[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [community/master] rewrite external links as internal
commit dd10af8ecad408d24caf357c6d0d8264ecd489af
Author: dunnousername <dunno@xxxxxxxxxxx>
Date: Sun May 23 01:02:37 2021 +0000
rewrite external links as internal
---
content/onion-services/advanced/client-auth/contents.lr | 2 +-
content/onion-services/advanced/dos/contents.lr | 2 +-
content/onion-services/advanced/https/contents.lr | 2 +-
content/onion-services/advanced/opsec/contents.lr | 2 +-
content/onion-services/setup/contents.lr | 8 ++++----
content/onion-services/talk/contents.lr | 8 ++++----
content/outreach/meetup/contents.lr | 4 ++--
content/relay/community-resources/tor-exit-guidelines/contents.lr | 2 +-
.../relay/community-resources/tor-relay-universities/contents.lr | 2 +-
content/relay/setup/bridge/centos-rhel-opensuse/contents.lr | 4 ++--
content/relay/setup/bridge/debian-ubuntu/contents.lr | 4 ++--
content/relay/setup/bridge/docker/contents.lr | 4 ++--
content/relay/setup/bridge/dragonflybsd/contents.lr | 4 ++--
content/relay/setup/bridge/fedora/contents.lr | 4 ++--
content/relay/setup/bridge/freebsd/contents.lr | 4 ++--
content/relay/setup/bridge/netbsd/contents.lr | 2 +-
content/relay/setup/bridge/openbsd/contents.lr | 4 ++--
content/relay/setup/bridge/windows/contents.lr | 2 +-
content/training/checklist/contents.lr | 6 +++---
content/training/risks/contents.lr | 2 +-
content/user-research/how-to-volunteer/contents.lr | 6 +++---
content/user-research/open/contents.lr | 2 +-
22 files changed, 40 insertions(+), 40 deletions(-)
diff --git a/content/onion-services/advanced/client-auth/contents.lr b/content/onion-services/advanced/client-auth/contents.lr
index 24cb573..14f80c9 100644
--- a/content/onion-services/advanced/client-auth/contents.lr
+++ b/content/onion-services/advanced/client-auth/contents.lr
@@ -28,7 +28,7 @@ If no authorization is configured, the service will be accessible to anyone with
### Service side
-To configure client authorization on the service side, the `<HiddenServiceDir>/authorized_clients/` directory needs to exist. Following the instructions described in the section [Setup](https://community.torproject.org/onion-services/setup/) will automatically create this directory.
+To configure client authorization on the service side, the `<HiddenServiceDir>/authorized_clients/` directory needs to exist. Following the instructions described in the section [Setup](../../setup/) will automatically create this directory.
Client authorization will only be enabled for the service if tor successfully loads at least one authorization file.
For now, you need to create the keys yourself with a script (like these written in [Bash](https://gist.github.com/mtigas/9c2386adf65345be34045dace134140b), [Rust](https://github.com/haxxpop/torkeygen) or [Python](https://github.com/pastly/python-snippits/blob/master/src/tor/x25519-gen.py)) or manually.
diff --git a/content/onion-services/advanced/dos/contents.lr b/content/onion-services/advanced/dos/contents.lr
index 297e88b..1cfb8bb 100644
--- a/content/onion-services/advanced/dos/contents.lr
+++ b/content/onion-services/advanced/dos/contents.lr
@@ -32,7 +32,7 @@ Onionbalance is available for [v3 onion services](https://blog.torproject.org/co
If you have users you trust, give them dedicated onion service and client authorization credentials so that it can always be available.
For users you don't trust, split them into multiple addresses.
-That said, having too many onion addresses is actually bad for your security (because of the use of many guard nodes), so try to use [client authorization](https://community.torproject.org/onion-services/advanced/client-auth) when possible.
+That said, having too many onion addresses is actually bad for your security (because of the use of many guard nodes), so try to use [client authorization](../client-auth) when possible.
### Captchas and cookies
diff --git a/content/onion-services/advanced/https/contents.lr b/content/onion-services/advanced/https/contents.lr
index c49fd7a..c3523d0 100644
--- a/content/onion-services/advanced/https/contents.lr
+++ b/content/onion-services/advanced/https/contents.lr
@@ -31,7 +31,7 @@ We compiled some topics and arguments, so you can analyze what's the best for yo
1. As anyone can generate an onion address and its 56 random alphanumeric characters, some enterprise onions believe that associating their onion site to an HTTPS certificate might be a solution to announce their service to users.
Users would need to click and do a manual verification, and that would show that they're visiting the onion site that they're expecting.
-Alternatively, websites can provide other ways to verify their onion address using HTTPS, for example, linking their onion site address from an HTTPS-authenticated page, or using [Onion-Location](https://community.torproject.org/onion-services/advanced/onion-location/).
+Alternatively, websites can provide other ways to verify their onion address using HTTPS, for example, linking their onion site address from an HTTPS-authenticated page, or using [Onion-Location](../onion-location/).
2. Another topic of this discussion is user expectations and modern browsers.
While there is extensive criticism regarding HTTPS and the CA trust model, the information security community has taught users to look for HTTPS when visiting a website as a synonym of secure connection and avoid HTTP connections.
diff --git a/content/onion-services/advanced/opsec/contents.lr b/content/onion-services/advanced/opsec/contents.lr
index 6debce0..5120d12 100644
--- a/content/onion-services/advanced/opsec/contents.lr
+++ b/content/onion-services/advanced/opsec/contents.lr
@@ -20,7 +20,7 @@ Onion services operators need to practice proper [operational security](https://
For some security suggestions please make sure you read over Riseup's ["Tor Hidden (Onion) Services Best Practices" document](https://riseup.net/en/security/network-security/tor/onionservices-best-practices).
Also, here are some more anonymity issues you should keep in mind:
- - As mentioned [here](https://community.torproject.org/onion-services/setup/), be careful of letting your web server reveal identifying information about you, your computer, or your location.
+ - As mentioned [here](../../setup/), be careful of letting your web server reveal identifying information about you, your computer, or your location.
For example, readers can probably determine whether it's thttpd or Apache, and learn something about your operating system.
- If your computer isn't online all the time, your onion service won't be either.
This leaks information to an observant adversary.
diff --git a/content/onion-services/setup/contents.lr b/content/onion-services/setup/contents.lr
index 807ed06..f9f40c4 100644
--- a/content/onion-services/setup/contents.lr
+++ b/content/onion-services/setup/contents.lr
@@ -25,7 +25,7 @@ For the technical details of how the onion service protocol works, see our onion
## Step 0: Get a working Tor
As part of this guide, we will assume you have a functional Tor in your machine.
-To set up Tor, please follow the [Tor installation guide](https://community.torproject.org/onion-services/setup/install/).
+To set up Tor, please follow the [Tor installation guide](./install/).
Tor should be up and running correctly for this guide to work.
You should also know where Tor's configuration files are.
@@ -109,7 +109,7 @@ If it doesn't work, look in your logs for some hints, and keep playing with it u
It is important to note that an onion service configured like this will be readable by anybody who knows or discovers the address.
You can make onion services require authentication, and only users with a private key will access the service.
-Read more about [Client authorization](https://community.torproject.org/onion-services/advanced/client-auth/) documentation.
+Read more about [Client authorization](../advanced/client-auth/) documentation.
## (Optional) Step 5: Running multiple onion services
@@ -157,11 +157,11 @@ Some onion site operators may not want to disclose their onion service location.
Therefore, you need to configure your web server so it doesn't give away any information about you, your computer, or your location.
That is not an easy task, and these resources will help on how to make this possible:
- * [Operational Security](https://community.torproject.org/onion-services/advanced/opsec/).
+ * [Operational Security](../advanced/opsec/).
* [Onion services best practices](https://riseup.net/en/security/network-security/tor/onionservices-best-practices) by Riseup Collective.
* [OnionScan](https://onionscan.org/) is a tool to check if your onion site is leaking information that could compromise your anonymity like your server IP address.
Finally, if you plan to keep your service available for a long time, you might want to make a backup copy of the `private_key` file somewhere.
-Now that you have an onion site working, you may want to deploy [Onion-Location](https://community.torproject.org/onion-services/advanced/onion-location/), or use tools like Docker, [Heroku](https://gitlab.torproject.org/hiro/onions-on-heroku), [Terraform](https://gitlab.torproject.org/hiro/terraform-onions), [Ansible](https://galaxy.ansible.com/systemli/onion) or [stem](https://stem.torproject.org/tutorials/over_the_river.html) to automate the management of your onion services.
+Now that you have an onion site working, you may want to deploy [Onion-Location](../advanced/onion-location/), or use tools like Docker, [Heroku](https://gitlab.torproject.org/hiro/onions-on-heroku), [Terraform](https://gitlab.torproject.org/hiro/terraform-onions), [Ansible](https://galaxy.ansible.com/systemli/onion) or [stem](https://stem.torproject.org/tutorials/over_the_river.html) to automate the management of your onion services.
If you have a static website, but never installed Nginx or Apache, another project to try is [OnionShare](https://onionshare.org), where running an onion site will be easier: guided with a graphic interface and with minimal configuration.
diff --git a/content/onion-services/talk/contents.lr b/content/onion-services/talk/contents.lr
index 6196620..a62b6ff 100644
--- a/content/onion-services/talk/contents.lr
+++ b/content/onion-services/talk/contents.lr
@@ -33,7 +33,7 @@ These talking points will help to explain how onion services offer multiple priv
### How Onion Services Work
A potential adopter has probably already heard about the Tor Project, the network and even Tor relays, and that's great!
-[Tor relays](https://community.torproject.org/relay/types-of-relays/) are part of a [public infrastructure](https://metrics.torproject.org/rs.html#toprelays), where Tor users encrypted traffic is routed around to reach out the open internet.
+[Tor relays](../../relay/types-of-relays/) are part of a [public infrastructure](https://metrics.torproject.org/rs.html#toprelays), where Tor users encrypted traffic is routed around to reach out the open internet.
Onion services aren't like a Tor relay in the network.
An onion service on the Tor network behaves like any other Tor clients.
@@ -41,9 +41,9 @@ The Onion Service to become available on the network connects to rendezvous node
A client that wants to access the onion service does the same.
This means that connections from the client to the server never leave the Tor network.
-In contrast to running a [Tor relay](https://community.torproject.org/relay), running a Tor Onion Service does not result in your IP address being publicly listed anywhere, nor does your service relay other Tor traffic.
+In contrast to running a [Tor relay](../../relay), running a Tor Onion Service does not result in your IP address being publicly listed anywhere, nor does your service relay other Tor traffic.
-For a broader understanding, read [Onion Services overview](https://community.torproject.org/onion-services/overview/) and watch this talk: [DEF CON 25 - Next Generation Tor Onion Services](https://www.youtube.com/watch?v=Di7qAVidy1Y).
+For a broader understanding, read [Onion Services overview](../overview/) and watch this talk: [DEF CON 25 - Next Generation Tor Onion Services](https://www.youtube.com/watch?v=Di7qAVidy1Y).
### Freedom of Press and Censorship Circumvention
@@ -139,4 +139,4 @@ Using them eliminates all metadata that may be associated with the service other
### One onion a day keeps the surveillance away
-Now that you know all the benefits of onion services, you may want to set up an [onion site](https://community.torproject.org/onion-services/setup/) and read about the [protocol overview](https://community.torproject.org/onion-services/overview/).
+Now that you know all the benefits of onion services, you may want to set up an [onion site](https://community.torproject.org/onion-services/setup/) and read about the [protocol overview](../overview/).
diff --git a/content/outreach/meetup/contents.lr b/content/outreach/meetup/contents.lr
index ce4cfca..d1e59ee 100644
--- a/content/outreach/meetup/contents.lr
+++ b/content/outreach/meetup/contents.lr
@@ -32,11 +32,11 @@ After confirming a local and date, create a poster and an online invitation to s
### Step 3
Find a meetup facilitator and draft an agenda, for example, question & answer about Tor, how to setup relays.
-Read and follow our [best practices](https://community.torproject.org/training/best-practices/).
+Read and follow our [best practices](../../training/best-practices/).
### Step 4
-Before the meetup, organize the space. Buy some chips and snacks, hang some [posters](https://community.torproject.org/outreach/kit/) nearby the local, so people can find easily.
+Before the meetup, organize the space. Buy some chips and snacks, hang some [posters](../kit/) nearby the local, so people can find easily.
If you have some printed materials and/or Tor swag, put it on a table.
### Step 5
diff --git a/content/relay/community-resources/tor-exit-guidelines/contents.lr b/content/relay/community-resources/tor-exit-guidelines/contents.lr
index 722e513..b5308fc 100644
--- a/content/relay/community-resources/tor-exit-guidelines/contents.lr
+++ b/content/relay/community-resources/tor-exit-guidelines/contents.lr
@@ -123,7 +123,7 @@ If you have your own experience of abuse handling, just share it on our public m
Please read all the technical details before getting started. If you have any questions or need help, please contact us at [tor-relays](https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays).
-* [Tor Relay Guide](https://community.torproject.org/relay)
+* [Tor Relay Guide](../../)
* Set up an informative website on the exit IP(s) on port 80.
diff --git a/content/relay/community-resources/tor-relay-universities/contents.lr b/content/relay/community-resources/tor-relay-universities/contents.lr
index 95a4b52..1ee9839 100644
--- a/content/relay/community-resources/tor-relay-universities/contents.lr
+++ b/content/relay/community-resources/tor-relay-universities/contents.lr
@@ -72,7 +72,7 @@ If the authorities contact your university for logs, be pleasant and helpful.
Tor's default log level doesn't provide much that's useful, so if they want copies of your logs, that's fine.
Be helpful and take the opportunity to explain to them about Tor and why it's useful to the world. (If they contact you directly for logs, you should send them to your university's lawyers -- acting on it yourself is [almost always a poor idea](/relay/community-resources/eff-tor-legal-faq/)).
-If there are too many complaints coming in, there are several approaches you can take to reduce them. First, you should follow the tips in the [Tor relay documentation](https://community.torproject.org/relay), such as picking a descriptive hostname or getting your own IP address. If that doesn't work, you can scale back the advertised speed of your relay, by using the `MaxAdvertisedBandwidth` to attract less traffic from the Tor network. Lastly, you can scale back your exit policy.
+If there are too many complaints coming in, there are several approaches you can take to reduce them. First, you should follow the tips in the [Tor relay documentation](../..), such as picking a descriptive hostname or getting your own IP address. If that doesn't work, you can scale back the advertised speed of your relay, by using the `MaxAdvertisedBandwidth` to attract less traffic from the Tor network. Lastly, you can scale back your exit policy.
Some people have found that their university only tolerates their Tor relay if they're involved in a research project around anonymity.
So if you're interested, you might want to get that started early in the process -- see our [Research Portal](https://research.torproject.org/).
diff --git a/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr b/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr
index f31d12e..d05bc9e 100644
--- a/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr
+++ b/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr
@@ -125,8 +125,8 @@ To confirm your bridge is running with no issues, you should see something like
### 6. Final notes
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
---
html: two-columns-page.html
diff --git a/content/relay/setup/bridge/debian-ubuntu/contents.lr b/content/relay/setup/bridge/debian-ubuntu/contents.lr
index 76926a9..683c6a9 100644
--- a/content/relay/setup/bridge/debian-ubuntu/contents.lr
+++ b/content/relay/setup/bridge/debian-ubuntu/contents.lr
@@ -82,8 +82,8 @@ To confirm your bridge is running with no issues, you should see something like
### 6. Final notes
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
---
key: 2
diff --git a/content/relay/setup/bridge/docker/contents.lr b/content/relay/setup/bridge/docker/contents.lr
index 6d2d322..bf8d5b5 100644
--- a/content/relay/setup/bridge/docker/contents.lr
+++ b/content/relay/setup/bridge/docker/contents.lr
@@ -70,8 +70,8 @@ This will return a string similar to the following:
obfs4 1.2.3.4:1234 B0E566C9031657EA7ED3FC9D248E8AC4F37635A4 cert=OYWq67L7MDApdJCctUAF7rX8LHvMxvIBPHOoAp0+YXzlQdsxhw6EapaMNwbbGICkpY8CPQ iat-mode=0
```
-Make sure to check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
+Make sure to check out the [post-install notes](../post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
### 4. Advanced usage
diff --git a/content/relay/setup/bridge/dragonflybsd/contents.lr b/content/relay/setup/bridge/dragonflybsd/contents.lr
index 1027a79..eeef667 100644
--- a/content/relay/setup/bridge/dragonflybsd/contents.lr
+++ b/content/relay/setup/bridge/dragonflybsd/contents.lr
@@ -135,8 +135,8 @@ tail /var/log/tor/notices.log
### 6. Final Notes
-If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having troubles setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
---
subtitle: How to deploy an obfs4 bridge on DragonflyBSD
diff --git a/content/relay/setup/bridge/fedora/contents.lr b/content/relay/setup/bridge/fedora/contents.lr
index 11113ba..e4bba91 100644
--- a/content/relay/setup/bridge/fedora/contents.lr
+++ b/content/relay/setup/bridge/fedora/contents.lr
@@ -87,8 +87,8 @@ To confirm your bridge is running with no issues, you should see something like
### 5. Final notes
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
---
html: two-columns-page.html
diff --git a/content/relay/setup/bridge/freebsd/contents.lr b/content/relay/setup/bridge/freebsd/contents.lr
index 5d182d8..a2e2dd0 100644
--- a/content/relay/setup/bridge/freebsd/contents.lr
+++ b/content/relay/setup/bridge/freebsd/contents.lr
@@ -109,8 +109,8 @@ FreeBSDlatest: {
### 7. Final notes
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
---
subtitle: How to deploy an obfs4 bridge on FreeBSD
diff --git a/content/relay/setup/bridge/netbsd/contents.lr b/content/relay/setup/bridge/netbsd/contents.lr
index c681497..9094521 100644
--- a/content/relay/setup/bridge/netbsd/contents.lr
+++ b/content/relay/setup/bridge/netbsd/contents.lr
@@ -90,7 +90,7 @@ tail /var/log/messages
### 5. Final Notes
-If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](../post-install/).
---
subtitle: How to deploy an obfs4 bridge on NetBSD
diff --git a/content/relay/setup/bridge/openbsd/contents.lr b/content/relay/setup/bridge/openbsd/contents.lr
index 0a60051..8171a07 100644
--- a/content/relay/setup/bridge/openbsd/contents.lr
+++ b/content/relay/setup/bridge/openbsd/contents.lr
@@ -87,8 +87,8 @@ To confirm your bridge is running with no issues, you should see something like
### 6. Final notes
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
---
subtitle: How to deploy an obfs4 bridge on OpenBSD
diff --git a/content/relay/setup/bridge/windows/contents.lr b/content/relay/setup/bridge/windows/contents.lr
index 7bf3ddc..a16fe6e 100644
--- a/content/relay/setup/bridge/windows/contents.lr
+++ b/content/relay/setup/bridge/windows/contents.lr
@@ -95,7 +95,7 @@ To confirm your bridge is running with no issues, you should see something like
### 6. Final notes
-If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](../post-install/).
---
subtitle: How to deploy an obfs4 bridge on Windows
diff --git a/content/training/checklist/contents.lr b/content/training/checklist/contents.lr
index 88065d0..2ba9852 100644
--- a/content/training/checklist/contents.lr
+++ b/content/training/checklist/contents.lr
@@ -8,13 +8,13 @@ Complete this checklist before running a Tor training.
## Prepare
- * I read and agree with the Tor Project [Code of Coduct](https://community.torproject.org/training/code-of-conduct/)
+ * I read and agree with the Tor Project [Code of Coduct](../code-of-conduct/)
- * I read the Training [Best Practices](https://community.torproject.org/training/best-practices/)
+ * I read the Training [Best Practices](../best-practices/)
* I have an agenda for the training
- * I reviewed my [training slides](https://community.torproject.org/training/resources/)
+ * I reviewed my [training slides](../resources/)
## Security Protocol
diff --git a/content/training/risks/contents.lr b/content/training/risks/contents.lr
index bc65942..061f775 100644
--- a/content/training/risks/contents.lr
+++ b/content/training/risks/contents.lr
@@ -44,7 +44,7 @@ However, we may be able to put you in touch with lawyers who are capable of addr
Some relevant resources include:
* [EFF Know your rights](https://www.eff.org/issues/know-your-rights)
- * [EFF Tor legal FAQ](https://community.torproject.org/relay/community-resources/eff-tor-legal-faq/)
+ * [EFF Tor legal FAQ](../../relay/community-resources/eff-tor-legal-faq/)
* [OONI disclaimer](https://ooni.io/about/risks/)
---
color: primary
diff --git a/content/user-research/how-to-volunteer/contents.lr b/content/user-research/how-to-volunteer/contents.lr
index 754db35..5e0b304 100644
--- a/content/user-research/how-to-volunteer/contents.lr
+++ b/content/user-research/how-to-volunteer/contents.lr
@@ -18,7 +18,7 @@ Please remember to update the issue as your research evolves.
Not all of the data collected in our research is disclosed to the public, but our general findings are.
To protect our participants' privacy we take care to anonymize their responses and avoid recording our sessions.
-If you're already familiar with the Tor Project and user testing, have a look at our [current needs for user research](https://community.torproject.org/user-research/open/) and see which study better suits you.
+If you're already familiar with the Tor Project and user testing, have a look at our [current needs for user research](../open/) and see which study better suits you.
Remember to drop us an email telling us about your plans so we can follow and support your research.
As a volunteer we also ask that you read and follow our [Code of Conduct](https://gitweb.torproject.org/community/policies.git/tree/code_of_conduct.txt), as well our [Guidelines for Research](https://community.torproject.org/user-research/guidelines/).
@@ -44,7 +44,7 @@ We also ask anyone running research not use software hosted by third parties lik
After conducting your research, it's normal to be excited to see your feedback implemented as soon as possible.
However all feedback must be discussed internally across the different teams at the Tor Project first.
This means that it's often necessary to run the same research more than once to validate your findings, and meet the expectations of the engineers, developers, designers, researchers and others at Tor.
-Please read our [Guidelines](https://community.torproject.org/user-research/guidelines/) to get to know this process more.
+Please read our [Guidelines](../guidelines/) to get to know this process more.
## Checklist
@@ -53,7 +53,7 @@ Please read our [Guidelines](https://community.torproject.org/user-research/guid
- If you don't have one yet, [request a Gitlab account](https://support.torproject.org/misc/bug-or-feedback/).
- Open an issue in the [UX Research Repository](https://gitlab.torproject.org/tpo/ux/research/-/issues).
- Subscribe to the [UX mailing list](https://lists.torproject.org/cgi-bin/mailman/listinfo).
-- Learn more about our users by reading [Tor's user personas](https://community.torproject.org/user-research/persona).
+- Learn more about our users by reading [Tor's user personas](../persona).
---
color: primary
---
diff --git a/content/user-research/open/contents.lr b/content/user-research/open/contents.lr
index 91d34df..95847bc 100644
--- a/content/user-research/open/contents.lr
+++ b/content/user-research/open/contents.lr
@@ -19,7 +19,7 @@ html: two-columns-page.html
body:
These are our current needs for testing Tor products, as well as methodologies and testing scripts.
-Before running Tor user research, be sure you read our [Guidelines to becoming a user researcher with Tor](https://community.torproject.org/user-research/guidelines).
+Before running Tor user research, be sure you read our [Guidelines to becoming a user researcher with Tor](../guidelines).
### Tor Browser for Desktop
* [Tor Browser Usage](https://gitlab.torproject.org/tpo/ux/research/-/blob/master/scripts%20and%20activities/2020/browser-usage.md)
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits