[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r9767: moved warnings to top of the fold, added link to lynx (website/trunk/en)



Author: shava
Date: 2007-03-08 07:26:41 -0500 (Thu, 08 Mar 2007)
New Revision: 9767

Modified:
   website/trunk/en/download.wml
Log:
moved warnings to top of the fold, added link to lynx

Modified: website/trunk/en/download.wml
===================================================================
--- website/trunk/en/download.wml	2007-03-08 12:01:21 UTC (rev 9766)
+++ website/trunk/en/download.wml	2007-03-08 12:26:41 UTC (rev 9767)
@@ -16,6 +16,68 @@
 href="<page donate>">making a donation to the Tor project</a>.
 </p>
 
+<a id="Warning"></a>
+<h4><a class="anchor" href="#Warning">Warning:  Want Tor to really work?</a></h4>
+
+# Translators: you might not want to translate this section quite
+# yet, since it's likely to change a lot before we like it. -RD
+
+<p>...then please don't just install it and go on.  You need to change some of your habits, and reconfigure your software!</p>
+
+<p>Tor by itself is <b>NOT</b> all you need to maintain your anonymity.
+There are several major pitfalls to watch out for.
+</p>
+
+<p>First, Tor only protects Internet applications that are configured to
+send their traffic through Tor &mdash; it doesn't magically anonymize
+all your traffic just because you install it.  We recommend you
+use <a href="http://www.mozilla.org/firefox";>Firefox</a> with the <a
+href="https://addons.mozilla.org/firefox/2275/";>Torbutton</a> extension.
+<!-- , and follow <a href="comingsoon">other recommendations for other
+supported applications</a>. -->
+</p>
+
+<p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer,
+Quicktime, Adobe's PDF plugin, and others can be manipulated
+into revealing your IP address. We recommend the <a
+href="https://addons.mozilla.org/firefox/1237/";>QuickJava</a> and <a
+href="https://addons.mozilla.org/firefox/433/";>FlashBlock</a> extensions,
+and you should probably uninstall other <a href="about:plugins">plugins</a>
+in general.  YOu may want to have a browser configured with plug-ins, and another browser stripped down for use with Tor, to be able to use plug-ins when anonymity is not important, and use no plug-ins when you use Tor.  You may even want to use a text browser, such as <a href="http://lynx.browser.org/";>lynx</a> when you are using Tor.
+<!-- You may also find
+<a href="https://addons.mozilla.org/firefox/722/";>NoScript</a> and <a
+href="https://addons.mozilla.org/firefox/1865/";>AdBlock</a> helpful. -->
+</p>
+
+<p>Third, beware of cookies: if you ever browse without Tor and Privoxy
+and a site gives you a cookie, that cookie could identify you even when
+you start using Tor again. You should clear your cookies frequently. <a
+href="https://addons.mozilla.org/firefox/82/";>CookieCuller</a> can help
+protect any cookies you do not want to lose.
+</p>
+
+<p>Fourth, Tor anonymizes the origin of your traffic,
+and it encrypts everything inside the Tor network, but <a
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers";>it
+can't encrypt your traffic between the Tor network and its final
+destination.</a>
+If you are communicating sensitive information, you should use as much
+care as you would on the normal scary Internet &mdash; use SSL or other
+end-to-end encryption and authentication. Also, while Tor blocks attackers
+on your local network from discovering or influencing your destination,
+it opens new risks: malicious or misconfigured Tor exit nodes can send
+you the wrong page, or even send you embedded Java applets disguised as
+domains you trust.
+</p>
+
+<p>Last, be smart and learn more. Understand what Tor offers and what
+it doesn't offer. This list of pitfalls isn't complete, and we need your
+help <a href="<page volunteer>#Documentation">identifying and documenting
+all the issues</a>.
+</p>
+
+
+
 <p>The latest stable release is <b><version-stable></b>, and the
 latest development release is <b><version-alpha></b>.</p>
 
@@ -107,64 +169,7 @@
 
 <br />
 
-<a id="Warning"></a>
-<h2><a class="anchor" href="#Warning">Warning</a></h2>
-
-# Translators: you might not want to translate this section quite
-# yet, since it's likely to change a lot before we like it. -RD
-
-<p>Tor by itself is <b>NOT</b> all you need to maintain your anonymity.
-There are several major pitfalls to watch out for.
-</p>
-
-<p>First, Tor only protects applications that are configured to
-send their traffic through Tor &mdash; it doesn't magically anonymize
-all your traffic just because you install it.  We recommend you
-use <a href="http://www.mozilla.org/firefox";>Firefox</a> with the <a
-href="https://addons.mozilla.org/firefox/2275/";>Torbutton</a> extension.
-<!-- , and follow <a href="comingsoon">other recommendations for other
-supported applications</a>. -->
-</p>
-
-<p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer,
-Quicktime, Adobe's PDF plugin, and others can be manipulated
-into revealing your IP address. We recommend the <a
-href="https://addons.mozilla.org/firefox/1237/";>QuickJava</a> and <a
-href="https://addons.mozilla.org/firefox/433/";>FlashBlock</a> extensions,
-and you should probably uninstall other <a href="about:plugins">plugins</a>
-in general.
-<!-- You may also find
-<a href="https://addons.mozilla.org/firefox/722/";>NoScript</a> and <a
-href="https://addons.mozilla.org/firefox/1865/";>AdBlock</a> helpful. -->
-</p>
-
-<p>Third, beware of cookies: if you ever browse without Tor and Privoxy
-and a site gives you a cookie, that cookie could identify you even when
-you start using Tor again. You should clear your cookies frequently. <a
-href="https://addons.mozilla.org/firefox/82/";>CookieCuller</a> can help
-protect any cookies you do not want to lose.
-</p>
-
-<p>Fourth, Tor anonymizes the origin of your traffic,
-and it encrypts everything inside the Tor network, but <a
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers";>it
-can't encrypt your traffic between the Tor network and its final
-destination.</a>
-If you are communicating sensitive information, you should use as much
-care as you would on the normal scary Internet &mdash; use SSL or other
-end-to-end encryption and authentication. Also, while Tor blocks attackers
-on your local network from discovering or influencing your destination,
-it opens new risks: malicious or misconfigured Tor exit nodes can send
-you the wrong page, or even send you embedded Java applets disguised as
-domains you trust.
-</p>
-
-<p>Last, be smart and learn more. Understand what Tor offers and what
-it doesn't offer. This list of pitfalls isn't complete, and we need your
-help <a href="<page volunteer>#Documentation">identifying and documenting
-all the issues</a>.
-</p>
-
+ds
 <h2>More Information</h2>
 
 <ul>