[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r19526: {website} fix spelling, links, etc on torbutton faq changes (website/trunk/torbutton/en)
Author: arma
Date: 2009-05-16 17:47:15 -0400 (Sat, 16 May 2009)
New Revision: 19526
Modified:
website/trunk/torbutton/en/faq.wml
Log:
fix spelling, links, etc on torbutton faq changes
Modified: website/trunk/torbutton/en/faq.wml
===================================================================
--- website/trunk/torbutton/en/faq.wml 2009-05-16 10:17:55 UTC (rev 19525)
+++ website/trunk/torbutton/en/faq.wml 2009-05-16 21:47:15 UTC (rev 19526)
@@ -75,7 +75,7 @@
IP address</a>, and <a
href="http://epic.org/privacy/cookies/flash.html">storing their own
cookies</a>. It is possible to use a LiveCD or VMWare-based solution such as
-<a href="https://www.torproject.org/torvm/">TorVM</a> or
+<a href="<page torvm/index>">Tor VM</a> or
<a href="http://anonymityanywhere.com/incognito/">Incognito</a> that creates a
secure, transparent proxy to protect you from proxy bypass, however issues
with local IP address discovery and Flash cookies potentially remain.
@@ -87,14 +87,14 @@
local censors noticing you visit them, you can enable plugins by going into
the Torbutton Preferences->Security Settings->Dynamic Content tab and
unchecking "Disable plugins during Tor usage" box. If you do do this without
-TorVM, Incognitio or appropriate firewall rules, we strongly suggest you at
+Tor VM, Incognito or appropriate firewall rules, we strongly suggest you at
least use <a
href="https://addons.mozilla.org/en-US/firefox/addon/433">FlashBlock</a> or <a
href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> along
with <a href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better
Privacy</a> to block unwanted plugins and their cookies. Neither of these are
foolproof protection against proxy bypass and
-<a href="http://decloak.net">unmasking</a>, but you will at least be better off.
+<a href="http://decloak.net/">unmasking</a>, but you will at least be better off.
</p>
@@ -111,9 +111,9 @@
<b>Simply do not use Tor</b> and you will have the same (and in some cases,
better) security. For more information on the types of attacks you are exposed
to with a "homegrown" solution, please see <a
-href="https://www.torproject.org/torbutton/design/#adversary">The Torbutton
+href="design/index.html#adversary">The Torbutton
Adversary Model</a>, in particular the <a
-href="https://www.torproject.org/torbutton/design/#attacks">Adversary
+href="design/index.html#attacks">Adversary
Capabilities - Attacks</a> subsection. If there are any specific Torbutton
behaviors that you do not like, please file a bug on <a
href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">the
@@ -181,7 +181,7 @@
<ol>
<li>StumbleUpon, et al
- <p>
+ <p>
These extensions will send all sorts of information about the websites you
visit to the stumbleupon servers, and correlate this information with a
unique identifier. This is obviously terrible for your anonymity.
@@ -225,7 +225,7 @@
referrer spoofing option.</p></li>
<li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a>
- <p>
+<p>
If you use Tor excessively, and rarely disable it, you probably want to
install this extension to minimize the ability of sites to store long term
identifiers in your cache. This extension applies same origin policy to the
@@ -280,8 +280,9 @@
<a href="http://fscked.org/category/tags/insecurecookies">insecure
cookies</a>.<br>
- It can be difficult to configure such that the majority sites will work
- properly though. In particular, you want to make sure you do not remove the Javascript whitelist for
+ It can be difficult to configure such that the most sites will work
+ properly though. In particular, you want to make sure you do not remove
+ the Javascript whitelist for
addons.mozilla.org, as extensions are downloaded via http and verified by
javascript from the https page.
@@ -306,7 +307,7 @@
<p>
There are a few known security issues with Torbutton (all of which are due to
-<a href="https://www.torproject.org/torbutton/design/#FirefoxBugs">unfixed
+<a href="design/index.html#FirefoxBugs">unfixed
Firefox security bugs</a>). The most important for anonymity is that it is
possible to unmask the javascript hooks that wrap the Date object to conceal
your timezone in Firefox 2, and the timezone masking code does not work at all