[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] r25054: {website} add some introduction paragraphs. we still need explain that (website/trunk/docs/en)
Author: arma
Date: 2011-09-10 10:37:34 +0000 (Sat, 10 Sep 2011)
New Revision: 25054
Modified:
website/trunk/docs/en/verifying-signatures.wml
Log:
add some introduction paragraphs. we still need explain that fetching tbb,
our sig, and our key from the same place is not going to do what you want.
Modified: website/trunk/docs/en/verifying-signatures.wml
===================================================================
--- website/trunk/docs/en/verifying-signatures.wml 2011-09-10 10:36:09 UTC (rev 25053)
+++ website/trunk/docs/en/verifying-signatures.wml 2011-09-10 10:37:34 UTC (rev 25054)
@@ -12,6 +12,39 @@
<h1>How to verify signatures for packages</h1>
<hr>
+ <h3>What is a signature and why should I check it?</h3>
+ <hr>
+
+ <p>How do you know that the Tor program you have is really the
+ one we made? Many Tor users have very real adversaries who might
+ try to give them a fake version of Tor — and it doesn't matter
+ how secure and anonymous Tor is if you're not running the real Tor.</p>
+
+ <p>An attacker could try a variety of attacks to get you to download
+ a fake Tor. For example, he could trick you into thinking some other
+ website is a great place to download Tor. That's why you should
+ always download Tor from <b>https</b>://www.torproject.org/. The
+ https part means there's encryption and authentication between your
+ browser and the website, making it much harder for the attacker
+ to modify your download. But it's not perfect. Some places in the
+ world block the Tor website, making users try somewhere else. Large
+ companies sometimes force employees to use a modified browser,
+ so the company can listen in on all their browsing. We've even <a
+ href="https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it">seen</a>
+ attackers who have the ability to trick your browser into thinking
+ you're talking to the Tor website with https when you're not.</p>
+
+ <p>Some software sites list <a
+ href="http://en.wikipedia.org/wiki/Cryptographic_hash_function">sha1
+ hashes</a> alongside the software on their website, so users can
+ verify that they downloaded the file without any errors. These
+ "checksums" help you answer the question "Did I download this file
+ correctly from whoever sent it to me?" They do a good job at making
+ sure you didn't have any random errors in your download, but they
+ don't help you figure out whether you were downloading it from the
+ attacker. The better question to answer is: "Is this file that I
+ just downloaded the file that Tor intended me to get?"</p>
+
<p>Each file on <a href="<page download/download>">our download
page</a> is accompanied by a file with the same name as the
package and the extension ".asc". These .asc files are GPG
@@ -23,10 +56,9 @@
<h3>Windows</h3>
<hr>
- <p>You need to have GnuPG installed
- before you can verify signatures. Go to <a
- href="http://www.gnupg.org/download/">http://www.gnupg.org/download/</a>
- and look for the "version compiled for MS-Windows" under "Binaries".</p>
+ <p>You need to have GnuPG installed before
+ you can verify signatures. Download it from <a
+ href="http://gpg4win.org/download.html">http://gpg4win.org/download.html</a>.</p>
<p>Once it's installed, use GnuPG to import the key that signed your
package. Since GnuPG for Windows is a command-line tool, you will need
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits