be available
260
+    eventually. In the meantime, <a
261
+    href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can
262
+    provide this functionality via a default option of <b>Forge</b>.
263
+    </p></li>
264
+    </ul>
265
+  </div>
266
+  <!-- END MAINCOL -->
267
+  <div id = "sidecol">
268
+#include "side.wmi"
269
+#include "info.wmi"
270
+  </div>
271
+  <!-- END SIDECOL -->
272
+</div>
273
+<!-- END CONTENT -->
274
+#include <foot.wmi>