[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] r26135: {website} don't tell users how to kill their anonymity to watch cat vi (website/trunk/docs/en)
Author: phobos
Date: 2013-03-26 11:38:41 +0000 (Tue, 26 Mar 2013)
New Revision: 26135
Modified:
website/trunk/docs/en/faq.wml
Log:
don't tell users how to kill their anonymity to watch cat videos on the internet.
Modified: website/trunk/docs/en/faq.wml
===================================================================
--- website/trunk/docs/en/faq.wml 2013-03-26 04:38:32 UTC (rev 26134)
+++ website/trunk/docs/en/faq.wml 2013-03-26 11:38:41 UTC (rev 26135)
@@ -73,7 +73,7 @@
<li><a href="#TBBCloseBrowser">I want to leave Tor Browser Bundle
running but close the browser.</a></li>
- <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or
+ <li><a href="#GoogleCaptcha">Google makes me solve a CAPTCHA or
tells
me I have spyware installed.</a></li>
<li><a href="#GmailWarning">Gmail warns me that my account may have
@@ -498,12 +498,7 @@
<p>Not yet, but we're working on it. Most forum software is
a disaster to maintain and keep secure, and at the same time
too many of the Tor developers are spread too thin to be able
- to contribute enough to a forum. As of June 2012, we have a
- funder who wants to help us do it right. Stay tuned! (Tickets <a
- href="https://trac.torproject.org/projects/tor/ticket/3592">3592</a>
- and <a
- href="https://trac.torproject.org/projects/tor/ticket/5995">5995</a>
- relate to forums too.)
+ to contribute enough to a forum.
</p>
<hr>
@@ -956,30 +951,11 @@
with local IP address discovery and Flash cookies still remain. </p>
<p>
-<a href="https://www.youtube.com/html5">YouTube offers experimental HTML5 video
-support</a> for many of their videos. You can use their Advanced Search to
+<a href="https://www.youtube.com/html5">YouTube offers experimental HTML5 video
+support</a> for many of their videos. You can use their Advanced Search to
find HTML5 videos.
</p>
-<p>
-If you are not concerned about being tracked by these sites (and sites that
-try to unmask you by pretending to be them), and are unconcerned about your
-local censors potentially noticing you visit them, you can enable plugins by
-going into the Torbutton Preferences -> Security Settings
-tab and unchecking "Disable browser plugins (such as Flash)" box. If you do this
-without The Amnesic Incognito Live System or appropriate firewall
-rules, we strongly suggest you at least use <a
-href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> to <a
-href="http://noscript.net/features#contentblocking">block plugins</a>. You do
-not need to use the NoScript per-domain permissions if you check the <b>Apply
-these restrictions to trusted sites too</b> option under the NoScript Plugins
-preference tab. In fact, with this setting you can even have NoScript allow
-Javascript globally, but still block all plugins until you click on their
-placeholders in a page. We also recommend <a
-href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better Privacy</a>
-in this case to help you clear your Flash cookies.
-</p>
-
<hr>
<a id="TBBSocksPort"></a>
@@ -989,12 +965,12 @@
<p>
Typically Tor listens for Socks connections on port 9050. TBB listens
-on port 9150.
+on port 9150.
The goal is to avoid conflicting with a "system" Tor install,
so you can run a system Tor and TBB at the same time. We're <a
href="https://trac.torproject.org/projects/tor/ticket/3948">working on
a feature</a> where Tor will try the usual ports first and then back
-off to a random choice if they're already in use.
+off to a random choice if they're already in use.
</p>
<hr>
@@ -1044,8 +1020,8 @@
</p>
<p>
-Generally, extensions that require registration, and/or provide
-additional information about websites you are visiting, should be
+Generally, extensions that require registration, and/or provide
+additional information about websites you are visiting, should be
suspect.
</p>
@@ -1058,7 +1034,7 @@
<a href="https://addons.mozilla.org/firefox/addon/82">Cookie Culler</a>,
<a href="https://addons.mozilla.org/en-US/firefox/addon/9727/">Request Policy</a> and
<a href="https://addons.mozilla.org/en-US/firefox/addon/certificate-patrol/">Certificate Patrol</a>.
-</p>
+</p>
<hr>
@@ -1680,7 +1656,7 @@
short)
are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't
listed in the public Tor directory.
- That means that ISPs or governments trying to block access to the
+ That means that ISPs or governments trying to block access to the
Tor network can't simply block all bridges.
</p>
@@ -1690,7 +1666,7 @@
</p>
<p>
- So bridges are useful a) for Tor users in oppressive regimes,
+ So bridges are useful a) for Tor users in oppressive regimes,
and b) for people who want an extra layer of security
because they're worried somebody will recognize that it's a public
Tor relay IP address they're contacting.
@@ -1698,9 +1674,9 @@
<p>
Several countries, including China and Iran, have found ways to
- detect and block connections to Tor bridges.
+ detect and block connections to Tor bridges.
<a href="<page projects/obfsproxy>">Obfsproxy</a> bridges address
- this by adding another layer of obfuscation.
+ this by adding another layer of obfuscation.
</p>
<p>So should you run a normal relay or bridge relay? If you have
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits