tor-commits
Threads by month
- ----- 2025 -----
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
December 2017
- 14 participants
- 2422 discussions
commit 647b7ce451a925823b892326c84a72eae9eda3cf
Author: Nicolas Vigier <boklm(a)torproject.org>
Date: Fri Nov 17 12:19:12 2017 +0100
Update tor browser sandbox version
---
include/versions.wmi | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/versions.wmi b/include/versions.wmi
index b31256b6..bff9eecf 100644
--- a/include/versions.wmi
+++ b/include/versions.wmi
@@ -38,7 +38,7 @@
<let version-torbrowserbundleosx64beta=version-torbrowserbundlebeta-all />
<let releasedate-torbrowserbundleosx64beta=releasedate-torbrowserbundlebeta-all />
-<define-tag version-torbrowsersandboxlinux whitespace=delete>0.0.14</define-tag>
+<define-tag version-torbrowsersandboxlinux whitespace=delete>0.0.15</define-tag>
<define-tag file-source-stable whitespace=delete>tor-<version-stable>.tar.gz</define-tag>
1
0

[webwml/staging] Change hidden service to onion service. (See #24285)
by hiro@torproject.org 21 Dec '17
by hiro@torproject.org 21 Dec '17
21 Dec '17
commit 32316cbf7b8d7fa8e26578da9b71650ddc00d4fe
Author: kat <kat(a)torproject.org>
Date: Thu Nov 16 13:08:34 2017 -0500
Change hidden service to onion service. (See #24285)
---
about/en/contributors.wml | 6 +--
about/en/gsoc.wml | 2 +-
about/en/overview.wml | 2 +-
about/en/torusers.wml | 22 ++++----
docs/en/faq-abuse.wml | 10 ++--
docs/en/faq.wml | 39 +++++++-------
docs/en/hidden-services.wml | 97 ++++++++++++++++-----------------
docs/en/sidenav.wmi | 2 +-
docs/en/tor-doc-osx.wml | 2 +-
docs/en/tor-hidden-service.wml | 119 ++++++++++++++++++++---------------------
docs/torbutton/en/sidenav.wmi | 2 +-
donate/en/donor-faq.wml | 2 +-
getinvolved/en/volunteer.wml | 40 +++++++-------
include/foot.wmi | 2 +-
projects/en/tordnsel.wml | 6 +--
15 files changed, 175 insertions(+), 178 deletions(-)
diff --git a/about/en/contributors.wml b/about/en/contributors.wml
index 90237ca1..227aa562 100644
--- a/about/en/contributors.wml
+++ b/about/en/contributors.wml
@@ -36,7 +36,7 @@ href="http://cryptocracy.net/">personal website</a>.</dd>
management, travel, and other projects.</dd>
<dt>Domenik Bork</dt><dd> Worked on
-Configuration of Hidden Services with User Authorization in Vidalia as
+Configuration of Onion Services with User Authorization in Vidalia as
part of Google Summer of Code 2008.</dd>
<dt>Benedikt Boss</dt><dd>Worked during the 2007 Google Summer of Code on <a
href="https://svn.torproject.org/svn/topf/trunk/README">TOPF</a>,
@@ -182,7 +182,7 @@ proxying approach for Tor clients on Windows.</dd>
Tor is based on, so we didn't have to start from scratch.</dd>
<dt>Robert Ransom</dt><dd>Found and fixed a bunch of Tor bugs, mostly in
-Tor's hidden service code, and added several security and usability
+Tor's onion service code, and added several security and usability
features to Tor and Tor Browser Bundle.</dd>
<dt>Johannes Renner</dt><dd> Worked during the 2007 Google Summer of
@@ -236,7 +236,7 @@ Bundle build process, especially on Windows.</dd>
<dt>Kyle Williams</dt><dd>Developer for JanusVM, a VMWare-based
transparent Tor proxy that makes Tor easier to set up and use.</dd>
<dt>Christian Wilms</dt><dd> Worked on
-Performance Enhancing Measures for Tor Hidden Services (<a
+Performance Enhancing Measures for Tor Onion Services (<a
href="https://svn.torproject.org/cgi-bin/viewvs.cgi/tor/branches/hidserv-perf/">svn</a>) as part of Google Summer of Code 2008.</dd>
<dt>Jillian C. York</dt><dd><a href="http://jilliancyork.com/">Jillian C. York</a> is a writer, blogger, and activist.</dd>
</dl>
diff --git a/about/en/gsoc.wml b/about/en/gsoc.wml
index 87fc838f..bc849281 100644
--- a/about/en/gsoc.wml
+++ b/about/en/gsoc.wml
@@ -204,7 +204,7 @@
</p>
<ul>
- <li><h4><a href="https://ahmia.fi/gsoc/">Ahmia.fi - Search Engine for Hidden Services</a> by Juha Nurmi</h4></li>
+ <li><h4><a href="https://ahmia.fi/gsoc/">Ahmia.fi - Search Engine for Onion Services</a> by Juha Nurmi</h4></li>
<li><h4><a href="http://ilv.github.io/gettor_proposal.html">Revamp GetTor</a> by Israel Leiva</h4></li>
<li><h4><a href="https://sites.google.com/site/sreenathadev/gsoc-2014-weather-rewrite">Weather Rewrite</a> by Sreenatha Bhatlapenumarthi</h4></li>
<li><h4><a href="http://kostas.mkj.lt/gsoc2014/gsoc2014.html">BridgeDB Distributor</a> by Kostas Jakeliunas</h4></li>
diff --git a/about/en/overview.wml b/about/en/overview.wml
index c275f9f2..11d1fdcb 100644
--- a/about/en/overview.wml
+++ b/about/en/overview.wml
@@ -46,7 +46,7 @@
Individuals use Tor to keep websites from tracking them and their family
members, or to connect to news sites, instant messaging services, or the
like when these are blocked by their local Internet providers. Tor's <a
- href="<page docs/hidden-services>">hidden services</a>
+ href="<page docs/hidden-services>">onion services</a>
let users publish web sites and other services without needing to reveal
the location of the site. Individuals also use Tor for socially sensitive
communication: chat rooms and web forums for rape and abuse survivors,
diff --git a/about/en/torusers.wml b/about/en/torusers.wml
index 2ec4f2e4..94312683 100644
--- a/about/en/torusers.wml
+++ b/about/en/torusers.wml
@@ -280,17 +280,17 @@
operations, as well as protecting themselves from physical harm.
</li>
- <li><strong>Hidden services:</strong>
- When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
- local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to
- reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and
- control to be physically secure from discovery and takedown.
- </li>
- <li><strong>Intelligence gathering:</strong>
- Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
- to record a military address, thereby revealing the surveillance.
- </li>
- </ul>
+ <li><strong>Onion services:</strong>
+ When the Internet was designed by DARPA, its primary purpose was to be able
+ to facilitate distributed, robust communications in case of local strikes.
+ However, some functions must be centralized, such as command and control
+ sites. It's the nature of the Internet protocols to reveal the geographic
+ location of any server that is reachable online. Tor's onion services
+ capacity allows military command and control to be physically secure from
+ discovery and takedown. </li> <li><strong>Intelligence gathering:</strong>
+ Military personnel need to use electronic resources run and monitored by
+ insurgents. They do not want the webserver logs on an insurgent website to
+ record a military address, thereby revealing the surveillance. </li> </ul>
<a name="itprofessionals"></a>
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
diff --git a/docs/en/faq-abuse.wml b/docs/en/faq-abuse.wml
index 76d3db3f..484865f7 100644
--- a/docs/en/faq-abuse.wml
+++ b/docs/en/faq-abuse.wml
@@ -353,14 +353,14 @@ using technology?</a></li>
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
<p>The Tor Project does not host, control, nor have the ability to
discover the owner or location of a .onion address. The .onion address is
- an address from <a href="<page docs/hidden-services>">a hidden
- service</a>. The name you see ending in .onion is a hidden service descriptor.
+ an address from <a href="<page docs/hidden-services>">an onion
+ service</a>. The name you see ending in .onion is an onion service descriptor.
It's an automatically generated name which can be located on any Tor
- relay or client anywhere on the Internet. Hidden services are designed
+ relay or client anywhere on the Internet. Onion services are designed
to protect both the user and service provider from discovering who they
- are and where they are from. The design of hidden services means the
+ are and where they are from. The design of onion services means the
owner and location of the .onion site is hidden even from us.</p>
- <p>But remember that this doesn't mean that hidden services are
+ <p>But remember that this doesn't mean that onion services are
invulnerable. Traditional police techniques can still be very effective
against them, such as interviewing suspects, writing style analysis,
technical analysis of the content itself, sting operations, keyboard taps,
diff --git a/docs/en/faq.wml b/docs/en/faq.wml
index a97dffdc..a558a8fd 100644
--- a/docs/en/faq.wml
+++ b/docs/en/faq.wml
@@ -191,11 +191,11 @@ relay.</a></li>
run my own?</a></li>
</ul>
- <p>Tor hidden services:</p>
+ <p>Tor onion services:</p>
<ul>
- <li><a href="#AccessHiddenServices">How do I access hidden services?</a></li>
- <li><a href="#ProvideAHiddenService">How do I provide a hidden service?</a></li>
+ <li><a href="#AccessOnionServices">How do I access onion services?</a></li>
+ <li><a href="#ProvideAnOnionService">How do I provide an onion service?</a></li>
</ul>
<p>Development:</p>
@@ -1817,7 +1817,7 @@ versions.
<p>
Note also that not every circuit is used to deliver traffic outside of
the Tor network. It is normal to see non-exit circuits (such as those
- used to connect to hidden services, those that do directory fetches,
+ used to connect to onion services, those that do directory fetches,
those used for relay reachability self-tests, and so on) that end at
a non-exit node. To keep a node from being used entirely, see
<tt>ExcludeNodes</tt> and <tt>StrictNodes</tt> in the
@@ -3001,15 +3001,16 @@ diversity,
<hr>
-<a id="TorHiddenServices"></a>
-<h2><a class="anchor">Tor hidden services:</a></h2>
+# Leaving in old ids to accomodate incoming links.
+<a id="TorOnionServices"></a><a id="TorHiddenServices"></a>
+<h2><a class="anchor">Tor onion services:</a></h2>
- <a id="AccessHiddenServices"></a>
- <h3><a class="anchor" href="#AccessHiddenServices">How do I access
- hidden services?</a></h3>
+ <a id="AccessOnionServices"></a><a id="AccessHiddenServices"></a>
+ <h3><a class="anchor" href="#AccessOnionServices">How do I access
+ onion services?</a></h3>
<p>
- Tor hidden services are named with a special top-level domain (TLD)
+ Tor onion services are named with a special top-level domain (TLD)
name in DNS: .onion. Since the .onion TLD is not recognized by the
official root DNS servers on the Internet, your application will not
get the response it needs to locate the service. Currently, the Tor
@@ -3020,7 +3021,7 @@ diversity,
<p>
Therefore, your application <b>needs</b> to pass the .onion hostname to
Tor directly. You can't try to resolve it to an IP address, since there
- <i>is</i> no corresponding IP address: the server is hidden, after all!
+ <i>is</i> no corresponding IP address.
</p>
<p>
@@ -3044,10 +3045,10 @@ diversity,
<p>
For applications that do not support HTTP proxy, and so cannot use
Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an
- alternative. When using FreeCap set proxy protocol to SOCKS 5 and under
+ alternative. When using FreeCap set proxy protocol to SOCKS 5 and under
settings set DNS name resolving to remote. This
will allow you to use almost any program with Tor without leaking DNS
- lookups and allow those same programs to access hidden services.
+ lookups and allow those same programs to access onion services.
</p>
<p>
@@ -3056,13 +3057,13 @@ diversity,
<hr>
- <a id="ProvideAHiddenService"></a>
- <h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a
- hidden service?</a></h3>
+ <a id="ProvideAnOnionService"></a><a id="ProvideAHiddenService"></a>
+ <h3><a class="anchor" href="#ProvideAnOnionService">How do I provide an
+ onion service?</a></h3>
<p>
See the <a href="<page docs/tor-hidden-service>">
- official hidden service configuration instructions</a>.
+ official onion service configuration instructions</a>.
</p>
<hr>
@@ -3951,7 +3952,7 @@ and clients need to predict all the packets they will want to send in
a session before picking their exit node!
</li>
<li>The Tor-internal name spaces would need to be redesigned. We support
-hidden service ".onion" addresses by intercepting the addresses when
+onion service ".onion" addresses by intercepting the addresses when
they are passed to the Tor client. Doing so at the IP level will require
a more complex interface between Tor and the local DNS resolver.
</li>
@@ -4002,7 +4003,7 @@ their path length.</a></h3>
<p>
Right now the path length is hard-coded at 3 plus the number of nodes in
your path that are sensitive. That is, in normal cases it's 3, but for
- example if you're accessing a hidden service or a ".exit" address it could be 4.
+ example if you're accessing an onion service or a ".exit" address it could be 4.
</p>
<p>
We don't want to encourage people to use paths longer than this — it
diff --git a/docs/en/hidden-services.wml b/docs/en/hidden-services.wml
index bf9ae60a..12e8e2f6 100644
--- a/docs/en/hidden-services.wml
+++ b/docs/en/hidden-services.wml
@@ -2,78 +2,75 @@
# Revision: $Revision$
# Translation-Priority: 3-low
-#include "head.wmi" TITLE="Tor: Hidden Service Protocol" CHARSET="UTF-8"
+#include "head.wmi" TITLE="Tor: Onion Service Protocol" CHARSET="UTF-8"
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home » </a>
<a href="<page docs/documentation>">Documentation » </a>
- <a href="<page docs/hidden-services>">Hidden Services</a>
+ <a href="<page docs/hidden-services>">Onion Services</a>
</div>
<div id="maincol">
- <h2>Tor: Hidden Service Protocol</h2>
+ <h2>Tor: Onion Service Protocol</h2>
<hr>
<p>
Tor makes it possible for users to hide their locations while offering
various kinds of services, such as web publishing or an instant
messaging server. Using Tor "rendezvous points," other Tor users can
- connect to these hidden services, each without knowing the other's
- network identity. This page describes the technical details of how
- this rendezvous protocol works. For a more direct how-to, see our <a
- href="<page docs/tor-hidden-service>">configuring hidden services</a>
- page.
- </p>
+ connect to these onion services, formerly known as hidden services, each
+ without knowing the other's network identity. This page describes the
+ technical details of how this rendezvous protocol works. For a more direct
+ how-to, see our <a href="<page docs/tor-hidden-service>">configuring onion
+ services</a> page. </p>
<p>
- A hidden service needs to advertise its existence in the Tor network before
+ An onion service needs to advertise its existence in the Tor network before
clients will be able to contact it. Therefore, the service randomly picks
some relays, builds circuits to them, and asks them to act as
<em>introduction points</em> by telling them its public key. Note
that in the following figures the green links are circuits rather
than direct connections. By using a full Tor circuit, it's hard for
- anyone to associate an introduction point with the hidden server's IP
- address. While the introduction points and others are told the hidden
+ anyone to associate an introduction point with the onion server's IP
+ address. While the introduction points and others are told the onion
service's identity (public key), we don't want them to learn about the
- hidden server's location (IP address).
+ onion server's location (IP address).
</p>
- <img alt="Tor hidden service step one" src="$(IMGROOT)/THS-1.png">
+ <img alt="Tor onion service step one" src="$(IMGROOT)/THS-1.png">
# maybe add a speech bubble containing "PK" to Bob, because that's what
# Bob tells to his introduction points
<p>
- Step two: the hidden service assembles a <em>hidden service
- descriptor</em>, containing its public key and a summary of each
- introduction point, and signs this descriptor with its private key.
- It uploads that descriptor to a distributed hash table. The descriptor will be
- found by clients requesting XYZ.onion where XYZ is a 16 character
- name derived from the service's public key. After
- this step, the hidden service is set up.
- </p>
+ Step two: the onion service assembles an <em>onion service descriptor</em>,
+ containing its public key and a summary of each introduction point, and
+ signs this descriptor with its private key. It uploads that descriptor to
+ a distributed hash table. The descriptor will be found by clients
+ requesting XYZ.onion where XYZ is a 16 character name derived from the
+ service's public key. After this step, the onion service is set up. </p>
<p>
Although it might seem impractical to use an automatically-generated
service name, it serves an important goal: Everyone – including
- the introduction points, the distributed hash table directory, and of course the
- clients – can verify that they are talking to the right hidden
- service. See also <a href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
- conjecture</a> that out of Decentralized, Secure, and Human-Meaningful,
- you can achieve at most two. Perhaps one day somebody will implement a <a
- href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
- design for hidden service names?
- </p>
-
- <img alt="Tor hidden service step two" src="$(IMGROOT)/THS-2.png">
+ the introduction points, the distributed hash table directory, and of
+ course the clients – can verify that they are talking to the right
+ onion service. See also <a
+ href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
+ conjecture</a> that out of Decentralized, Secure, and Human-Meaningful, you
+ can achieve at most two. Perhaps one day somebody will implement a <a
+ href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
+ design for onion service names? </p>
+
+ <img alt="Tor onion service step two" src="$(IMGROOT)/THS-2.png">
# maybe replace "database" with "DHT"; further: how incorrect
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in
# use?
<p>
- Step three: A client that wants to contact a hidden service needs
+ Step three: A client that wants to contact an onion service needs
to learn about its onion address first. After that, the client can
initiate connection establishment by downloading the descriptor from
the distributed hash table. If there is a descriptor for XYZ.onion
- (the hidden service could also be offline or have left long ago,
+ (the onion service could also be offline or have left long ago,
or there could be a typo in the onion address), the client now
knows the set of introduction points and the right public key to
use. Around this time, the client also creates a circuit to another
@@ -81,49 +78,49 @@
by telling it a one-time secret.
</p>
- <img alt="Tor hidden service step three" src="$(IMGROOT)/THS-3.png">
+ <img alt="Tor onion service step three" src="$(IMGROOT)/THS-3.png">
# maybe add "cookie" to speech bubble, separated from the surrounded
# "IP1-3" and "PK"
<p>
Step four: When the descriptor is present and the rendezvous
point is ready, the client assembles an <em>introduce</em> message
- (encrypted to the hidden service's public key) including the address
+ (encrypted to the onion service's public key) including the address
of the rendezvous point and the one-time secret. The client sends
this message to one of the introduction points, requesting it be
- delivered to the hidden service. Again, communication takes place
+ delivered to the onion service. Again, communication takes place
via a Tor circuit: nobody can relate sending the introduce message
to the client's IP address, so the client remains anonymous.
</p>
- <img alt="Tor hidden service step four" src="$(IMGROOT)/THS-4.png">
+ <img alt="Tor onion service step four" src="$(IMGROOT)/THS-4.png">
<p>
- Step five: The hidden service decrypts the client's introduce message
+ Step five: The onion service decrypts the client's introduce message
and finds the address of the rendezvous point and the one-time secret
in it. The service creates a circuit to the rendezvous point and
sends the one-time secret to it in a rendezvous message.
</p>
<p>
- At this point it is of special importance that the hidden service sticks to
+ At this point it is of special importance that the onion service sticks to
the same set of <a
href="<wikifaq>#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
guards</a> when creating new circuits. Otherwise an attacker
- could run his own relay and force a hidden service to create an arbitrary
+ could run his own relay and force an onion service to create an arbitrary
number of circuits in the hope that the corrupt relay is picked as entry
- node and he learns the hidden server's IP address via timing analysis. This
+ node and he learns the onion server's IP address via timing analysis. This
attack was described by Øverlier and Syverson in their paper titled
<a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
Servers</a>.
</p>
- <img alt="Tor hidden service step five" src="$(IMGROOT)/THS-5.png">
+ <img alt="Tor onion service step five" src="$(IMGROOT)/THS-5.png">
# it should say "Bob connects to Alice's ..."
<p>
In the last step, the rendezvous point notifies the client about successful
- connection establishment. After that, both client and hidden service can
+ connection establishment. After that, both client and onion service can
use their circuits to the rendezvous point for communicating with each
other. The rendezvous point simply relays (end-to-end encrypted) messages
from client to service and vice versa.
@@ -132,21 +129,21 @@
<p>
One of the reasons for not using the introduction circuit
for actual communication is that no single relay should
- appear to be responsible for a given hidden service. This is why the
- rendezvous point never learns about the hidden service's identity.
+ appear to be responsible for a given onion service. This is why the
+ rendezvous point never learns about the onion service's identity.
</p>
<p>
- In general, the complete connection between client and hidden service
+ In general, the complete connection between client and onion service
consists of 6 relays: 3 of them were picked by the client with the third
- being the rendezvous point and the other 3 were picked by the hidden
+ being the rendezvous point and the other 3 were picked by the onion
service.
</p>
- <img alt="Tor hidden service step six" src="$(IMGROOT)/THS-6.png">
+ <img alt="Tor onion service step six" src="$(IMGROOT)/THS-6.png">
<p>
- There are more detailed descriptions about the hidden service protocol than
+ There are more detailed descriptions about the onion service protocol than
this one. See the
<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
for an in-depth design description and the
diff --git a/docs/en/sidenav.wmi b/docs/en/sidenav.wmi
index 2ddddbfa..9de6463d 100644
--- a/docs/en/sidenav.wmi
+++ b/docs/en/sidenav.wmi
@@ -52,7 +52,7 @@
'txt' => 'Configuring a Relay graphically',
},
{'url' => 'docs/tor-hidden-service',
- 'txt' => 'Configuring a Hidden Service',
+ 'txt' => 'Configuring an Onion Service',
},
{'url' => 'docs/bridges',
'txt' => 'Understanding bridges',
diff --git a/docs/en/tor-doc-osx.wml b/docs/en/tor-doc-osx.wml
index f5ba8e23..168e7617 100644
--- a/docs/en/tor-doc-osx.wml
+++ b/docs/en/tor-doc-osx.wml
@@ -22,7 +22,7 @@
<p>Even though Tor Browser comes with a regular Tor, it will only run
as long as you keep Tor Browser open. The following instructions will
set up Tor without graphical interface or a browser. Many people prefer
- this over TBB when they host hidden services or relay traffic for other Tor
+ this over TBB when they host onion services or relay traffic for other Tor
users. <hr>
<a id="installing"></a>
<h2><a class="anchor" href="#installing">Step One: Install a package manager</a></h2>
diff --git a/docs/en/tor-hidden-service.wml b/docs/en/tor-hidden-service.wml
index 7e759c59..854843ea 100644
--- a/docs/en/tor-hidden-service.wml
+++ b/docs/en/tor-hidden-service.wml
@@ -2,32 +2,32 @@
# Revision: $Revision$
# Translation-Priority: 3-low
-#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
+#include "head.wmi" TITLE="Tor Project: Onion Service Configuration Instructions" CHARSET="UTF-8"
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home » </a>
<a href="<page docs/documentation>">Documentation » </a>
- <a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
+ <a href="<page docs/tor-hidden-service>">Tor Onion Service</a>
</div>
<div id="maincol">
- <h1>Configuring Hidden Services for <a href="<page index>">Tor</a></h1>
+ <h1>Configuring Onion Services for <a href="<page index>">Tor</a></h1>
<hr>
- <p>Tor allows clients and relays to offer hidden services. That is,
+ <p>Tor allows clients and relays to offer onion services. That is,
you can offer a web server, SSH server, etc., without revealing your
IP address to its users. In fact, because you don't use any public address,
- you can run a hidden service from behind your firewall.
+ you can run an onion service from behind your firewall.
</p>
- <p>If you have Tor installed, you can see hidden services in action
+ <p>If you have Tor installed, you can see onion services in action
by visiting this <a href="http://duskgytldkxiuqc6.onion/">sample
site</a>.
</p>
<p>
- This page describes the steps for setting up your own hidden service
- website. For the technical details of how the hidden service protocol
- works, see our <a href="<page docs/hidden-services>">hidden service
+ This page describes the steps for setting up your own onion service
+ website. For the technical details of how the onion service protocol
+ works, see our <a href="<page docs/hidden-services>">onion service
protocol</a> page.
</p>
@@ -57,10 +57,10 @@
<p>
First, you need to set up a web server locally. Setting up a web
- server can be complex. We're not going to cover how to setup a web
+ server can be complex. We're not going to cover how to set up a web
server here. If you get stuck or want to do more, find a friend who
can help you. We recommend you install a new separate web server for
- your hidden service, since even if you already have one installed,
+ your onion service, since even if you already have one installed,
you may be using it (or want to use it later) for a normal website.
</p>
@@ -69,7 +69,7 @@
information about you, your computer, or your location. Be sure to
bind the web server only to localhost (if people could get to it
directly, they could confirm that your computer is the one offering
- the hidden service). Be sure that its error messages don't list
+ the onion service). Be sure that its error messages don't list
your hostname or other hints. Consider putting the web server in a
sandbox or VM to limit the damage from code vulnerabilities.
</p>
@@ -85,10 +85,10 @@
<hr>
<a id="two"></a>
- <h2><a class="anchor" href="#two">Step Two: Configure your hidden service</a></h2>
+ <h2><a class="anchor" href="#two">Step Two: Configure your onion service</a></h2>
<br>
- <p>Next, you need to configure your hidden service to point to your
+ <p>Next, you need to configure your onion service to point to your
local web server.
</p>
@@ -102,21 +102,21 @@
<p>
This section of the file consists of groups of lines, each representing
- one hidden service. Right now they are all commented out (the lines
- start with #), so hidden services are disabled. Each group of lines
+ one onion service. Right now they are all commented out (the lines
+ start with #), so onion services are disabled. Each group of lines
consists of one <var>HiddenServiceDir</var> line, and one or more
<var>HiddenServicePort</var> lines:</p>
<ul>
- <li><var>HiddenServiceDir</var> is a directory where Tor will store information
- about that hidden service. In particular, Tor will create a file here named
- <var>hostname</var> which will tell you the onion URL. You don't need to
- add any files to this directory. Make sure this is not the same directory
- as the hidserv directory you created when setting up thttpd, as your
- HiddenServiceDir contains secret information!</li>
- <li><var>HiddenServicePort</var> lets you specify a virtual port (that is, what
- port people accessing the hidden service will think they're using) and an
- IP address and port for redirecting connections to this virtual port.</li>
- </ul>
+ <li><var>HiddenServiceDir</var> is a directory where Tor will store
+ information about that onion service. In particular, Tor will create a
+ file here named <var>hostname</var> which will tell you the onion URL. You
+ don't need to add any files to this directory. Make sure this is not the
+ same directory as the hidserv directory you created when setting up thttpd,
+ as your HiddenServiceDir contains secret information!</li>
+ <li><var>HiddenServicePort</var> lets you specify a virtual port (that is,
+ what port people accessing the onion service will think they're using) and
+ an IP address and port for redirecting connections to this virtual
+ port.</li> </ul>
<p>Add the following lines to your torrc:
</p>
@@ -126,17 +126,15 @@
HiddenServicePort 80 127.0.0.1:8080
</pre>
- <p>You're going to want to change the <var>HiddenServiceDir</var> line, so it points
- to an actual directory that is readable/writeable by the user that will
- be running Tor. The above line should work if you're using the OS X Tor
- package. On Unix, try "/home/username/hidden_service/" and fill in your own
- username in place of "username". On Windows you might pick:</p>
- <pre>
- HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
- HiddenServicePort 80 127.0.0.1:8080
- </pre>
+ <p>You're going to want to change the <var>HiddenServiceDir</var> line, so
+ it points to an actual directory that is readable/writeable by the user
+ that will be running Tor. The above line should work if you're using the OS
+ X Tor package. On Unix, try "/home/username/hidden_service/" and fill in
+ your own username in place of "username". On Windows you might pick:</p>
+ <pre> HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
+ HiddenServicePort 80 127.0.0.1:8080 </pre>
- <p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix socket.
+ <p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix sockets.
This means that you can point the <var>HiddenServicePort</var> to a Unix socket:</p>
<pre>
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
@@ -145,22 +143,22 @@
<p>Now save the torrc and restart your tor.</p>
- <p>If Tor starts up again, great. Otherwise, something is wrong. First look at
- your logfiles for hints. It will print some warnings or error messages. That
- should give you an idea what went wrong. Typically there are typos in the torrc
- or wrong directory permissions (See <a href="<page docs/faq>#Logs">the
- logging FAQ entry</a> if you don't know how to enable or find your
- log file.)
- </p>
+ <p>If Tor starts up again, great. Otherwise, something is wrong. First look
+ at your logfiles for hints. It will print some warnings or error messages.
+ That should give you an idea what went wrong. Typically there are typos in
+ the torrc or wrong directory permissions (See <a href="<page
+ docs/faq>#Logs">the logging FAQ entry</a> if you don't know how to enable
+ or find your log file.) </p>
- <p>When Tor starts, it will automatically create the <var>HiddenServiceDir</var>
- that you specified (if necessary), and it will create two files there.</p>
+ <p>When Tor starts, it will automatically create the
+ <var>HiddenServiceDir</var> that you specified (if necessary), and it will
+ create two files there.</p>
<dl>
<dt><var>private_key</var></dt>
- <dd>First, Tor will generate a new public/private keypair for your hidden
+ <dd>First, Tor will generate a new public/private keypair for your onion
service. It is written into a file called "private_key". Don't share this key
- with others -- if you do they will be able to impersonate your hidden
+ with others -- if you do they will be able to impersonate your onion
service.</dd>
<dt><var>hostname</var></dt>
<dd>The other file Tor will create is called "hostname". This contains
@@ -175,7 +173,7 @@
to view these files.</p>
<p>Now that you've restarted Tor, it is busy picking introduction points
- in the Tor network, and generating a <em>hidden service
+ in the Tor network, and generating an <em>onion service
descriptor</em>. This is a signed list of introduction points along with
the service's full public key. It anonymously publishes this descriptor
to the directory servers, and other people anonymously fetch it from the
@@ -197,9 +195,9 @@
want to make a backup copy of the <var>private_key</var> file somewhere.
</p>
- <p>If you want to forward multiple virtual ports for a single hidden
+ <p>If you want to forward multiple virtual ports for a single onion
service, just add more <var>HiddenServicePort</var> lines.
- If you want to run multiple hidden services from the same Tor
+ If you want to run multiple onion services from the same Tor
client, just add another <var>HiddenServiceDir</var> line. All the following
<var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
you add another <var>HiddenServiceDir</var> line:
@@ -214,12 +212,12 @@
HiddenServicePort 22 127.0.0.1:22
</pre>
- <p>Hidden services operators need to practice proper operational security
+ <p>Onion services operators need to practice proper operational security
and system administration to maintain security. For some security
suggestions please make sure you read over Riseup's <a
- href="https://help.riseup.net/en/security/network-security/tor/onionservices-best…">"Tor
- hidden services best practices" document</a>. Also, here are some more
- anonymity issues you should keep in mind:
+ href="https://help.riseup.net/en/security/network-security/tor/onionservices-best…">"Tor
+ Hidden (Onion) Services Best Practices" document</a>. Also, here are some
+ more anonymity issues you should keep in mind:
</p>
<ul>
@@ -227,27 +225,26 @@
identifying information about you, your computer, or your location.
For example, readers can probably determine whether it's thttpd or
Apache, and learn something about your operating system.</li>
- <li>If your computer isn't online all the time, your hidden service
+ <li>If your computer isn't online all the time, your onion service
won't be either. This leaks information to an observant adversary.</li>
- <li>It is generally a better idea to host hidden services on a Tor client
+ <li>It is generally a better idea to host onion services on a Tor client
rather than a Tor relay, since relay uptime and other properties are
publicly visible.</li>
- <li>The longer a hidden is online, the higher the risk that its
+ <li>The longer an onion service is online, the higher the risk that its
location is discovered. The most prominent attacks are building a
- profile of the hidden service's availability and matching induced
+ profile of the onion service's availability and matching induced
traffic patterns.</li>
</ul>
<p>Another common issue is whether to use HTTPS on your relay or
not. Have a look at this <a
- href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a>
- on the Tor Blog to learn more about these issues.
+ href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a> on the Tor Blog to learn more about these issues.
</p>
<p>Finally, feel free to use the <a
href="https://lists.torproject.org/pipermail/tor-onions/">[tor-onions]
mailing list</a> to discuss the secure administration and operation of
- Tor hidden services.</p>
+ Tor onion services.</p>
</div>
<!-- END MAINCOL -->
diff --git a/docs/torbutton/en/sidenav.wmi b/docs/torbutton/en/sidenav.wmi
index 091a3491..85f63833 100644
--- a/docs/torbutton/en/sidenav.wmi
+++ b/docs/torbutton/en/sidenav.wmi
@@ -53,7 +53,7 @@
'txt' => 'Configuring a Relay graphically',
},
{'url' => 'docs/tor-hidden-service',
- 'txt' => 'Configuring a Hidden Service',
+ 'txt' => 'Configuring an Onion Service',
},
{'url' => 'docs/bridges',
'txt' => 'Configuring a Bridge Relay',
diff --git a/donate/en/donor-faq.wml b/donate/en/donor-faq.wml
index 59a7d8c1..ae349006 100644
--- a/donate/en/donor-faq.wml
+++ b/donate/en/donor-faq.wml
@@ -88,7 +88,7 @@
</li>
<li>
<p><strong>I would like to know more about how Tor works,
- what hidden services are, or how to run a relay.</strong></p>
+ what onion services are, or how to run a relay.</strong></p>
<p><a href="<page docs/faq>"
target="_blank">This Tor Project FAQ</a> has answers to all
those questions, and more.</p>
diff --git a/getinvolved/en/volunteer.wml b/getinvolved/en/volunteer.wml
index 4b904cca..0680a0bd 100644
--- a/getinvolved/en/volunteer.wml
+++ b/getinvolved/en/volunteer.wml
@@ -14,7 +14,7 @@
<ol>
<li>Please consider <a href="<page docs/tor-doc-relay>">running
a relay</a> to help the Tor network grow.</li>
- <li>Tell your friends! Get them to run relays. Get them to run hidden
+ <li>Tell your friends! Get them to run relays. Get them to run onion
services. Get them to tell their friends.</li>
<li>If you like Tor's goals, please <a href="<page donate/donate>">take a moment
to donate to support further Tor development</a>. We're also looking
@@ -378,12 +378,12 @@ meetings around the world.</li>
<p>
<b>Project Ideas:</b><br />
- <i><a href="#improveHiddenServices">Help improve Tor hidden services</a></i><br />
+ <i><a href="#improveOnionServices">Help improve Tor onion services</a></i><br />
<i><a href="#torFuzzing">Fuzzing coverage of Tor</a></i><br />
<i><a href="#relayCryptoParallelism">Relay crypto parallelism</a></i><br />
<i><a href="#anonymousLocalCountStatistics">Anonymous local count statistics</a></i><br />
<i><a href="#improveSocks5Variant">Improved SOCKS5 variant</a></i><br />
- <i><a href="#hiddenServiceCryptoParallelism">Hidden service crypto parallelism</a></i><br />
+ <i><a href="#onionServiceCryptoParallelism">Onion service crypto parallelism</a></i><br />
<i><a href="#supportAllDNS">Support all kinds of DNS in Tor</a></i><br />
<i><a href="#improveIpv6Support">Improve IPv6 support</a></i>
</p>
@@ -765,28 +765,29 @@ meetings around the world.</li>
<ol>
- <a id="improveHiddenServices"></a>
+ #Keep old ids in case of incoming links.
+ <a id="improveOnionServices"></a><a id="improveHiddenServices"></a>
<li>
- <b>Help improve Tor hidden services</b>
+ <b>Help improve Tor onion services</b>
<br>
Language: <i>C</i>
<br>
Likely Mentors: <i>George (asn), David Goulet (dgoulet)</i>
<br><br>
<p>
-The hidden services team is busy implementing <a
+The onion services team is busy implementing <a
href="https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.t…">proposal
-224</a> but we are always open to mentoring fun and exciting hidden
+224</a> but we are always open to mentoring fun and exciting onion
service projects.
</p>
<p>
-In the past, we've mentored a wide variety of projects related to hidden
+In the past, we've mentored a wide variety of projects related to onion
services, ranging from <a
href="https://lists.torproject.org/pipermail/tor-dev/2016-April/010832.html">onion
search engines</a>, <a
href="https://lists.torproject.org/pipermail/tor-talk/2015-May/037966.html">to
-scaling techniques for hidden services</a>,
+scaling techniques for onion services</a>,
and also various approaches
of making onion services more <a
href="https://lists.torproject.org/pipermail/tor-dev/2012-June/003588.html">usable</a>
@@ -892,24 +893,25 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/12
</p>
</li>
- <a id="hiddenServiceCryptoParallelism"></a>
+ #Keep old ids in case of incoming links.
+ <a id="onionServiceCryptoParallelism"></a><a id="hiddenServiceCryptoParallelism"></a>
<li>
- <b>Hidden service crypto parallelism</b>
+ <b>Onion service crypto parallelism</b>
<br>
Likely Mentors: <i>Nick (nickm), David Goulet (dgoulet)</i>
<br><br>
<p>
-Hidden services, hidden service clients, hidden service directories,
+Onion services, onion service clients, onion service directories,
and introduction points all need to do a few public-key operations as
they operate. But right now, these operations are all done on the
main thread. It would be good to have these run across multiple cores.
</p>
<p>
-This could probably be done in a way similar to how we currently hand
+This could probably be done in a way similar to how we currently handle
circuit extension handshakes in onion.c and cpuworker.c, but we'd need
-to extend the state machine for hidden services to add an additional
-state. It could help hidden services operate much more efficiently.
+to extend the state machine for onion services to add an additional
+state. It could help onion services operate much more efficiently.
</p>
<p>
@@ -1060,13 +1062,13 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
<a id="ahmiaSearch"></a>
<li>
- <b>Ahmia - Hidden Service Search</b>
+ <b>Ahmia - Onion Service Search</b>
<br>
Language: <i>Python, Django</i>
<br>
Likely Mentors: <i>Juha Nurmi (numes), George (asn)</i>
<p>
- Ahmia is open-source search engine software for Tor hidden service deep
+ Ahmia is open-source search engine software for Tor onion service deep
dark web sites. You can test the running search engine at ahmia.fi. For
more information see our <a
href="https://blog.torproject.org/category/tags/ahmiafi">blog post about
@@ -1075,7 +1077,7 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
<p>
Ahmia is a working search engine that indexes, searches, and catalogs
- content published on Tor Hidden Services. Furthermore, it is an environment
+ content published on Tor Onion Services. Furthermore, it is an environment
to share meaningful insights, statistics, insights, and news about the Tor
network itself. In this context, there is a lot of work to do.
</p>
@@ -1098,7 +1100,7 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
<li>Remove these sites from the search results</li>
</ul>
</li>
- <li>Add hidden services funtion (very important)<br />
+ <li>Add onion services function (very important)<br />
<ul>
<li>You can add onions using HTML form</li>
<li>Call the crawler immidiately when a new site is added</li>
diff --git a/include/foot.wmi b/include/foot.wmi
index c7e97aac..83adcde8 100644
--- a/include/foot.wmi
+++ b/include/foot.wmi
@@ -45,7 +45,7 @@
<ul>
<li><a href="<page donate/donate-foot>">Donate</a></li>
<li><a href="<page docs/documentation>#MailingLists">Mailing Lists</a></li>
- <li><a href="<page docs/hidden-services>">Hidden Services</a></li>
+ <li><a href="<page docs/hidden-services>">Onion Services</a></li>
<li><a href="<page getinvolved/translation>">Translations</a></li>
# <li><a href="<page getinvolved/open-positions>">Careers</a></li>
</ul>
diff --git a/projects/en/tordnsel.wml b/projects/en/tordnsel.wml
index 7d661c72..37f83344 100644
--- a/projects/en/tordnsel.wml
+++ b/projects/en/tordnsel.wml
@@ -72,16 +72,16 @@
<h2>How can I run my own private TorDNSEL?</h2>
<p>You can learn all about the code for TorDNSEL by visiting the <a
- href="http://p56soo2ibjkx23xo.onion/">official hidden service</a> through
+ href="http://p56soo2ibjkx23xo.onion/">official onion service</a> through
Tor.</p>
<p>You can download the latest source release from the <a
- href="http://p56soo2ibjkx23xo.onion/dist/tordnsel-0.0.6.tar.gz">hidden
+ href="http://p56soo2ibjkx23xo.onion/dist/tordnsel-0.0.6.tar.gz">onion
service</a> or from a
<a href="/tordnsel/dist/tordnsel-0.0.6.tar.gz">
local mirror</a>. It's
probably wise to check out the current revision from the darcs repository
- hosted on the aforementioned hidden service.</p>
+ hosted on the aforementioned onion service.</p>
<p>For more information or to report something useful, please email
the
1
0

[webwml/staging] Update images to reflect onion (rather than hidden) terminology. (See #24286)
by hiro@torproject.org 21 Dec '17
by hiro@torproject.org 21 Dec '17
21 Dec '17
commit 78d9c75b2174e855a9d19e8a030112edf232b303
Author: kat <kat(a)torproject.org>
Date: Sun Nov 19 14:42:58 2017 -0500
Update images to reflect onion (rather than hidden) terminology. (See #24286)
---
docs/en/hidden-services.wml | 12 ++++++------
images/THS-1.png | Bin 56150 -> 0 bytes
images/THS-2.png | Bin 63666 -> 0 bytes
images/THS-3.png | Bin 72324 -> 0 bytes
images/THS-4.png | Bin 71297 -> 0 bytes
images/THS-5.png | Bin 73455 -> 0 bytes
images/THS-6.png | Bin 60054 -> 0 bytes
images/tor-onion-services-1.png | Bin 0 -> 17222 bytes
images/tor-onion-services-2.png | Bin 0 -> 19207 bytes
images/tor-onion-services-3.png | Bin 0 -> 22213 bytes
images/tor-onion-services-4.png | Bin 0 -> 21419 bytes
images/tor-onion-services-5.png | Bin 0 -> 22165 bytes
images/tor-onion-services-6.png | Bin 0 -> 18018 bytes
13 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/docs/en/hidden-services.wml b/docs/en/hidden-services.wml
index 12e8e2f6..6dc141b9 100644
--- a/docs/en/hidden-services.wml
+++ b/docs/en/hidden-services.wml
@@ -36,7 +36,7 @@
onion server's location (IP address).
</p>
- <img alt="Tor onion service step one" src="$(IMGROOT)/THS-1.png">
+ <img alt="Tor onion service step one" src="$(IMGROOT)/tor-onion-services-1.png">
# maybe add a speech bubble containing "PK" to Bob, because that's what
# Bob tells to his introduction points
@@ -60,7 +60,7 @@
href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
design for onion service names? </p>
- <img alt="Tor onion service step two" src="$(IMGROOT)/THS-2.png">
+ <img alt="Tor onion service step two" src="$(IMGROOT)/tor-onion-services-2.png">
# maybe replace "database" with "DHT"; further: how incorrect
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in
# use?
@@ -78,7 +78,7 @@
by telling it a one-time secret.
</p>
- <img alt="Tor onion service step three" src="$(IMGROOT)/THS-3.png">
+ <img alt="Tor onion service step three" src="$(IMGROOT)/tor-onion-services-3.png">
# maybe add "cookie" to speech bubble, separated from the surrounded
# "IP1-3" and "PK"
@@ -93,7 +93,7 @@
to the client's IP address, so the client remains anonymous.
</p>
- <img alt="Tor onion service step four" src="$(IMGROOT)/THS-4.png">
+ <img alt="Tor onion service step four" src="$(IMGROOT)/tor-onion-services-4.png">
<p>
Step five: The onion service decrypts the client's introduce message
@@ -115,7 +115,7 @@
Servers</a>.
</p>
- <img alt="Tor onion service step five" src="$(IMGROOT)/THS-5.png">
+ <img alt="Tor onion service step five" src="$(IMGROOT)/tor-onion-services-5.png">
# it should say "Bob connects to Alice's ..."
<p>
@@ -140,7 +140,7 @@
service.
</p>
- <img alt="Tor onion service step six" src="$(IMGROOT)/THS-6.png">
+ <img alt="Tor onion service step six" src="$(IMGROOT)/tor-onion-services-6.png">
<p>
There are more detailed descriptions about the onion service protocol than
diff --git a/images/THS-1.png b/images/THS-1.png
deleted file mode 100644
index 895d7cd6..00000000
Binary files a/images/THS-1.png and /dev/null differ
diff --git a/images/THS-2.png b/images/THS-2.png
deleted file mode 100644
index 48389ca6..00000000
Binary files a/images/THS-2.png and /dev/null differ
diff --git a/images/THS-3.png b/images/THS-3.png
deleted file mode 100644
index 0418e96d..00000000
Binary files a/images/THS-3.png and /dev/null differ
diff --git a/images/THS-4.png b/images/THS-4.png
deleted file mode 100644
index 7122b682..00000000
Binary files a/images/THS-4.png and /dev/null differ
diff --git a/images/THS-5.png b/images/THS-5.png
deleted file mode 100644
index f53506f8..00000000
Binary files a/images/THS-5.png and /dev/null differ
diff --git a/images/THS-6.png b/images/THS-6.png
deleted file mode 100644
index 82c0ed38..00000000
Binary files a/images/THS-6.png and /dev/null differ
diff --git a/images/tor-onion-services-1.png b/images/tor-onion-services-1.png
new file mode 100644
index 00000000..75de3660
Binary files /dev/null and b/images/tor-onion-services-1.png differ
diff --git a/images/tor-onion-services-2.png b/images/tor-onion-services-2.png
new file mode 100644
index 00000000..4081cdb0
Binary files /dev/null and b/images/tor-onion-services-2.png differ
diff --git a/images/tor-onion-services-3.png b/images/tor-onion-services-3.png
new file mode 100644
index 00000000..3a948ac0
Binary files /dev/null and b/images/tor-onion-services-3.png differ
diff --git a/images/tor-onion-services-4.png b/images/tor-onion-services-4.png
new file mode 100644
index 00000000..88db9704
Binary files /dev/null and b/images/tor-onion-services-4.png differ
diff --git a/images/tor-onion-services-5.png b/images/tor-onion-services-5.png
new file mode 100644
index 00000000..c171d71b
Binary files /dev/null and b/images/tor-onion-services-5.png differ
diff --git a/images/tor-onion-services-6.png b/images/tor-onion-services-6.png
new file mode 100644
index 00000000..23f9f713
Binary files /dev/null and b/images/tor-onion-services-6.png differ
1
0
commit cafc6b4a8a8259b739403000d2d3c19daebbde11
Author: Matt Traudt <sirmatt(a)ksu.edu>
Date: Thu Jun 15 09:04:22 2017 -0400
typo serveral->several
---
docs/en/faq.wml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/en/faq.wml b/docs/en/faq.wml
index 94c2b7ae..608261bc 100644
--- a/docs/en/faq.wml
+++ b/docs/en/faq.wml
@@ -682,7 +682,7 @@ with more funding?</a></h3>
<p>
The Tor network's <a
-href="https://metrics.torproject.org/networksize.html">serveral thousand</a>
+href="https://metrics.torproject.org/networksize.html">several thousand</a>
relays push <a
href="https://metrics.torproject.org/bandwidth.html">around 100 Gbps on
average</a>. We have <a
1
0
commit 7ab6c48ff2aa7afbd24fee0f213a15b0420feb23
Author: Nicolas Vigier <boklm(a)torproject.org>
Date: Fri Nov 17 12:22:20 2017 +0100
Unrecommend old alpha versions
---
projects/torbrowser/RecommendedTBBVersions | 7 -------
1 file changed, 7 deletions(-)
diff --git a/projects/torbrowser/RecommendedTBBVersions b/projects/torbrowser/RecommendedTBBVersions
index a93fb745..f251c2cc 100644
--- a/projects/torbrowser/RecommendedTBBVersions
+++ b/projects/torbrowser/RecommendedTBBVersions
@@ -3,13 +3,6 @@
"7.0.10-MacOS",
"7.0.10-Linux",
"7.0.10-Windows",
-"7.5a5",
-"7.5a5-Windows",
-"7.5a6",
-"7.5a6-Windows",
-"7.5a7",
-"7.5a7-MacOS",
-"7.5a7-Linux",
"7.5a8",
"7.5a8-MacOS",
"7.5a8-Linux",
1
0
commit 3808ea5b4c8464227fc57fc7cc4bbea9322b523d
Author: Nicolas Vigier <boklm(a)torproject.org>
Date: Fri Nov 17 12:19:12 2017 +0100
Update tor browser sandbox version
---
include/versions.wmi | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/versions.wmi b/include/versions.wmi
index b31256b6..bff9eecf 100644
--- a/include/versions.wmi
+++ b/include/versions.wmi
@@ -38,7 +38,7 @@
<let version-torbrowserbundleosx64beta=version-torbrowserbundlebeta-all />
<let releasedate-torbrowserbundleosx64beta=releasedate-torbrowserbundlebeta-all />
-<define-tag version-torbrowsersandboxlinux whitespace=delete>0.0.14</define-tag>
+<define-tag version-torbrowsersandboxlinux whitespace=delete>0.0.15</define-tag>
<define-tag file-source-stable whitespace=delete>tor-<version-stable>.tar.gz</define-tag>
1
0
commit c9be58275d14ab068a0f6e429f44cbaa42bf6e3c
Author: kat <kat(a)torproject.org>
Date: Sun Nov 19 16:01:11 2017 -0500
Change hidden -> onion. (See #24285)
Renamed files, made new files with old names for redirects, updated
links to use new URLs.
---
about/en/overview.wml | 2 +-
docs/en/faq-abuse.wml | 2 +-
docs/en/faq.wml | 2 +-
docs/en/hidden-services.wml | 159 +------------------------
docs/en/onion-services.wml | 162 ++++++++++++++++++++++++++
docs/en/sidenav.wmi | 2 +-
docs/en/tor-hidden-service.wml | 255 +---------------------------------------
docs/en/tor-onion-service.wml | 258 +++++++++++++++++++++++++++++++++++++++++
docs/torbutton/en/sidenav.wmi | 2 +-
include/foot.wmi | 2 +-
10 files changed, 430 insertions(+), 416 deletions(-)
diff --git a/about/en/overview.wml b/about/en/overview.wml
index 11d1fdcb..d60f1c39 100644
--- a/about/en/overview.wml
+++ b/about/en/overview.wml
@@ -46,7 +46,7 @@
Individuals use Tor to keep websites from tracking them and their family
members, or to connect to news sites, instant messaging services, or the
like when these are blocked by their local Internet providers. Tor's <a
- href="<page docs/hidden-services>">onion services</a>
+ href="<page docs/onion-services>">onion services</a>
let users publish web sites and other services without needing to reveal
the location of the site. Individuals also use Tor for socially sensitive
communication: chat rooms and web forums for rape and abuse survivors,
diff --git a/docs/en/faq-abuse.wml b/docs/en/faq-abuse.wml
index 484865f7..d916bf97 100644
--- a/docs/en/faq-abuse.wml
+++ b/docs/en/faq-abuse.wml
@@ -353,7 +353,7 @@ using technology?</a></li>
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
<p>The Tor Project does not host, control, nor have the ability to
discover the owner or location of a .onion address. The .onion address is
- an address from <a href="<page docs/hidden-services>">an onion
+ an address from <a href="<page docs/onion-services>">an onion
service</a>. The name you see ending in .onion is an onion service descriptor.
It's an automatically generated name which can be located on any Tor
relay or client anywhere on the Internet. Onion services are designed
diff --git a/docs/en/faq.wml b/docs/en/faq.wml
index a558a8fd..65d476ee 100644
--- a/docs/en/faq.wml
+++ b/docs/en/faq.wml
@@ -3062,7 +3062,7 @@ diversity,
onion service?</a></h3>
<p>
- See the <a href="<page docs/tor-hidden-service>">
+ See the <a href="<page docs/tor-onion-service>">
official onion service configuration instructions</a>.
</p>
diff --git a/docs/en/hidden-services.wml b/docs/en/hidden-services.wml
index 6dc141b9..a5da823a 100644
--- a/docs/en/hidden-services.wml
+++ b/docs/en/hidden-services.wml
@@ -1,162 +1,7 @@
## translation metadata
# Revision: $Revision$
-# Translation-Priority: 3-low
+# Status: obsolete
-#include "head.wmi" TITLE="Tor: Onion Service Protocol" CHARSET="UTF-8"
-<div id="content" class="clearfix">
- <div id="breadcrumbs">
- <a href="<page index>">Home » </a>
- <a href="<page docs/documentation>">Documentation » </a>
- <a href="<page docs/hidden-services>">Onion Services</a>
- </div>
- <div id="maincol">
- <h2>Tor: Onion Service Protocol</h2>
- <hr>
+#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/onion-services"
- <p>
- Tor makes it possible for users to hide their locations while offering
- various kinds of services, such as web publishing or an instant
- messaging server. Using Tor "rendezvous points," other Tor users can
- connect to these onion services, formerly known as hidden services, each
- without knowing the other's network identity. This page describes the
- technical details of how this rendezvous protocol works. For a more direct
- how-to, see our <a href="<page docs/tor-hidden-service>">configuring onion
- services</a> page. </p>
-
- <p>
- An onion service needs to advertise its existence in the Tor network before
- clients will be able to contact it. Therefore, the service randomly picks
- some relays, builds circuits to them, and asks them to act as
- <em>introduction points</em> by telling them its public key. Note
- that in the following figures the green links are circuits rather
- than direct connections. By using a full Tor circuit, it's hard for
- anyone to associate an introduction point with the onion server's IP
- address. While the introduction points and others are told the onion
- service's identity (public key), we don't want them to learn about the
- onion server's location (IP address).
- </p>
-
- <img alt="Tor onion service step one" src="$(IMGROOT)/tor-onion-services-1.png">
- # maybe add a speech bubble containing "PK" to Bob, because that's what
- # Bob tells to his introduction points
-
- <p>
- Step two: the onion service assembles an <em>onion service descriptor</em>,
- containing its public key and a summary of each introduction point, and
- signs this descriptor with its private key. It uploads that descriptor to
- a distributed hash table. The descriptor will be found by clients
- requesting XYZ.onion where XYZ is a 16 character name derived from the
- service's public key. After this step, the onion service is set up. </p>
-
- <p>
- Although it might seem impractical to use an automatically-generated
- service name, it serves an important goal: Everyone – including
- the introduction points, the distributed hash table directory, and of
- course the clients – can verify that they are talking to the right
- onion service. See also <a
- href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
- conjecture</a> that out of Decentralized, Secure, and Human-Meaningful, you
- can achieve at most two. Perhaps one day somebody will implement a <a
- href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
- design for onion service names? </p>
-
- <img alt="Tor onion service step two" src="$(IMGROOT)/tor-onion-services-2.png">
- # maybe replace "database" with "DHT"; further: how incorrect
- # is it to *not* add DB to the Tor cloud, now that begin dir cells are in
- # use?
-
- <p>
- Step three: A client that wants to contact an onion service needs
- to learn about its onion address first. After that, the client can
- initiate connection establishment by downloading the descriptor from
- the distributed hash table. If there is a descriptor for XYZ.onion
- (the onion service could also be offline or have left long ago,
- or there could be a typo in the onion address), the client now
- knows the set of introduction points and the right public key to
- use. Around this time, the client also creates a circuit to another
- randomly picked relay and asks it to act as <em>rendezvous point</em>
- by telling it a one-time secret.
- </p>
-
- <img alt="Tor onion service step three" src="$(IMGROOT)/tor-onion-services-3.png">
- # maybe add "cookie" to speech bubble, separated from the surrounded
- # "IP1-3" and "PK"
-
- <p>
- Step four: When the descriptor is present and the rendezvous
- point is ready, the client assembles an <em>introduce</em> message
- (encrypted to the onion service's public key) including the address
- of the rendezvous point and the one-time secret. The client sends
- this message to one of the introduction points, requesting it be
- delivered to the onion service. Again, communication takes place
- via a Tor circuit: nobody can relate sending the introduce message
- to the client's IP address, so the client remains anonymous.
- </p>
-
- <img alt="Tor onion service step four" src="$(IMGROOT)/tor-onion-services-4.png">
-
- <p>
- Step five: The onion service decrypts the client's introduce message
- and finds the address of the rendezvous point and the one-time secret
- in it. The service creates a circuit to the rendezvous point and
- sends the one-time secret to it in a rendezvous message.
- </p>
-
- <p>
- At this point it is of special importance that the onion service sticks to
- the same set of <a
- href="<wikifaq>#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
- guards</a> when creating new circuits. Otherwise an attacker
- could run his own relay and force an onion service to create an arbitrary
- number of circuits in the hope that the corrupt relay is picked as entry
- node and he learns the onion server's IP address via timing analysis. This
- attack was described by Øverlier and Syverson in their paper titled
- <a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
- Servers</a>.
- </p>
-
- <img alt="Tor onion service step five" src="$(IMGROOT)/tor-onion-services-5.png">
- # it should say "Bob connects to Alice's ..."
-
- <p>
- In the last step, the rendezvous point notifies the client about successful
- connection establishment. After that, both client and onion service can
- use their circuits to the rendezvous point for communicating with each
- other. The rendezvous point simply relays (end-to-end encrypted) messages
- from client to service and vice versa.
- </p>
-
- <p>
- One of the reasons for not using the introduction circuit
- for actual communication is that no single relay should
- appear to be responsible for a given onion service. This is why the
- rendezvous point never learns about the onion service's identity.
- </p>
-
- <p>
- In general, the complete connection between client and onion service
- consists of 6 relays: 3 of them were picked by the client with the third
- being the rendezvous point and the other 3 were picked by the onion
- service.
- </p>
-
- <img alt="Tor onion service step six" src="$(IMGROOT)/tor-onion-services-6.png">
-
- <p>
- There are more detailed descriptions about the onion service protocol than
- this one. See the
- <a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
- for an in-depth design description and the
- <a href="<specblob>rend-spec.txt">rendezvous specification</a>
- for the message formats.
- </p>
- </div>
- <!-- END MAINCOL -->
- <div id = "sidecol">
-#include "side.wmi"
-#include "info.wmi"
- </div>
- <!-- END SIDECOL -->
-</div>
-<!-- END CONTENT -->
#include <foot.wmi>
diff --git a/docs/en/onion-services.wml b/docs/en/onion-services.wml
new file mode 100644
index 00000000..a73ff7d3
--- /dev/null
+++ b/docs/en/onion-services.wml
@@ -0,0 +1,162 @@
+## translation metadata
+# Revision: $Revision$
+# Translation-Priority: 3-low
+
+#include "head.wmi" TITLE="Tor: Onion Service Protocol" CHARSET="UTF-8"
+<div id="content" class="clearfix">
+ <div id="breadcrumbs">
+ <a href="<page index>">Home » </a>
+ <a href="<page docs/documentation>">Documentation » </a>
+ <a href="<page docs/onion-services>">Onion Services</a>
+ </div>
+ <div id="maincol">
+ <h2>Tor: Onion Service Protocol</h2>
+ <hr>
+
+ <p>
+ Tor makes it possible for users to hide their locations while offering
+ various kinds of services, such as web publishing or an instant
+ messaging server. Using Tor "rendezvous points," other Tor users can
+ connect to these onion services, formerly known as hidden services, each
+ without knowing the other's network identity. This page describes the
+ technical details of how this rendezvous protocol works. For a more direct
+ how-to, see our <a href="<page docs/tor-onion-service>">configuring onion
+ services</a> page. </p>
+
+ <p>
+ An onion service needs to advertise its existence in the Tor network before
+ clients will be able to contact it. Therefore, the service randomly picks
+ some relays, builds circuits to them, and asks them to act as
+ <em>introduction points</em> by telling them its public key. Note
+ that in the following figures the green links are circuits rather
+ than direct connections. By using a full Tor circuit, it's hard for
+ anyone to associate an introduction point with the onion server's IP
+ address. While the introduction points and others are told the onion
+ service's identity (public key), we don't want them to learn about the
+ onion server's location (IP address).
+ </p>
+
+ <img alt="Tor onion service step one" src="$(IMGROOT)/tor-onion-services-1.png">
+ # maybe add a speech bubble containing "PK" to Bob, because that's what
+ # Bob tells to his introduction points
+
+ <p>
+ Step two: the onion service assembles an <em>onion service descriptor</em>,
+ containing its public key and a summary of each introduction point, and
+ signs this descriptor with its private key. It uploads that descriptor to
+ a distributed hash table. The descriptor will be found by clients
+ requesting XYZ.onion where XYZ is a 16 character name derived from the
+ service's public key. After this step, the onion service is set up. </p>
+
+ <p>
+ Although it might seem impractical to use an automatically-generated
+ service name, it serves an important goal: Everyone – including
+ the introduction points, the distributed hash table directory, and of
+ course the clients – can verify that they are talking to the right
+ onion service. See also <a
+ href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
+ conjecture</a> that out of Decentralized, Secure, and Human-Meaningful, you
+ can achieve at most two. Perhaps one day somebody will implement a <a
+ href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
+ design for onion service names? </p>
+
+ <img alt="Tor onion service step two" src="$(IMGROOT)/tor-onion-services-2.png">
+ # maybe replace "database" with "DHT"; further: how incorrect
+ # is it to *not* add DB to the Tor cloud, now that begin dir cells are in
+ # use?
+
+ <p>
+ Step three: A client that wants to contact an onion service needs
+ to learn about its onion address first. After that, the client can
+ initiate connection establishment by downloading the descriptor from
+ the distributed hash table. If there is a descriptor for XYZ.onion
+ (the onion service could also be offline or have left long ago,
+ or there could be a typo in the onion address), the client now
+ knows the set of introduction points and the right public key to
+ use. Around this time, the client also creates a circuit to another
+ randomly picked relay and asks it to act as <em>rendezvous point</em>
+ by telling it a one-time secret.
+ </p>
+
+ <img alt="Tor onion service step three" src="$(IMGROOT)/tor-onion-services-3.png">
+ # maybe add "cookie" to speech bubble, separated from the surrounded
+ # "IP1-3" and "PK"
+
+ <p>
+ Step four: When the descriptor is present and the rendezvous
+ point is ready, the client assembles an <em>introduce</em> message
+ (encrypted to the onion service's public key) including the address
+ of the rendezvous point and the one-time secret. The client sends
+ this message to one of the introduction points, requesting it be
+ delivered to the onion service. Again, communication takes place
+ via a Tor circuit: nobody can relate sending the introduce message
+ to the client's IP address, so the client remains anonymous.
+ </p>
+
+ <img alt="Tor onion service step four" src="$(IMGROOT)/tor-onion-services-4.png">
+
+ <p>
+ Step five: The onion service decrypts the client's introduce message
+ and finds the address of the rendezvous point and the one-time secret
+ in it. The service creates a circuit to the rendezvous point and
+ sends the one-time secret to it in a rendezvous message.
+ </p>
+
+ <p>
+ At this point it is of special importance that the onion service sticks to
+ the same set of <a
+ href="<wikifaq>#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
+ guards</a> when creating new circuits. Otherwise an attacker
+ could run his own relay and force an onion service to create an arbitrary
+ number of circuits in the hope that the corrupt relay is picked as entry
+ node and he learns the onion server's IP address via timing analysis. This
+ attack was described by Øverlier and Syverson in their paper titled
+ <a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
+ Servers</a>.
+ </p>
+
+ <img alt="Tor onion service step five" src="$(IMGROOT)/tor-onion-services-5.png">
+ # it should say "Bob connects to Alice's ..."
+
+ <p>
+ In the last step, the rendezvous point notifies the client about successful
+ connection establishment. After that, both client and onion service can
+ use their circuits to the rendezvous point for communicating with each
+ other. The rendezvous point simply relays (end-to-end encrypted) messages
+ from client to service and vice versa.
+ </p>
+
+ <p>
+ One of the reasons for not using the introduction circuit
+ for actual communication is that no single relay should
+ appear to be responsible for a given onion service. This is why the
+ rendezvous point never learns about the onion service's identity.
+ </p>
+
+ <p>
+ In general, the complete connection between client and onion service
+ consists of 6 relays: 3 of them were picked by the client with the third
+ being the rendezvous point and the other 3 were picked by the onion
+ service.
+ </p>
+
+ <img alt="Tor onion service step six" src="$(IMGROOT)/tor-onion-services-6.png">
+
+ <p>
+ There are more detailed descriptions about the onion service protocol than
+ this one. See the
+ <a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
+ for an in-depth design description and the
+ <a href="<specblob>rend-spec.txt">rendezvous specification</a>
+ for the message formats.
+ </p>
+ </div>
+ <!-- END MAINCOL -->
+ <div id = "sidecol">
+#include "side.wmi"
+#include "info.wmi"
+ </div>
+ <!-- END SIDECOL -->
+</div>
+<!-- END CONTENT -->
+#include <foot.wmi>
diff --git a/docs/en/sidenav.wmi b/docs/en/sidenav.wmi
index 9de6463d..926a3141 100644
--- a/docs/en/sidenav.wmi
+++ b/docs/en/sidenav.wmi
@@ -51,7 +51,7 @@
{'url' => 'docs/tor-doc-relay',
'txt' => 'Configuring a Relay graphically',
},
- {'url' => 'docs/tor-hidden-service',
+ {'url' => 'docs/tor-onion-service',
'txt' => 'Configuring an Onion Service',
},
{'url' => 'docs/bridges',
diff --git a/docs/en/tor-hidden-service.wml b/docs/en/tor-hidden-service.wml
index 854843ea..de687709 100644
--- a/docs/en/tor-hidden-service.wml
+++ b/docs/en/tor-hidden-service.wml
@@ -1,258 +1,7 @@
## translation metadata
# Revision: $Revision$
-# Translation-Priority: 3-low
+# Status: obsolete
-#include "head.wmi" TITLE="Tor Project: Onion Service Configuration Instructions" CHARSET="UTF-8"
-<div id="content" class="clearfix">
- <div id="breadcrumbs">
- <a href="<page index>">Home » </a>
- <a href="<page docs/documentation>">Documentation » </a>
- <a href="<page docs/tor-hidden-service>">Tor Onion Service</a>
- </div>
- <div id="maincol">
- <h1>Configuring Onion Services for <a href="<page index>">Tor</a></h1>
- <hr>
+#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/tor-onion-service"
- <p>Tor allows clients and relays to offer onion services. That is,
- you can offer a web server, SSH server, etc., without revealing your
- IP address to its users. In fact, because you don't use any public address,
- you can run an onion service from behind your firewall.
- </p>
-
- <p>If you have Tor installed, you can see onion services in action
- by visiting this <a href="http://duskgytldkxiuqc6.onion/">sample
- site</a>.
- </p>
-
- <p>
- This page describes the steps for setting up your own onion service
- website. For the technical details of how the onion service protocol
- works, see our <a href="<page docs/hidden-services>">onion service
- protocol</a> page.
- </p>
-
- <hr>
- <a id="zero"></a>
- <h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2>
- <br>
-
- <p>Before you start, you need to make sure:</p>
- <ol>
- <li>Tor is up and running,</li>
- <li>You actually set it up correctly.</li>
- </ol>
-
- <p>Windows users should follow the <a
- href="<page docs/tor-doc-windows>">Windows
- howto</a>, OS X users should follow the <a
- href="<page docs/tor-doc-osx>">OS
- X howto</a>, and Linux/BSD/Unix users should follow the <a
- href="<page docs/tor-doc-unix>">Unix howto</a>.
- </p>
-
- <hr>
- <a id="one"></a>
- <h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2>
- <br>
-
- <p>
- First, you need to set up a web server locally. Setting up a web
- server can be complex. We're not going to cover how to set up a web
- server here. If you get stuck or want to do more, find a friend who
- can help you. We recommend you install a new separate web server for
- your onion service, since even if you already have one installed,
- you may be using it (or want to use it later) for a normal website.
- </p>
-
- <p>
- You need to configure your web server so it doesn't give away any
- information about you, your computer, or your location. Be sure to
- bind the web server only to localhost (if people could get to it
- directly, they could confirm that your computer is the one offering
- the onion service). Be sure that its error messages don't list
- your hostname or other hints. Consider putting the web server in a
- sandbox or VM to limit the damage from code vulnerabilities.
- </p>
-
- <p>
- Once your web server is set up, make
- sure it works: open your browser and go to <a
- href="http://localhost:8080/">http://localhost:8080/</a>, where
- 8080 is the webserver port you chose during setup (you can choose any
- port, 8080 is just an example). Then try putting a file in the main
- html directory, and make sure it shows up when you access the site.
- </p>
-
- <hr>
- <a id="two"></a>
- <h2><a class="anchor" href="#two">Step Two: Configure your onion service</a></h2>
- <br>
-
- <p>Next, you need to configure your onion service to point to your
- local web server.
- </p>
-
- <p>First, open your torrc file in your favorite text editor. (See
- <a href="<page docs/faq>#torrc">the torrc FAQ entry</a> to learn
- what this means.) Go to the middle section and look for the line</p>
-
- <pre>
- \############### This section is just for location-hidden services ###
- </pre>
-
- <p>
- This section of the file consists of groups of lines, each representing
- one onion service. Right now they are all commented out (the lines
- start with #), so onion services are disabled. Each group of lines
- consists of one <var>HiddenServiceDir</var> line, and one or more
- <var>HiddenServicePort</var> lines:</p>
- <ul>
- <li><var>HiddenServiceDir</var> is a directory where Tor will store
- information about that onion service. In particular, Tor will create a
- file here named <var>hostname</var> which will tell you the onion URL. You
- don't need to add any files to this directory. Make sure this is not the
- same directory as the hidserv directory you created when setting up thttpd,
- as your HiddenServiceDir contains secret information!</li>
- <li><var>HiddenServicePort</var> lets you specify a virtual port (that is,
- what port people accessing the onion service will think they're using) and
- an IP address and port for redirecting connections to this virtual
- port.</li> </ul>
-
- <p>Add the following lines to your torrc:
- </p>
-
- <pre>
- HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
- HiddenServicePort 80 127.0.0.1:8080
- </pre>
-
- <p>You're going to want to change the <var>HiddenServiceDir</var> line, so
- it points to an actual directory that is readable/writeable by the user
- that will be running Tor. The above line should work if you're using the OS
- X Tor package. On Unix, try "/home/username/hidden_service/" and fill in
- your own username in place of "username". On Windows you might pick:</p>
- <pre> HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
- HiddenServicePort 80 127.0.0.1:8080 </pre>
-
- <p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix sockets.
- This means that you can point the <var>HiddenServicePort</var> to a Unix socket:</p>
- <pre>
- HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
- HiddenServicePort 80 unix:/path/to/socket
- </pre>
-
- <p>Now save the torrc and restart your tor.</p>
-
- <p>If Tor starts up again, great. Otherwise, something is wrong. First look
- at your logfiles for hints. It will print some warnings or error messages.
- That should give you an idea what went wrong. Typically there are typos in
- the torrc or wrong directory permissions (See <a href="<page
- docs/faq>#Logs">the logging FAQ entry</a> if you don't know how to enable
- or find your log file.) </p>
-
- <p>When Tor starts, it will automatically create the
- <var>HiddenServiceDir</var> that you specified (if necessary), and it will
- create two files there.</p>
-
- <dl>
- <dt><var>private_key</var></dt>
- <dd>First, Tor will generate a new public/private keypair for your onion
- service. It is written into a file called "private_key". Don't share this key
- with others -- if you do they will be able to impersonate your onion
- service.</dd>
- <dt><var>hostname</var></dt>
- <dd>The other file Tor will create is called "hostname". This contains
- a short summary of your public key -- it will look something like
- <tt>duskgytldkxiuqc6.onion</tt>. This is the public name for your service,
- and you can tell it to people, publish it on websites, put it on business
- cards, etc.</dd>
- </dl>
-
- <p>If Tor runs as a different user than you, for example on
- OS X, Debian, or Red Hat, then you may need to become root to be able
- to view these files.</p>
-
- <p>Now that you've restarted Tor, it is busy picking introduction points
- in the Tor network, and generating an <em>onion service
- descriptor</em>. This is a signed list of introduction points along with
- the service's full public key. It anonymously publishes this descriptor
- to the directory servers, and other people anonymously fetch it from the
- directory servers when they're trying to access your service.
- </p>
-
- <p>Try it now: paste the contents of the hostname file into your web
- browser. If it works, you'll get the html page you set up in step one.
- If it doesn't work, look in your logs for some hints, and keep playing
- with it until it works.
- </p>
-
- <hr>
- <a id="three"></a>
- <h2><a class="anchor" href="#three">Step Three: More advanced tips</a></h2>
- <br>
-
- <p>If you plan to keep your service available for a long time, you might
- want to make a backup copy of the <var>private_key</var> file somewhere.
- </p>
-
- <p>If you want to forward multiple virtual ports for a single onion
- service, just add more <var>HiddenServicePort</var> lines.
- If you want to run multiple onion services from the same Tor
- client, just add another <var>HiddenServiceDir</var> line. All the following
- <var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
- you add another <var>HiddenServiceDir</var> line:
- </p>
-
- <pre>
- HiddenServiceDir /usr/local/etc/tor/hidden_service/
- HiddenServicePort 80 127.0.0.1:8080
-
- HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
- HiddenServicePort 6667 127.0.0.1:6667
- HiddenServicePort 22 127.0.0.1:22
- </pre>
-
- <p>Onion services operators need to practice proper operational security
- and system administration to maintain security. For some security
- suggestions please make sure you read over Riseup's <a
- href="https://help.riseup.net/en/security/network-security/tor/onionservices-best…">"Tor
- Hidden (Onion) Services Best Practices" document</a>. Also, here are some
- more anonymity issues you should keep in mind:
-
- </p>
- <ul>
- <li>As mentioned above, be careful of letting your web server reveal
- identifying information about you, your computer, or your location.
- For example, readers can probably determine whether it's thttpd or
- Apache, and learn something about your operating system.</li>
- <li>If your computer isn't online all the time, your onion service
- won't be either. This leaks information to an observant adversary.</li>
- <li>It is generally a better idea to host onion services on a Tor client
- rather than a Tor relay, since relay uptime and other properties are
- publicly visible.</li>
- <li>The longer an onion service is online, the higher the risk that its
- location is discovered. The most prominent attacks are building a
- profile of the onion service's availability and matching induced
- traffic patterns.</li>
- </ul>
-
- <p>Another common issue is whether to use HTTPS on your relay or
- not. Have a look at this <a
- href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a> on the Tor Blog to learn more about these issues.
- </p>
-
- <p>Finally, feel free to use the <a
- href="https://lists.torproject.org/pipermail/tor-onions/">[tor-onions]
- mailing list</a> to discuss the secure administration and operation of
- Tor onion services.</p>
-
- </div>
- <!-- END MAINCOL -->
- <div id = "sidecol">
-#include "side.wmi"
-#include "info.wmi"
- </div>
- <!-- END SIDECOL -->
-</div>
-<!-- END CONTENT -->
#include <foot.wmi>
diff --git a/docs/en/tor-onion-service.wml b/docs/en/tor-onion-service.wml
new file mode 100644
index 00000000..8fc9e894
--- /dev/null
+++ b/docs/en/tor-onion-service.wml
@@ -0,0 +1,258 @@
+## translation metadata
+# Revision: $Revision$
+# Translation-Priority: 3-low
+
+#include "head.wmi" TITLE="Tor Project: Onion Service Configuration Instructions" CHARSET="UTF-8"
+<div id="content" class="clearfix">
+ <div id="breadcrumbs">
+ <a href="<page index>">Home » </a>
+ <a href="<page docs/documentation>">Documentation » </a>
+ <a href="<page docs/tor-onion-service>">Tor Onion Service</a>
+ </div>
+ <div id="maincol">
+ <h1>Configuring Onion Services for <a href="<page index>">Tor</a></h1>
+ <hr>
+
+ <p>Tor allows clients and relays to offer onion services. That is,
+ you can offer a web server, SSH server, etc., without revealing your
+ IP address to its users. In fact, because you don't use any public address,
+ you can run an onion service from behind your firewall.
+ </p>
+
+ <p>If you have Tor installed, you can see onion services in action
+ by visiting this <a href="http://duskgytldkxiuqc6.onion/">sample
+ site</a>.
+ </p>
+
+ <p>
+ This page describes the steps for setting up your own onion service
+ website. For the technical details of how the onion service protocol
+ works, see our <a href="<page docs/onion-services>">onion service
+ protocol</a> page.
+ </p>
+
+ <hr>
+ <a id="zero"></a>
+ <h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2>
+ <br>
+
+ <p>Before you start, you need to make sure:</p>
+ <ol>
+ <li>Tor is up and running,</li>
+ <li>You actually set it up correctly.</li>
+ </ol>
+
+ <p>Windows users should follow the <a
+ href="<page docs/tor-doc-windows>">Windows
+ howto</a>, OS X users should follow the <a
+ href="<page docs/tor-doc-osx>">OS
+ X howto</a>, and Linux/BSD/Unix users should follow the <a
+ href="<page docs/tor-doc-unix>">Unix howto</a>.
+ </p>
+
+ <hr>
+ <a id="one"></a>
+ <h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2>
+ <br>
+
+ <p>
+ First, you need to set up a web server locally. Setting up a web
+ server can be complex. We're not going to cover how to set up a web
+ server here. If you get stuck or want to do more, find a friend who
+ can help you. We recommend you install a new separate web server for
+ your onion service, since even if you already have one installed,
+ you may be using it (or want to use it later) for a normal website.
+ </p>
+
+ <p>
+ You need to configure your web server so it doesn't give away any
+ information about you, your computer, or your location. Be sure to
+ bind the web server only to localhost (if people could get to it
+ directly, they could confirm that your computer is the one offering
+ the onion service). Be sure that its error messages don't list
+ your hostname or other hints. Consider putting the web server in a
+ sandbox or VM to limit the damage from code vulnerabilities.
+ </p>
+
+ <p>
+ Once your web server is set up, make
+ sure it works: open your browser and go to <a
+ href="http://localhost:8080/">http://localhost:8080/</a>, where
+ 8080 is the webserver port you chose during setup (you can choose any
+ port, 8080 is just an example). Then try putting a file in the main
+ html directory, and make sure it shows up when you access the site.
+ </p>
+
+ <hr>
+ <a id="two"></a>
+ <h2><a class="anchor" href="#two">Step Two: Configure your onion service</a></h2>
+ <br>
+
+ <p>Next, you need to configure your onion service to point to your
+ local web server.
+ </p>
+
+ <p>First, open your torrc file in your favorite text editor. (See
+ <a href="<page docs/faq>#torrc">the torrc FAQ entry</a> to learn
+ what this means.) Go to the middle section and look for the line</p>
+
+ <pre>
+ \############### This section is just for location-hidden services ###
+ </pre>
+
+ <p>
+ This section of the file consists of groups of lines, each representing
+ one onion service. Right now they are all commented out (the lines
+ start with #), so onion services are disabled. Each group of lines
+ consists of one <var>HiddenServiceDir</var> line, and one or more
+ <var>HiddenServicePort</var> lines:</p>
+ <ul>
+ <li><var>HiddenServiceDir</var> is a directory where Tor will store
+ information about that onion service. In particular, Tor will create a
+ file here named <var>hostname</var> which will tell you the onion URL. You
+ don't need to add any files to this directory. Make sure this is not the
+ same directory as the hidserv directory you created when setting up thttpd,
+ as your HiddenServiceDir contains secret information!</li>
+ <li><var>HiddenServicePort</var> lets you specify a virtual port (that is,
+ what port people accessing the onion service will think they're using) and
+ an IP address and port for redirecting connections to this virtual
+ port.</li> </ul>
+
+ <p>Add the following lines to your torrc:
+ </p>
+
+ <pre>
+ HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
+ HiddenServicePort 80 127.0.0.1:8080
+ </pre>
+
+ <p>You're going to want to change the <var>HiddenServiceDir</var> line, so
+ it points to an actual directory that is readable/writeable by the user
+ that will be running Tor. The above line should work if you're using the OS
+ X Tor package. On Unix, try "/home/username/hidden_service/" and fill in
+ your own username in place of "username". On Windows you might pick:</p>
+ <pre> HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
+ HiddenServicePort 80 127.0.0.1:8080 </pre>
+
+ <p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix sockets.
+ This means that you can point the <var>HiddenServicePort</var> to a Unix socket:</p>
+ <pre>
+ HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
+ HiddenServicePort 80 unix:/path/to/socket
+ </pre>
+
+ <p>Now save the torrc and restart your tor.</p>
+
+ <p>If Tor starts up again, great. Otherwise, something is wrong. First look
+ at your logfiles for hints. It will print some warnings or error messages.
+ That should give you an idea what went wrong. Typically there are typos in
+ the torrc or wrong directory permissions (See <a href="<page
+ docs/faq>#Logs">the logging FAQ entry</a> if you don't know how to enable
+ or find your log file.) </p>
+
+ <p>When Tor starts, it will automatically create the
+ <var>HiddenServiceDir</var> that you specified (if necessary), and it will
+ create two files there.</p>
+
+ <dl>
+ <dt><var>private_key</var></dt>
+ <dd>First, Tor will generate a new public/private keypair for your onion
+ service. It is written into a file called "private_key". Don't share this key
+ with others -- if you do they will be able to impersonate your onion
+ service.</dd>
+ <dt><var>hostname</var></dt>
+ <dd>The other file Tor will create is called "hostname". This contains
+ a short summary of your public key -- it will look something like
+ <tt>duskgytldkxiuqc6.onion</tt>. This is the public name for your service,
+ and you can tell it to people, publish it on websites, put it on business
+ cards, etc.</dd>
+ </dl>
+
+ <p>If Tor runs as a different user than you, for example on
+ OS X, Debian, or Red Hat, then you may need to become root to be able
+ to view these files.</p>
+
+ <p>Now that you've restarted Tor, it is busy picking introduction points
+ in the Tor network, and generating an <em>onion service
+ descriptor</em>. This is a signed list of introduction points along with
+ the service's full public key. It anonymously publishes this descriptor
+ to the directory servers, and other people anonymously fetch it from the
+ directory servers when they're trying to access your service.
+ </p>
+
+ <p>Try it now: paste the contents of the hostname file into your web
+ browser. If it works, you'll get the html page you set up in step one.
+ If it doesn't work, look in your logs for some hints, and keep playing
+ with it until it works.
+ </p>
+
+ <hr>
+ <a id="three"></a>
+ <h2><a class="anchor" href="#three">Step Three: More advanced tips</a></h2>
+ <br>
+
+ <p>If you plan to keep your service available for a long time, you might
+ want to make a backup copy of the <var>private_key</var> file somewhere.
+ </p>
+
+ <p>If you want to forward multiple virtual ports for a single onion
+ service, just add more <var>HiddenServicePort</var> lines.
+ If you want to run multiple onion services from the same Tor
+ client, just add another <var>HiddenServiceDir</var> line. All the following
+ <var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
+ you add another <var>HiddenServiceDir</var> line:
+ </p>
+
+ <pre>
+ HiddenServiceDir /usr/local/etc/tor/hidden_service/
+ HiddenServicePort 80 127.0.0.1:8080
+
+ HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
+ HiddenServicePort 6667 127.0.0.1:6667
+ HiddenServicePort 22 127.0.0.1:22
+ </pre>
+
+ <p>Onion services operators need to practice proper operational security
+ and system administration to maintain security. For some security
+ suggestions please make sure you read over Riseup's <a
+ href="https://help.riseup.net/en/security/network-security/tor/onionservices-best…">"Tor
+ Hidden (Onion) Services Best Practices" document</a>. Also, here are some
+ more anonymity issues you should keep in mind:
+
+ </p>
+ <ul>
+ <li>As mentioned above, be careful of letting your web server reveal
+ identifying information about you, your computer, or your location.
+ For example, readers can probably determine whether it's thttpd or
+ Apache, and learn something about your operating system.</li>
+ <li>If your computer isn't online all the time, your onion service
+ won't be either. This leaks information to an observant adversary.</li>
+ <li>It is generally a better idea to host onion services on a Tor client
+ rather than a Tor relay, since relay uptime and other properties are
+ publicly visible.</li>
+ <li>The longer an onion service is online, the higher the risk that its
+ location is discovered. The most prominent attacks are building a
+ profile of the onion service's availability and matching induced
+ traffic patterns.</li>
+ </ul>
+
+ <p>Another common issue is whether to use HTTPS on your relay or
+ not. Have a look at this <a
+ href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a> on the Tor Blog to learn more about these issues.
+ </p>
+
+ <p>Finally, feel free to use the <a
+ href="https://lists.torproject.org/pipermail/tor-onions/">[tor-onions]
+ mailing list</a> to discuss the secure administration and operation of
+ Tor onion services.</p>
+
+ </div>
+ <!-- END MAINCOL -->
+ <div id = "sidecol">
+#include "side.wmi"
+#include "info.wmi"
+ </div>
+ <!-- END SIDECOL -->
+</div>
+<!-- END CONTENT -->
+#include <foot.wmi>
diff --git a/docs/torbutton/en/sidenav.wmi b/docs/torbutton/en/sidenav.wmi
index 85f63833..bae74dc4 100644
--- a/docs/torbutton/en/sidenav.wmi
+++ b/docs/torbutton/en/sidenav.wmi
@@ -52,7 +52,7 @@
{'url' => 'docs/tor-doc-relay',
'txt' => 'Configuring a Relay graphically',
},
- {'url' => 'docs/tor-hidden-service',
+ {'url' => 'docs/tor-onion-service',
'txt' => 'Configuring an Onion Service',
},
{'url' => 'docs/bridges',
diff --git a/include/foot.wmi b/include/foot.wmi
index 83adcde8..f99a2ee3 100644
--- a/include/foot.wmi
+++ b/include/foot.wmi
@@ -45,7 +45,7 @@
<ul>
<li><a href="<page donate/donate-foot>">Donate</a></li>
<li><a href="<page docs/documentation>#MailingLists">Mailing Lists</a></li>
- <li><a href="<page docs/hidden-services>">Onion Services</a></li>
+ <li><a href="<page docs/onion-services>">Onion Services</a></li>
<li><a href="<page getinvolved/translation>">Translations</a></li>
# <li><a href="<page getinvolved/open-positions>">Careers</a></li>
</ul>
1
0

21 Dec '17
commit f43669fce567be541ce2269b67729ab012b753d6
Author: Matt Traudt <sirmatt(a)ksu.edu>
Date: Tue Jun 13 22:25:04 2017 -0400
Fix 3 links about current Tor network usage/size
---
docs/en/faq.wml | 15 ++++++---------
1 file changed, 6 insertions(+), 9 deletions(-)
diff --git a/docs/en/faq.wml b/docs/en/faq.wml
index a97dffdc..94c2b7ae 100644
--- a/docs/en/faq.wml
+++ b/docs/en/faq.wml
@@ -682,15 +682,12 @@ with more funding?</a></h3>
<p>
The Tor network's <a
-
-href="https://metrics.torproject.org/network.html#networksize">several
- thousand</a> relays push <a
- href="https://metrics.torproject.org/network.html#bandwidth">over
- 7.5GB per second on average</a>. We have <a
-
-href="https://metrics.torproject.org/users.html#direct-users">millions of
- daily users</a>. But the Tor network is not yet
- self-sustaining.
+href="https://metrics.torproject.org/networksize.html">serveral thousand</a>
+ relays push <a
+href="https://metrics.torproject.org/bandwidth.html">around 100 Gbps on
+average</a>. We have <a
+href="https://metrics.torproject.org/userstats-relay-country.html">millions of
+ daily users</a>. But the Tor network is not yet self-sustaining.
</p>
<p>
1
0
commit 0ef0389eb30c5ded5ad4856a5abca4f350cea136
Author: hiromipaw <hiro(a)torproject.org>
Date: Fri Nov 17 15:18:47 2017 +0100
Final css fix
---
include/lang.wmi | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/lang.wmi b/include/lang.wmi
index e83f1621..fee392a0 100644
--- a/include/lang.wmi
+++ b/include/lang.wmi
@@ -8,7 +8,7 @@
<option value="en-US" selected="selected">English</option>
<option value="ar">العربية</option>
<option value="de">Deutsch</option>
- <option value="es-ES">Español</option>
+ <option value="es-ES">español</option>
<option value="fa">فارسی</option>
<option value="fr">Français</option>
<option value="it">Italiano</option>
1
0
commit 9e1dda3a1dab3b0abc871960b39efeff6b7f206c
Author: hiromipaw <hiro(a)torproject.org>
Date: Wed Nov 22 12:42:05 2017 +0100
Add redirect for donate button
---
donate/en/donate-button.wml | 7 +
download/download-easy.html.es | 434 +++++++++++++++++++++++++++++++++++++
download/download-unix.html.es | 244 +++++++++++++++++++++
download/download.html.es | 471 +++++++++++++++++++++++++++++++++++++++++
4 files changed, 1156 insertions(+)
diff --git a/donate/en/donate-button.wml b/donate/en/donate-button.wml
index e69de29b..bb7316e3 100644
--- a/donate/en/donate-button.wml
+++ b/donate/en/donate-button.wml
@@ -0,0 +1,7 @@
+## translation metadata
+# Revision: $Revision$
+# Status: obsolete
+
+#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
+
+#include <foot.wmi>
diff --git a/download/download-easy.html.es b/download/download-easy.html.es
new file mode 100644
index 00000000..a85b32b4
--- /dev/null
+++ b/download/download-easy.html.es
@@ -0,0 +1,434 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
+<html>
+<head>
+ <title>Download Tor</title>
+ <link rel="shortcut icon" type="image/x-icon" href="../images/favicon.ico">
+ <link rel="stylesheet" type="text/css" href="../css/master.min.css">
+ <!--[if lte IE 8]>
+ <link rel="stylesheet" type="text/css" href="../css/ie8-and-down.min.css">
+ <![endif]-->
+ <!--[if lte IE 7]>
+ <link rel="stylesheet" type="text/css" href="../css/ie7-and-down.min.css">
+ <![endif]-->
+ <!--[if IE 6]>
+ <link rel="stylesheet" type="text/css" href="../css/ie6.min.css">
+ <![endif]-->
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+ <meta name="author" content="The Tor Project, Inc.">
+ <meta name="keywords" content="anonymity online, tor, tor project, censorship circumvention, traffic analysis, anonymous communications research">
+ <script type="text/javascript" src="../js/jquery.min.js">
+ </script>
+ <script type="text/javascript" src="../js/jquery.client.min.js">
+/* "jQuery Browser And OS Detection Plugin" by Stoimen
+ Source: http://www.stoimen.com/blog/2009/07/16/jquery-browser-and-os-detection-plug…
+ License: Public Domain (http://www.stoimen.com/blog/2009/07/16/jquery-browser-and-os-detection-plug…) */
+ </script>
+ <script type="text/javascript" src="../js/jquery-migrate-1.0.0.min.js"></script>
+ <script type="text/javascript" src="../js/jquery.ba-bbq.min.js">
+/* Source: https://raw.github.com/cowboy/jquery-bbq/v1.2.1/jquery.ba-bbq.js */
+ </script>
+ <script type="text/javascript" src="../js/dlpage01.js">
+ </script>
+ <script async type="text/javascript" src="../js/jquery.accordion.min.js">
+/* Modified version of "Stupid Simple jQuery Accordian Menu" originally developed by Ryan Stemkoski
+ Source: http://www.stemkoski.com/stupid-simple-jquery-accordion-menu/
+ License: Public Domain (http://www.stemkoski.com/stupid-simple-jquery-accordion-menu/#comment-32882) */
+ </script>
+</head>
+<body class="onload">
+ <span class="hidden" id="version-data">
+ { "torbrowserbundle" : "7.0.10",
+ "torbrowserbundleosx64" : "7.0.10",
+ "torbrowserbundlelinux32" : "7.0.10",
+ "torbrowserbundlelinux64" : "7.0.10" }
+ </span>
+<div id="wrap">
+ <div id="header">
+ <h1 id="logo"><a href="../index.html">Tor</a></h1>
+ <div id="nav">
+ <ul>
+ <li><a href="../index.html">Home</a></li>
+<li><a href="../about/overview.html">About Tor</a></li>
+<li><a href="../docs/documentation.html">Documentation</a></li>
+<li><a href="../press/press.html">Press</a></li>
+<li><a href="https://blog.torproject.org/blog/">Blog</a></li>
+<li><a href="https://newsletter.torproject.org">Newsletter</a></li>
+<li><a href="../about/contact.html">Contact</a></li>
+ <li>
+ <div class="dropdown">
+ <div class="dropbtn">
+ <a href="download-easy.html.en">English</a>
+ </div>
+ <div class="dropdown-content">
+ <a href="download-easy.html.es">español</a>
+<a href="download-easy.html.en">English</a>
+ </div>
+ </div>
+ </li>
+ </ul>
+ </div>
+ <!-- END NAV -->
+ <div id="calltoaction">
+ <ul>
+ <li class="donate"><a class="active" href="../download/download-easy.html.es">Download</a></li>
+<li class="donate"><a href="../getinvolved/volunteer.html">Get Involved</a></li>
+<li class="donate"><a href="../donate/donate-button.html">Donate</a></li>
+ </ul>
+ </div>
+ <!-- END CALLTOACTION -->
+ </div>
+ <!-- END HEADER -->
+<div id="content" class="clearfix">
+ <div id="breadcrumbs"><a href="../index.html">Inicio » </a><a href="../download/download.html.es">Descarga</a></div>
+ <!-- BEGIN TEASER WARNING -->
+ <div class="warning-top">
+ <h2>¿Queres que tor funcione de verdad?</h2>
+ <p>Tenes que cambiar alguno de tus hábitos por que algunas cosas no van a funcionar exactamente de la misma manera. Por favor lee la <a href="#warning">lista completa de advertencias</a> para mas detalles.</p>
+ </div>
+ <!-- END TEASER WARNING -->
+ <div id="download-donate" class="clearfix">
+ <!-- START DOWNLOADS -->
+ <!-- START WINDOWS -->
+<div id="dow-don-left">
+ <div id="windows" class="easy windows">
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <div class="desc">
+ <h2>Navegador Tor para windows</h2>
+ <em>Versión <Versión-torbrowserbundle> - Windows 10, 8, 7, Vista, y XP</em>
+ <p>Todo lo que necesitas para navegar de forma segura Internet. <br><a href="../projects/torbrowser.html">Aprendé mas »</a></p>
+ </div>
+ <form class="downloads">
+ <a class="button win-tbb" href="../dist/torbrowser/<Versión-torbrowserbundle>/torbrowser-install-<Versión-torbrowserbundle>_es-ES.exe"><span class="strong">Descarga</span><span class="normal">Navegador Tor</span></a>
+ <select name="language" id="win-tbb" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig" style="margin-bottom: 5px;">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros Lenguajes</a>
+ (<a class="win-tbb-sig" href="../dist/torbrowser/<Versión-torbrowserbundle>/torbrowser-install-<Versión-torbrowserbundle>_es-ES.exe.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Que es Esto?</a>
+ </div>
+ </form>
+ <p class="alt-dl">¿No usas Windows?<br>Descargalo para <a href="#mac">Mac</a> o <a href="#linux">Linux</a></p>
+ </div>
+ </div>
+<!-- START MAC -->
+ <div id="mac" class="easy mac">
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <div class="desc">
+ <h2>Navegador Tor para Mac</h2>
+ <em>Versión <Versión-torbrowserbundleosx64> - OS X (10.9+)</em> <a href="https://blog.torproject.org/category/tags/tbb">¡Lee los anuncios del lanzamiento!</a>
+ <p>Todo lo que necesitas para navegar de forma segura Internet. <br><a href="../projects/torbrowser.html">Aprendé mas »</a></p>
+ </div>
+ <form class="downloads">
+ <a class="button osx-tbb" href="../dist/torbrowser/<Versión-torbrowserbundleosx64>/TorBrowser-<Versión-torbrowserbundleosx64>-osx64_es-ES.dmg"><span class="strong">Descarga</span><span class="normal">Navegador Tor</span></a>
+ <select name="language" id="osx-tbb" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig" style="margin-bottom: 5px;">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros Lenguajes</a>
+ (<a class="osx-tbb-sig" href="../dist/torbrowser/<Versión-torbrowserbundleosx64>/TorBrowser-<Versión-torbrowserbundleosx64>-osx64_es-ES.dmg.asc">sig</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Que es Esto?</a>
+ </div>
+ </form>
+ <p class="alt-dl">¿No usas Mac? Descargalo para <a href="#windows">Windows</a> o <a href="#linux">Linux</a></p>
+ </div>
+ </div>
+<!-- START LINUX 64-Bit -->
+ <div id="linux" class="easy linux">
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <div class="desc">
+ <h2>Navegador Tor para Linux (64-Bit)</h2>
+ <em>Versión <Versión-torbrowserbundlelinux64> - Linux (64-Bit)</em> <a href="https://blog.torproject.org/category/tags/tbb">¡Lee los anuncios del lanzamiento!</a>
+ <p>Todo lo que necesitas para navegar de forma segura Internet. <br><a href="../projects/torbrowser.html">Aprendé mas »</a></p>
+ </div>
+ <form class="downloads">
+ <a class="button lin-tbb64" href="../dist/torbrowser/<Versión-torbrowserbundlelinux64>/tor-browser-linux64-<Versión-torbrowserbundlelinux64>_es-ES.tar.xz"><span class="strong">Descarga</span><span class="normal">Linux 64-bit</span></a>
+ <select name="language" id="lin-tbb64" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig" style="margin-bottom: 5px;">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros Lenguajes</a>
+ (<a class="lin-tbb64-sig" href="../dist/torbrowser/<Versión-torbrowserbundlelinux64>/tor-browser-linux64-<Versión-torbrowserbundlelinux64>_es-ES.tar.xz.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Que es Esto?</a>
+ </div>
+ </form>
+ <p class="alt-dl">¿No Usas Linux? Descargalo para <a href="#mac">Mac</a> o <a href="#windows">Windows</a></p>
+ </div>
+ </div>
+<!-- START LINUX -->
+ <div class="easy linux">
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <div class="desc">
+ <h2>Navegador Tor para Linux (32-Bit)</h2>
+ <em>Versión <Versión-torbrowserbundlelinux32> - Linux (32-Bit)</em> <a href="https://blog.torproject.org/category/tags/tbb">¡Lee los anuncios del lanzamiento!</a>
+ <p>Todo lo que necesitas para navegar de forma segura Internet. Este paquete no requiere instalación. Solo extraelo y correlo.<br>
+ </div>
+ <form class="downloads">
+ <a class="button lin-tbb32" href="../dist/torbrowser/<Versión-torbrowserbundlelinux32>/tor-browser-linux32-<Versión-torbrowserbundlelinux32>_es-ES.tar.xz"><span class="strong">Descarga</span><span class="normal">Navegador Tor</span></a>
+ <select name="language" id="lin-tbb32" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig" style="margin-bottom: 5px;">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros Lenguajes</a>
+ (<a class="lin-tbb32-sig" href="../dist/torbrowser/<Versión-torbrowserbundlelinux32>/tor-browser-linux32-<Versión-torbrowserbundlelinux32>_es-ES.tar.xz.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Que es Esto?</a>
+ </div>
+ </form>
+ <p class="alt-dl">¿No Usas Linux? Descargalo para<a href="#mac">Mac</a> o <a href="#windows">Windows</a></p>
+ </div>
+ </div>
+<!-- START Orbot -->
+ <div id="android" class="easy android">
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <div class="desc">
+ <h2>Orbot - Tor para Android</h2>
+ <p>Nuestro software esta disponible para celulares Android, tablets y computadoras
+ de <a href="https://guardianproject.info/">The Guardian Project</a> en su
+ <a href="https://guardianproject.info/fdroid/">Repositorio de F-Droid </a> o
+ en su <a href="https://play.google.com/store/apps/details?id=org.torproject.android">Google
+ Play Store</a>. <a href="../docs/android.html">Aprendé mas »</a>
+ </p>
+ </div>
+ <form class="downloads">
+ <a class="button" href="https://guardianproject.info/apps/orbot/?src=tbb_download"><span class="strong">Descarga</span><span class="normal">Orbot</span></a>
+ </form>
+ </div>
+ </div>
+ <p class="all-dl">¿Buscando otra cosa? <a href="../download/download.html.es">Ver Todas Las Descargas </a></p>
+ <!-- END DOWNLOADS --><br>
+</div> <!-- END dow-don-left -->
+<div id="dow-don-right">
+<a href="../donate/donate-download.html"><img src="../images/btn_donateCC_LG.gif" alt="" width="186" height="67"></a>
+</div> <!-- END dow-don-right -->
+ </div> <!-- END download-donate -->
+ <div id="maincol-left">
+<!-- BEGIN WARNING -->
+<div class="warning">
+<a name="warning"></a>
+<a name="Warning"></a>
+<h2><a class="anchor" href="#warning">¿Queres que Tor te funcione de verdad?</a></h2>
+<p>Vas a tener que cambiar algunos hábitos por que algunas cosas no funcionan exactamente de la misma manera.</p>
+<ol>
+<li><b>Usá el Navegador Tor</b>
+<p>Tor no protege todo el trafico de Internet de tu computadora cuando
+lo ejecutás. Tor solo protege las aplicaciones que están correctamente
+configuradas para enviar su trafico a través de Tor. Para evitar
+problemas con La configuración de Tor, nosotras recomendamos que uses el
+<a href="../projects/torbrowser.html">Navegador Tor</a>. Este esta
+pre-configurado para proteger tu privacidad y anonimato en la web, siempre y cuando estés
+navegando con el Navegador Tor. En casi todos los casos configurar un navegador
+de cualquier otra forma es posiblemente insegura para usarse con Tor.</p>
+</li>
+<li><b>No uses torrent sobre Tor</b>
+<p>
+El intercambio de archivos usando Torrent ignora la configuración de proxy
+y genera conexiones directas incluso cuando se las configura para usar Tor.
+Incluso cuando se las configura para usar Tor vas a filtrar tu IP real en las
+peticiones GET al tracker, por que así es como funciona el protocolo Torrent.
+No solo <a
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
+desanonimizas tu trafico de torrent y tu trafico web</a> si no que aparte
+ralentizas la red Tor para el resto de la gente.
+</p>
+</li>
+<li><b>No habilites ni instales plugins en el navegador</b>
+<p>El Navegador Tor bloquea plugins como Flash, RealPlayer, Quicktime
+ y otros: los plugins pueden manipular el navegador a revelar tu direccion IP
+ Tampoco recomendamos instalar addons adicionales o plugins en el Navegador Tor,
+ dado que pueden bypassear Tor y herir tu anonimidad y privacidad.</p>
+</li>
+<li><b>Usá versiones HTTPS de los Sitios</b>
+<p>Tor va a cifrar todo tu trafico <a
+href="../about/overview.html#thesolution">desde y
+dentro de la red Tor</a>, pero el cifrado de tu trafico hasta el website depende
+del sitio. Para ayudar a asegurar un cifrado privado al website, el Navegador
+Tor incluye<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a>
+para forzar el uso de HTTPS con los sitios que lo soportan.
+to force the use of HTTPS encryption with major websites that
+Sin embargo, deberías seguir viendo la barra url para
+asegurar que lo sitios a los que les provees información te muestran <a
+href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">un botón azul o verde
+</a>, que incluyen <b>https://</b> en la URL, y que muestran el nombre correcto para el sitio.
+Mira también el sitio interactivo de la EFF como
+ <a href="https://www.eff.org/pages/tor-and-https">Tor
+y HTTPS se relaiconan</a>.
+</p>
+</li>
+<li><b>No abras documentos, descargados de Tor mientras Tor esta online</b>
+<p>El navegador Tor te avisa antes de abrir cualquier documento
+que tiene que abrirse con una aplicación externa. <b>NO IGNORES
+ESTA ADVERTENCIA</b>. Tenes que ser super cuidadoso descargando
+documentos a través de Tor (Especialmente .DOC y .PDF, a menos que uses
+el visor PDF que viene incorporado en el navegador Tor) como estos
+documentos pueden contener recursos ubicados en Internet que se van a descargar
+por fuera de la red Tor. Esto va a revelar tu dirección IP no torificada.
+Si tenes que trabajar con documentos DOC o PDF, te recomendamos usar una computadora
+desconectada, con <ahref="https://www.virtualbox.org/">VirtualBox</a>
+y usarla con una <a href="http://virtualboxes.org/">maquina virtual</a> con
+las redes deshabilitadas, o usar <a href="https://tails.boum.org/">Tails</a>.
+Bajo ninguna circunstancia es seguro usar <a
+href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
+y Tor</a>
+</li>
+<li><b>Usa puentes y/o encontrá compañia</b>
+<p> Tor trata de prevenir que los atacantes aprendan a que sitio estas
+accediendo. Sin embargo, por default, no previene que alguien analizando
+tu trafico sepa que estas usando Tor. Si esto te importa, podes reducir
+el riesgo configurando a Tor para que se conecte con un
+<a href="../docs/bridges.html">Tor bridge relay</a> en lugar de conectarte
+directamente a la red publica de Tor. La mejor protección es un enfoque social:
+mientras mas usarios de Tor haya cerca tuyo y mientras mas
+<a href="../about/torusers.html">diversos</a> sus intereses, menos
+peligroso es ser uno de ellos. ¡Convence a otra gente de usar Tor!</p>
+</li>
+</ol>
+<br>
+<p>Se inteligente y aprende mas. Entendé que ofrece Tor y que no ofrece.
+Esta lista de obstáculos no es completa, y necesitamos tu ayuda <a href="../getinvolved/volunteer.html#Documentation">identificando y documentando
+todos los problemas</a>.</p><br>
+<h2><a class="anchor" href="#mirror">¿De donde mas puedo conseguir Tor?</a></h2>
+<p>En algunos pais el sitio del proyecto Tor esta bloqueado o censurado y
+ no es posible descargar Tor directamente. El proyecto Tor hostea un mirror del
+ navegador Tor en <a
+href="https://github.com/TheTorProject/gettorbrowser"> Github</a>.</p><br>
+<p>Usando el servicio <a
+href="https://www.torproject.org/projects/gettor">GetTor</a> es otra forma
+de descargar el Navegador Tor cuando el sitio y los mirrors están bloqueados.</p>
+</div>
+<!-- END WARNING -->
+</div>
+<!-- END MAINCOL -->
+<!-- START SIDECOL -->
+<div id="sidecol-right">
+<div class="img-shadow sidenav-ez">
+<div class="sidenav-sub">
+<ul>
+<li class="dropdown"><a href="#windows">Microsoft Windows</a></li>
+<li class="dropdown"><a href="#mac">Apple OS X</a></li>
+<li class="dropdown"><a href="#linux">Linux</a></li>
+<li class="dropdown"><a href="#android">Android</a></li>
+<li class="dropdown"><a href="../download/download.html.es">Todas las Descargas</a></li>
+</ul>
+</div>
+</div>
+<!-- START INFO -->
+<div class="img-shadow">
+<div class="sidenav-sub">
+<h2>¿Tenes Algun Problema?</h2>
+<ul>
+<li class="dropdown"><a href="../docs/documentation.html">¡Leé la documentación!</a></li>
+</ul>
+</div>
+</div>
+<!-- END INFO -->
+</div>
+<!-- END SIDECOL -->
+</div>
+<!-- END CONTENT -->
+ <div id="footer">
+ <div class="onion"><img src="../images/onion.jpg" alt="Tor" width="78" height="118"></div>
+ <div class="about">
+ <p>Trademark, copyright notices, and rules for use by third parties can be found
+ <a href="../docs/trademark-faq.html">in our FAQ</a>.</p>
+<!--
+ Last modified: Fri Nov 17 15:10:55 2017 +0100
+ Last compiled: vie nov 17 2017 15:16:55 +0100
+-->
+ </div>
+ <!-- END ABOUT -->
+ <div class="col first">
+ <h4>About Tor</h4>
+ <ul>
+ <li><a href="../about/overview.html">What Tor Does</a></li>
+ <li><a href="../about/torusers.html">Users of Tor</a></li>
+ <li><a href="../about/corepeople.html">Core Tor People</a></li>
+ <li><a href="../about/sponsors.html">Sponsors</a></li>
+ <li><a href="../about/contact.html">Contact Us</a></li>
+ </ul>
+ </div>
+ <!-- END COL -->
+ <div class="col">
+ <h4>Get Involved</h4>
+ <ul>
+ <li><a href="../donate/donate-foot.html">Donate</a></li>
+ <li><a href="../docs/documentation.html#MailingLists">Mailing Lists</a></li>
+ <li><a href="../docs/hidden-services.html">Hidden Services</a></li>
+ <li><a href="../getinvolved/translation.html">Translations</a></li>
+ </ul>
+ </div>
+ <!-- END COL -->
+ <div class="col">
+ <h4>Documentation</h4>
+ <ul>
+ <li><a href="../docs/tor-manual.html">Manuals</a></li>
+ <li><a href="../docs/documentation.html">Installation Guides</a></li>
+ <li><a href="https://trac.torproject.org/projects/tor/wiki/">Tor Wiki</a></li>
+ <li><a href="../docs/faq.html">General Tor FAQ</a></li>
+ </ul>
+ </div>
+ <div class="col">
+ <a href="https://internetdefenseleague.org/"><img src="../images/InternetDefenseLeague-footer-badge.png" alt="Internet Defense League" width="125" height="125"></a>
+ </div>
+ <!-- END COL -->
+</div>
+ <!-- END FOOTER -->
+ </div>
+ <!-- END WRAP -->
+</body>
+</html>
diff --git a/download/download-unix.html.es b/download/download-unix.html.es
new file mode 100644
index 00000000..e1de0758
--- /dev/null
+++ b/download/download-unix.html.es
@@ -0,0 +1,244 @@
+<!DOCTYPE html>
+ <html>
+ <head>
+ <meta charset="utf-8">
+ <meta http-equiv="X-UA-Compatible" content="IE=edge">
+ <meta name="viewport" content="width\=device-width, initial-scale=1">
+ <meta name="author" content="The Tor Project, Inc.">
+ <meta name="description" content="The Tor Project's free software protects your privacy online. Site blocked? Email [mailto:gettor@torproject.org] for help downloading Tor Browser.">
+ <meta name="keywords" content="tor, tor project, tor browser, avoid censorship, traffic analysis, anonymous communications, privacy, avoid surveillance, online security, anonymous online, private browsing, anonymity online, online privacy, protect privacy, private mac browser, private windows browser, private android browser, linux browser, anonymity network, tor network, onion router, onion browser">
+ <meta property="og:image" content="https://www.torproject.org/images/tor-logo.jpg">
+ <title>Tor: Download for Linux/Unix</title>
+ <link rel="icon" href="../images/favicon.ico">
+ <link href="../css/master.min.css" rel="stylesheet">
+ <!--[if lte IE 8]>
+ <link href="../css/ie8-and-down.min.css" rel="stylesheet">
+ <![endif]-->
+ <!--[if lte IE 7]>
+ <link href="../css/ie7-and-down.min.css" rel="stylesheet">
+ <![endif]-->
+ <!--[if IE 6]>
+ <link href="../css/ie6.min.css" rel="stylesheet">
+ <![endif]-->
+</head>
+<body>
+<!-- Insert donation banner if flag is true -->
+<div id="wrap">
+ <div id="header">
+ <h1 id="logo"><a href="../index.html">Tor</a></h1>
+ <div id="nav">
+ <ul>
+ <li><a href="../index.html">Home</a></li>
+<li><a href="../about/overview.html">About Tor</a></li>
+<li><a href="../docs/documentation.html">Documentation</a></li>
+<li><a href="../press/press.html">Press</a></li>
+<li><a href="https://blog.torproject.org/blog/">Blog</a></li>
+<li><a href="https://newsletter.torproject.org">Newsletter</a></li>
+<li><a href="../about/contact.html">Contact</a></li>
+ </ul>
+ </div>
+ <!-- END NAV -->
+ <div id="calltoaction">
+ <ul>
+ <li class="donate"><a class="active" href="../download/download-easy.html.es">Download</a></li>
+<li class="donate"><a href="../getinvolved/volunteer.html">Get Involved</a></li>
+<li class="donate"><a href="../donate/donate-button.html">Donate</a></li>
+ </ul>
+ </div>
+ <!-- END CALLTOACTION -->
+ </div>
+ <!-- END HEADER -->
+ <div id="content" class="clearfix">
+ <div id="breadcrumbs"><a href="../index.html">Home » </a><a href="../download/download-unix.html.es">Descarga</a></div>
+ <div id="maincol-left">
+ <h1>Descargar Tor para Unix, Linux, BSD</h1>
+ <!-- BEGIN TEASER WARNING -->
+ <div class="warning">
+ <h2>Queres que Tor se ejecute correctamente?</h2>
+ <p>...Entonces por favor no solo lo instales y sigas de largo.
+ Es necesario que cambies algunos habitos y reconfigures tu software! Tor por si mismo <em>NO</em> es todo lo que necesitas para mantener tu anonimato. Leer la <a href="../download/download.html.es#warning">Lista completa de advertencias</a>.</p>
+ </div>
+ <!-- END TEASER WARNING -->
+ <table class="topforty" summary="">
+<thead>
+<tr bgcolor="#009933" style="color: white; ">
+ <th colspan="2">Platform</th>
+ <th>Descargar la version estable</th>
+ <th>Descargar la version inestable</th>
+ <th>Instalacion y configuracion</th>
+</tr>
+</thead>
+<tr>
+<td align="center"><img src="../images/distros/debian.png" alt="Debian" width="32" height="32"> <img src="../images/distros/ubuntu.png" alt="Ubuntu" width="32" height="32"> <img src="../images/distros/knoppix.png" alt="Knoppix" width="32" height="32"></td>
+<td>Debian, Ubuntu, Knoppix</td>
+<td colspan="2"><a href="../docs/debian.html">repositorio de paquetes</a> </td>
+<td> <a href="../docs/tor-doc-unix.html">Linux/BSD/Unix</a> </td>
+</tr>
+<tr class="beige">
+<td align="center"><img src="../images/distros/centos.png" alt="CentOS" width="32" height="32"> <img src="../images/distros/fedora.png" alt="Fedora" width="32" height="32"></td>
+<td>CentOS and Fedora</td>
+<td colspan="2">yum install tor / dnf install tor</td>
+<td> <a href="../docs/tor-doc-unix.html">Linux/BSD/Unix</a> </td>
+</tr>
+<tr>
+<td align="center"><img src="../images/distros/gentoo.png" alt="Gentoo Linux" width="32" height="32"></td>
+<td>Gentoo Linux</td>
+<td colspan="2"><kbd>emerge tor</kbd></td>
+<td>
+<a href="../docs/tor-doc-unix.html">Linux/BSD/Unix</a><br>
+</td>
+</tr>
+<tr class="beige">
+<td align="center"><img src="../images/distros/freebsd.png" alt="FreeBSD" width="32" height="32"></td>
+<td>FreeBSD</td>
+<td colspan="2"><kbd>pkg install tor</kbd></td>
+<td><a href="../docs/tor-doc-unix.html">Linux/BSD/Unix</a></td>
+</tr>
+<tr>
+<td align="center"><img src="../images/distros/openbsd.png" alt="OpenBSD" width="32" height="32"></td>
+<td>OpenBSD</td>
+<td colspan="2"><kbd>cd /usr/ports/net/tor && make && make install</kbd></td>
+<td>
+<a href="../docs/tor-doc-unix.html">Linux/BSD/Unix</a><br>
+<a href="https://trac.torproject.org/projects/tor/wiki/doc/OpenbsdChrootedTor">Guia para chrooting Tor en OpenBSD</a>
+</td>
+</tr>
+<tr class="beige">
+<td align="center"><img src="../images/distros/netbsd.png" alt="NetBSD" width="32" height="32"></td>
+<td>NetBSD</td>
+<td colspan="2"><kbd>cd /usr/pkgsrc/net/tor && make install</kbd></td>
+<td><a href="../docs/tor-doc-unix.html">Linux/BSD/Unix</a></td>
+</tr>
+<tr>
+<td align="center"><img src="../images/distros/terminal.png" alt="Source code" width="32" height="32"></td>
+<td>Source tarballs</td>
+<td>
+<a href="../dist/tor-0.3.1.8.tar.gz">0.3.1.8</a>
+ (<a href="../dist/tor-0.3.1.8.tar.gz.asc">sig</a>)
+</td>
+<td>
+<a href="../dist/tor-0.3.2.4-alpha.tar.gz">0.3.2.4-alpha</a>
+ (<a href="../dist/tor-0.3.2.4-alpha.tar.gz.asc">sig</a>)
+</td>
+<td><kbd>./configure && make && src/or/tor</kbd></td>
+</tr>
+</table>
+<div class="nb">
+<a id="packagediff"></a>
+<h2><a class="anchor" href="#packagediff">Cual es la diferencia entre estable & inestable?</a></h2>
+<p>
+Los paquetes estables son lanzados cuando creemos que el codigo y sus caracteristicas no van a cambiar durante varios meses.
+</p>
+<p>Cuando lanzamos un paquete inestable podes ayudarnos probando nuevas caracteristicas y arreglando bugs. Aunque los paquetes inestables tengan una version mas nueva que los paquetes estables listados arriba, la probabilidad de bugs y fallas de seguridad son mucho mayores en los inestables. Preparate para <a href="https://bugs.torproject.org/">reportar bugs</a>.
+</p>
+</div>
+<div class="underline"></div>
+<div class="nb">
+<p>
+Tor se distribuye <a href="http://www.fsf.org/">Software Libre</a>
+Bajo <a href="https://gitweb.torproject.org/tor.git/plain/LICENSE">licencia 3-clause BSD</a>.
+</p>
+<p>
+Instalar Tor no posee costo alguno, tampoco tiene costo utilizar la red Tor. Pero si te gustaria que Tor funcione mas rapido y de forma mas operativa por favor ten en cuenta
+<a href="../donate/donate-download.html">Realizar una donacion libre de impuestos a Proyecto Tor</a>.
+</p>
+</div>
+<div class="underline"></div>
+<div class="nb">
+<p>
+Para manternte informado sobre advertencias de seguridad y lanzamientos de versiones estables, suscribite a <a href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-announce">Lista de correo de anuncios de tor</a> (Se pedira confirmacion via mail). Tambien podes suscribirte a
+<a href="http://rss.gmane.org/gmane.network.onion-routing.announce">Seguir RSS feed</a>.
+</p>
+</div>
+<p>
+Si queres investigar sobre las versiones anteriores de Tor, paquetes u otros binarios ingresar a<a href="https://archive.torproject.org/">el archivo</a>.
+</p>
+<div class="nb">
+<p>
+Si tenes problemas con la descarga de Tor en este sito, podes dirigirte a <a
+href="../getinvolved/mirrors.html">Listado de mirrors de Tor</a>.
+</p>
+<a id="ChangeLog"></a>
+<a id="Stable"></a>
+<a id="Testing"></a>
+<p>
+Para obtener el listado de los cambios para cada version estable de Tor consultar
+<a href="https://gitweb.torproject.org/tor.git/plain/ReleaseNotes?id=tor-0.3.1.8">NotasDeLanzamiento</a>. Para obtener la lista de los cambios en la version estable y las versiones en desarrollo consultar
+<a href="https://gitweb.torproject.org/tor.git/plain/ChangeLog">ChangeLog</a>.
+</p>
+</div>
+ </div>
+ <!-- END MAINCOL -->
+ <div id="sidecol-right">
+ <div class="img-shadow">
+ <div class="infoblock">
+ <h2>Firmas verificadas</h2>
+ <p>Verifica tus descargas con nuestra firma GPG:</p>
+ <a href="../docs/verifying-signatures.html">Leer sobre como verificar las firmas</a>.
+ </div>
+ </div>
+ <!-- END INFOBLOCK -->
+ <div class="img-shadow">
+ <div class="sidenav-sub">
+ <h2>Tenes un problema?</h2>
+ <ul>
+ <li class="dropdown"><a href="#packagediff">Cuales son las diferencias entre las descargas estables y las inestables?</a></li>
+ </ul>
+ </div>
+ </div>
+ <!-- END SIDENAV -->
+ </div>
+ <!-- END SIDECOL -->
+ </div>
+ <!-- END CONTENT -->
+ <div id="footer">
+ <div class="onion"><img src="../images/onion.jpg" alt="Tor" width="78" height="118"></div>
+ <div class="about">
+ <p>Trademark, copyright notices, and rules for use by third parties can be found
+ <a href="../docs/trademark-faq.html">in our FAQ</a>.</p>
+<!--
+ Last modified: Fri Nov 17 15:10:55 2017 +0100
+ Last compiled: vie nov 17 2017 15:12:46 +0100
+-->
+ </div>
+ <!-- END ABOUT -->
+ <div class="col first">
+ <h4>About Tor</h4>
+ <ul>
+ <li><a href="../about/overview.html">What Tor Does</a></li>
+ <li><a href="../about/torusers.html">Users of Tor</a></li>
+ <li><a href="../about/corepeople.html">Core Tor People</a></li>
+ <li><a href="../about/sponsors.html">Sponsors</a></li>
+ <li><a href="../about/contact.html">Contact Us</a></li>
+ </ul>
+ </div>
+ <!-- END COL -->
+ <div class="col">
+ <h4>Get Involved</h4>
+ <ul>
+ <li><a href="../donate/donate-foot.html">Donate</a></li>
+ <li><a href="../docs/documentation.html#MailingLists">Mailing Lists</a></li>
+ <li><a href="../docs/hidden-services.html">Hidden Services</a></li>
+ <li><a href="../getinvolved/translation.html">Translations</a></li>
+ </ul>
+ </div>
+ <!-- END COL -->
+ <div class="col">
+ <h4>Documentation</h4>
+ <ul>
+ <li><a href="../docs/tor-manual.html">Manuals</a></li>
+ <li><a href="../docs/documentation.html">Installation Guides</a></li>
+ <li><a href="https://trac.torproject.org/projects/tor/wiki/">Tor Wiki</a></li>
+ <li><a href="../docs/faq.html">General Tor FAQ</a></li>
+ </ul>
+ </div>
+ <div class="col">
+ <a href="https://internetdefenseleague.org/"><img src="../images/InternetDefenseLeague-footer-badge.png" alt="Internet Defense League" width="125" height="125"></a>
+ </div>
+ <!-- END COL -->
+</div>
+ <!-- END FOOTER -->
+ </div>
+ <!-- END WRAP -->
+</body>
+</html>
diff --git a/download/download.html.es b/download/download.html.es
new file mode 100644
index 00000000..25ee137e
--- /dev/null
+++ b/download/download.html.es
@@ -0,0 +1,471 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
+<html>
+<head>
+ <title>Download Tor</title>
+ <link rel="shortcut icon" type="image/x-icon" href="../images/favicon.ico">
+ <link rel="stylesheet" type="text/css" href="../css/master.min.css">
+ <!--[if lte IE 8]>
+ <link rel="stylesheet" type="text/css" href="../css/ie8-and-down.min.css">
+ <![endif]-->
+ <!--[if lte IE 7]>
+ <link rel="stylesheet" type="text/css" href="../css/ie7-and-down.min.css">
+ <![endif]-->
+ <!--[if IE 6]>
+ <link rel="stylesheet" type="text/css" href="../css/ie6.min.css">
+ <![endif]-->
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+ <meta name="author" content="The Tor Project, Inc.">
+ <meta name="keywords" content="anonymity online, tor, tor project, censorship circumvention, traffic analysis, anonymous communications research">
+ <script type="text/javascript" src="../js/jquery.min.js">
+ </script>
+ <script type="text/javascript" src="../js/jquery.client.min.js">
+/* "jQuery Browser And OS Detection Plugin" by Stoimen
+ Source: http://www.stoimen.com/blog/2009/07/16/jquery-browser-and-os-detection-plug…
+ License: Public Domain (http://www.stoimen.com/blog/2009/07/16/jquery-browser-and-os-detection-plug…) */
+ </script>
+ <script type="text/javascript" src="../js/jquery-migrate-1.0.0.min.js"></script>
+ <script type="text/javascript" src="../js/jquery.ba-bbq.min.js">
+/* Source: https://raw.github.com/cowboy/jquery-bbq/v1.2.1/jquery.ba-bbq.js */
+ </script>
+ <script type="text/javascript" src="../js/dlpage01.js">
+ </script>
+ <script async type="text/javascript" src="../js/jquery.accordion.min.js">
+/* Modified version of "Stupid Simple jQuery Accordian Menu" originally developed by Ryan Stemkoski
+ Source: http://www.stemkoski.com/stupid-simple-jquery-accordion-menu/
+ License: Public Domain (http://www.stemkoski.com/stupid-simple-jquery-accordion-menu/#comment-32882) */
+ </script>
+</head>
+<body class="onload">
+ <span class="hidden" id="version-data">
+ { "torbrowserbundle" : "7.0.10",
+ "torbrowserbundleosx64" : "7.0.10",
+ "torbrowserbundlelinux32" : "7.0.10",
+ "torbrowserbundlelinux64" : "7.0.10" }
+ </span>
+<div id="wrap">
+ <div id="header">
+ <h1 id="logo"><a href="../index.html">Tor</a></h1>
+ <div id="nav">
+ <ul>
+ <li><a href="../index.html">Home</a></li>
+<li><a href="../about/overview.html">About Tor</a></li>
+<li><a href="../docs/documentation.html">Documentation</a></li>
+<li><a href="../press/press.html">Press</a></li>
+<li><a href="https://blog.torproject.org/blog/">Blog</a></li>
+<li><a href="https://newsletter.torproject.org">Newsletter</a></li>
+<li><a href="../about/contact.html">Contact</a></li>
+ <li>
+ <div class="dropdown">
+ <div class="dropbtn">
+ <a href="download.html.en">English</a>
+ </div>
+ <div class="dropdown-content">
+ <a href="download.html.es">español</a>
+<a href="download.html.en">English</a>
+ </div>
+ </div>
+ </li>
+ </ul>
+ </div>
+ <!-- END NAV -->
+ <div id="calltoaction">
+ <ul>
+ <li class="donate"><a class="active" href="../download/download-easy.html.es">Download</a></li>
+<li class="donate"><a href="../getinvolved/volunteer.html">Get Involved</a></li>
+<li class="donate"><a href="../donate/donate-button.html">Donate</a></li>
+ </ul>
+ </div>
+ <!-- END CALLTOACTION -->
+ </div>
+ <!-- END HEADER -->
+<div id="content" class="clearfix">
+ <div id="breadcrumbs"><a href="../index.html">Inicio » </a><a href="../download/download.html.es">Descarga</a></div>
+ <div id="maincol-left">
+<!-- BEGIN TEASER WARNING -->
+ <div class="warning-top">
+ <h2>¿Realmente querés que tor funcione?</h2>
+ <p>Necesitas cambiar algunos de tus hábitos, algunas cosas no funcionarán exactamente como estas acostumbrada.
+ Por favor lee <a href="#warning">la lista completa de advertencias</a> para mas detalles.
+ </p>
+ </div>
+<!-- END TEASER WARNING -->
+<!-- START DOWNLOADS -->
+<!-- START WINDOWS -->
+ <div id="windows" style="border-top: 0px;" class="accordionButton on">
+ <span class="windows24">Microsoft Windows</span>
+ </div>
+ <div class="accordionContent">
+ <div class="fauxhead"></div>
+<!-- TOR BROWSER BUNDLE -->
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <form class="downloads">
+ <a class="button win-tbb" href="../dist/torbrowser/7.0.10/torbrowser-install-7.0.10_es-ES.exe"><span class="strong">Descargar</span><span class="normal">Navegador Tor</span></a>
+ <select name="language" id="win-tbb" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros idiomas</a>
+ (<a class="win-tbb-sig" href="../dist/torbrowser/7.0.10/torbrowser-install-7.0.10_es-ES.exe.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Qué es esto?</a>
+ </div>
+ <a class="additional" href="../projects/torbrowser.html#downloads-alpha">Descargar inestable</a><br>
+<!-- <a class="additional" href="../dist/torbrowser/<version-torbrowserbundlealpha>/tor-browser-<version-torbrowserbundlealpha>_en-US.exe">Descarga inestable</a> (<a href="../dist/torbrowser/<version-torbrowserbundlealpha>/tor-browser-<version-torbrowserbundlealpha>_en-US.exe.asc">firma</a>)-->
+ </form>
+ <h2>Navegador Tor</h2>
+ <em>Versión 7.0.10 (2017-11-14) - Windows 10, 8, 7, Vista, y XP</em>
+ <p>Todo lo que necesitas para navegar de forma segura Internet. <a href="../projects/torbrowser.html">Aprendé mas »</a></p>
+ </div>
+<!-- EXPERT BUNDLE -->
+ <div class="package">
+ <div class="downloads">
+ <a class="button" href="../dist/torbrowser/7.0.10/tor-win32-0.3.1.8.zip"><span class="strong">Descargar</span><span class="normal">Paquete Experto</span></a>
+ <div class="sig">
+ (<a href="../dist/torbrowser/7.0.10/tor-win32-0.3.1.8.zip.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Qué es esto?</a>
+ </div>
+ </div>
+ <h2>Paquete Experto</h2>
+ <em>Windows 10, 8, 7, Vista, XP, 2000, 2003 Server, ME, y Windows 98SE</em>
+ <p> Contiene solo Tor y nada mas. Vas a necesitar configurar Tor y todas las demás aplicaciones manualmente. Este instalador debe ser ejecutado como Administrador.</p>
+ </div>
+ </div>
+<!-- END WINDOWS -->
+<!-- START OS X -->
+ <div id="apple" class="accordionButton on">
+ <span class="mac24">Apple OS X</span></div>
+ <div class="accordionContent">
+ <div class="fauxhead"></div>
+<!-- TOR BROWSER BUNDLE -->
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <form class="downloads">
+ <a class="button osx-tbb" href="../dist/torbrowser/7.0.10/TorBrowser-7.0.10-osx64_es-ES.dmg"><span class="strong">Descarga</span><span class="normal">Navegador Tor</span></a>
+ <select name="language" id="osx-tbb" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros idiomas</a>
+ (<a class="osx-tbb-sig" href="../dist/torbrowser/7.0.10/TorBrowser-7.0.10-osx64_es-ES.dmg.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Qué es esto?</a>
+ </div>
+ <a class="additional" href="../projects/torbrowser.html#downloads-alpha">Descargar versión inestable</a><br>
+ </form>
+ <h2>Navegador Tor</h2>
+ <em>Versión 7.0.10 (2017-11-14)- OS X Intel</em>
+ <p>Todo lo que necesitas para navegar de forma segura Internet. Este paquete no requiere instalación. Solo extraerlo y ejecutarlo <a href="../projects/torbrowser.html">Aprendé Más »</a></p>
+ </div>
+ </div>
+ <!-- END OS X -->
+ <!-- START UNIX -->
+ <div id="linux" class="accordionButton on">
+ <span class="linux24">GNU/Linux</span></div>
+ <div class="accordionContent">
+ <div class="fauxhead"></div>
+ <!-- TOR BROWSER BUNDLE -->
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <form class="downloads">
+ <a class="button lin-tbb64" href="../dist/torbrowser/7.0.10/tor-browser-linux64-7.0.10_es-ES.tar.xz"><span class="strong">Descarga</span><span class="normal">Navegador Tor (64-Bit)</span></a>
+ <select name="language" id="lin-tbb64" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros Idiomas</a>
+ (<a class="lin-tbb64-sig" href="../dist/torbrowser/7.0.10/tor-browser-linux64-7.0.10_es-ES.tar.xz.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Qué es esto?</a>
+ </div>
+ <a class="additional" href="../projects/torbrowser.html#downloads-alpha">Descargar versión inestable</a><br>
+<!-- <a class="additional" href="../dist/torbrowser/<version-torbrowserbundlelinux64alpha>/tor-browser-gnu-linux-x86_64-<version-torbrowserbundlelinux64alpha>-dev-en-US.tar.gz">Descargar versión inestable</a> (<a href="../dist/torbrowser/<version-torbrowserbundlelinux64alpha>/tor-browser-gnu-linux-x86_64-<version-torbrowserbundlelinux64alpha>-dev-en-US.tar.gz.asc">firma</a>)-->
+ <a class="button lin-tbb32" href="../dist/torbrowser/7.0.10/tor-browser-linux32-7.0.10_es-ES.tar.xz"><span class="strong">Descarga</span><span class="normal">Navegador Tor (32-Bit)</span></a>
+ <select name="language" id="lin-tbb32" class="lang">
+ <option value="en-US" selected="selected">English</option>
+ <option value="ar">العربية</option>
+ <option value="de">Deutsch</option>
+ <option value="es-ES">español</option>
+ <option value="fa">فارسی</option>
+ <option value="fr">Français</option>
+ <option value="it">Italiano</option>
+ <option value="ja">日本語</option>
+ <option value="ko">Korean</option>
+ <option value="nl">Nederlands</option>
+ <option value="pl">Polish</option>
+ <option value="pt-BR">Português</option>
+ <option value="ru">Русский</option>
+ <option value="tr">Türkçe</option>
+ <option value="vi">Vietnamese</option>
+ <option value="zh-CN">简体字</option>
+ </select>
+ <div class="sig">
+ <a class="lang-alt" href="../projects/torbrowser.html#downloads">Otros Idiomas</a>
+ (<a class="lin-tbb32-sig" href="../dist/torbrowser/7.0.10/tor-browser-linux32-7.0.10_es-ES.tar.xz.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Qué es esto?</a>
+ </div>
+<!-- <a class="additional" href="../dist/torbrowser/<version-torbrowserbundlelinux32alpha>/tor-browser-gnu-linux-i686-<version-torbrowserbundlelinux32alpha>-dev-en-US.tar.gz">Descargar version inestable</a> (<a href="../dist/torbrowser/<version-torbrowserbundlelinux32alpha>/tor-browser-gnu-linux-i686-<version-torbrowserbundlelinux32alpha>-dev-en-US.tar.gz.asc">firma</a>)<p>-->
+ </form>
+ <h2>Navegador Tor</h2>
+ <em>Versión 7.0.10 (2017-11-14) - GNU/Linux, BSD, y Unix</em>
+ <p>Todo lo que necesitas para navegar de forma segura Internet. Este paquete no requiere instalación. Solo extraerlo y ejecutarlo <a href="../projects/torbrowser.html">Aprendé Más »</a></p>
+<!-- repo packages -->
+ <div class="package" style="border-bottom: 0px;">
+ <div class="downloads">
+ <a class="additional" style="font-weight: bold;"
+href="../download/download-unix.html.es">Repositorios de Tor.</a>
+ </div>
+ <h2>Tor (Autónomo)</h2>
+ <p>Instalá los componentes de Tor vos misma, corré un Relé, arma configuraciones personalizadas. Todo desde un gestor de paquetes como apt-get o yum.</p>
+ </div>
+ </div>
+ </div>
+<!-- END UNIX -->
+<!-- START SMARTPHONES -->
+ <div id="smartphone" class="accordionButton on">
+ <span class="smartphone24">Tor para Smartphones</span></div>
+ <div class="accordionContent">
+ <div class="fauxhead"></div>
+<!-- ANDROID -->
+ <div class="package" style="padding-top: 13px; border-top: 0px;">
+ <div class="downloads">
+ <a class="additional" href="../docs/android.html">Instrucciones de instalación</a>
+ </div>
+ <h2>Paquete para Android</h2>
+ <p>Nuestro software esta disponibles para teléfonos basados en Android, tables y computadoras desde <a href="https://guardianproject.info/">Guardian Project</a> vía su <a href="https://guardianproject.info/2012/03/15/our-new-f-droid-app-repository/">Repositorio de F-Droid </a> o <a href="https://play.google.com/store/apps/details?id=org.torproject.android">Google Play Store</a>.</p>
+ </div>
+ </div>
+<!-- END SMARTPHONES -->
+<!-- BEGIN SOURCE -->
+ <div class="accordionButton on">
+ <span class="sourcecode24">Código Fuente</span></div>
+ <div class="accordionContent">
+ <div class="fauxhead"></div>
+ <div class="package" style="padding-top: 13px; border-top: 0px; border-bottom: 1px solid #888888;">
+ <div class="downloads">
+ <a class="button" href="../dist/tor-0.3.1.8.tar.gz"><span class="strong">Descarga</span><span class="normal">Código Fuente</span></a>
+ <div class="sig">
+ (<a href="../dist/tor-0.3.1.8.tar.gz.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Qué es esto?</a>
+ </div>
+ <a class="button" href="../dist/tor-0.3.2.4-alpha.tar.gz"><span class="strong">Descarga</span><span class="normal">Código Fuente (Inestable)</span></a>
+ <div class="sig">
+ (<a href="../dist/tor-0.3.2.4-alpha.tar.gz.asc">firma</a>) <a class="siginfo" href="../docs/verifying-signatures.html">¿Qué es esto?</a>
+ </div>
+ </div>
+ <h2>Tarball Fuente</h2>
+ <p> Configurar con: <code style="color: #666666;">./configure && make && src/or/tor</code></p>
+ <p>La versión estable actual de Tor es 0.3.1.8. Sus <a href="https://gitweb.torproject.org/tor.git/plain/ReleaseNotes?id=tor-0.3.1.8">anuncios de lanzamiento</a> están disponibles.</p>
+ <p>La version inestable/alpha de Tor es 0.3.2.4-alpha. Su <a href="https://gitweb.torproject.org/tor.git/plain/ChangeLog">bitácora de cambios</a> está disponible.</p>
+ </div>
+ </div>
+ <div class="expander"><a href="javascript:void(0)" class="switch">Expandir todo</a></div>
+<!-- END SOURCE -->
+<!-- END DOWNLOADS -->
+<br>
+<!-- BEGIN WARNING -->
+<div class="warning">
+<a name="warning"></a>
+<a name="Warning"></a>
+<h2><a class="anchor" href="#warning">¿Realmente querés que tor funcione?</a></h2>
+ <p>Necesitas cambiar algunos de tus hábitos, algunas cosas no funcionarán exactamente como estas acostumbrada.</p>
+<ol>
+ <li><b>Usá el Navegador Tor</b>
+ <p>Tor no protege todo el trafico de Internet de tu computadora cuando
+ lo ejecutás. Tor solo protege las aplicaciones que están correctamente
+ configuradas para enviar su trafico a través de Tor. Para evitar
+ problemas con La configuración de Tor, nosotras recomendamos que uses el
+ <a href="../projects/torbrowser.html">Navegador Tor</a>. Este esta
+ pre-configurado para proteger tu privacidad y anonimato en la web, siempre y cuando estés
+ navegando con el Navegador Tor. En casi todos los casos configurar un navegador
+ de cualquier otra forma es posiblemente insegura para usarse con Tor.</p>
+ </li>
+ <li><b>No uses torrent sobre Tor</b>
+ <p>
+ El intercambio de archivos usando Torrent ignora la configuración de proxy
+ y genera conexiones directas incluso cuando se las configura para usar Tor.
+ Incluso cuando se las configura para usar Tor vas a filtrar tu IP real en las
+ peticiones GET al tracker, por que así es como funciona el protocolo Torrent.
+ No solo <a
+ href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">
+ desanonimizas tu trafico de torrent y tu trafico web</a> si no que aparte
+ ralentizas la red Tor para el resto de la gente.
+ </p>
+ </li>
+ <li><b>No habilites ni instales plugins en el navegador</b>
+ <p>El Navegador Tor bloquea plugins como Flash, RealPlayer, Quicktime
+ y otros: los plugins pueden manipular el navegador a revelar tu direccion IP
+ Tampoco recomendamos instalar addons adicionales o plugins en el Navegador Tor,
+ dado que pueden bypassear Tor y herir tu anonimidad y privacidad.</p>
+ </li>
+ <li><b>Usá versiones HTTPS de los Sitios</b>
+ <p>Tor va a cifrar todo tu trafico <a
+ href="../about/overview.html#thesolution">desde y
+ dentro de la red Tor</a>, pero el cifrado de tu trafico hasta el website depende
+ del sitio. Para ayudar a asegurar un cifrado privado al website, el Navegador
+ Tor incluye<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a>
+ para forzar el uso de HTTPS con los sitios que lo soportan.
+ to force the use of HTTPS encryption with major websites that
+ Sin embargo, deberías seguir viendo la barra url para
+ asegurar que lo sitios a los que les provees información te muestran <a
+ href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">un botón azul o verde
+ </a>, que incluyen <b>https://</b> en la URL, y que muestran el nombre correcto para el sitio.
+ Mira también el sitio interactivo de la EFF como
+ <a href="https://www.eff.org/pages/tor-and-https">Tor
+ y HTTPS se relaiconan</a>.
+ </p>
+ </li>
+ <li><b>No abras documentos, descargados de Tor mientras Tor esta online</b>
+ <p>El navegador Tor te avisa antes de abrir cualquier documento
+ que tiene que abrirse con una aplicación externa. <b>NO IGNORES
+ ESTA ADVERTENCIA</b>. Tenes que ser super cuidadoso descargando
+ documentos a través de Tor (Especialmente .DOC y .PDF, a menos que uses
+ el visor PDF que viene incorporado en el navegador Tor) como estos
+ documentos pueden contener recursos ubicados en Internet que se van a descargar
+ por fuera de la red Tor. Esto va a revelar tu dirección IP no torificada.
+ Si tenes que trabajar con documentos DOC o PDF, te recomendamos usar una computadora
+ desconectada, con <ahref="https://www.virtualbox.org/">VirtualBox</a>
+ y usarla con una <a href="http://virtualboxes.org/">maquina virtual</a> con
+ las redes deshabilitadas, o usar <a href="https://tails.boum.org/">Tails</a>.
+ Bajo ninguna circunstancia es seguro usar <a
+ href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
+ y Tor</a>
+ </li>
+ <li><b>Usa puentes y/o encontrá compañia</b>
+ <p> Tor trata de prevenir que los atacantes aprendan a que sitio estas
+ accediendo. Sin embargo, por default, no previene que alguien analizando
+ tu trafico sepa que estas usando Tor. Si esto te importa, podes reducir
+ el riesgo configurando a Tor para que se conecte con un
+ <a href="../docs/bridges.html">Tor bridge relay</a> en lugar de conectarte
+ directamente a la red publica de Tor. La mejor protección es un enfoque social:
+ mientras mas usarios de Tor haya cerca tuyo y mientras mas
+ <a href="../about/torusers.html">diversos</a> sus intereses, menos
+ peligroso es ser uno de ellos. ¡Convence a otra gente de usar Tor!</p>
+</li>
+</ol>
+<br>
+<p>
+Se inteligente y aprende mas. Entendé que ofrece Tor y que no ofrece.
+Esta lista de obtaculos no es completa, y necesitamos tu ayuda <a href="../getinvolved/volunteer.html#Documentation">
+identificando y documentando todos los problemas </a>.
+</p>
+</div>
+<!-- END WARNING -->
+</div>
+<!-- END MAINCOL -->
+<!-- START SIDECOL -->
+<div id="sidecol-right">
+<div class="img-shadow sidenav">
+<div class="sidenav-sub">
+<h2>Saltar a:</h2>
+<ul>
+<li class="dropdown"><a href="../download/download.html.es#windows">Microsoft Windows</a></li>
+<li class="dropdown"><a href="../download/download.html.es#apple">Apple OS
+X</a></li>
+<li class="dropdown"><a href="../download/download.html.es#linux">Linux/Unix</a></li>
+<li class="dropdown"><a href="../download/download.html.es#smartphone">Smartphones</a></li>
+<li class="dropdown"><a href="../download/download.html.es#source">Codigo fuente</a></li>
+</ul>
+</div>
+</div>
+<!-- START DONATION WIDGET -->
+<a href="../donate/donate-download.html"><img src="../images/btn_donateCC_LG.gif" alt="" width="186" height="67"></a>
+<!-- END DONATION WIDGET -->
+<!-- START INFO -->
+<div class="img-shadow">
+<div class="sidenav-sub">
+ <h2>¿Tenes Algun Problema?</h2>
+<ul>
+<li class="dropdown"><a href="../docs/documentation.html">¡Leé la documentacion!</a></li>
+</ul>
+</div>
+</div>
+<!-- END INFO -->
+</div>
+<!-- END SIDECOL -->
+</div>
+<!-- END CONTENT -->
+ <div id="footer">
+ <div class="onion"><img src="../images/onion.jpg" alt="Tor" width="78" height="118"></div>
+ <div class="about">
+ <p>Trademark, copyright notices, and rules for use by third parties can be found
+ <a href="../docs/trademark-faq.html">in our FAQ</a>.</p>
+<!--
+ Last modified: Fri Nov 17 15:10:55 2017 +0100
+ Last compiled: vie nov 17 2017 15:16:55 +0100
+-->
+ </div>
+ <!-- END ABOUT -->
+ <div class="col first">
+ <h4>About Tor</h4>
+ <ul>
+ <li><a href="../about/overview.html">What Tor Does</a></li>
+ <li><a href="../about/torusers.html">Users of Tor</a></li>
+ <li><a href="../about/corepeople.html">Core Tor People</a></li>
+ <li><a href="../about/sponsors.html">Sponsors</a></li>
+ <li><a href="../about/contact.html">Contact Us</a></li>
+ </ul>
+ </div>
+ <!-- END COL -->
+ <div class="col">
+ <h4>Get Involved</h4>
+ <ul>
+ <li><a href="../donate/donate-foot.html">Donate</a></li>
+ <li><a href="../docs/documentation.html#MailingLists">Mailing Lists</a></li>
+ <li><a href="../docs/hidden-services.html">Hidden Services</a></li>
+ <li><a href="../getinvolved/translation.html">Translations</a></li>
+ </ul>
+ </div>
+ <!-- END COL -->
+ <div class="col">
+ <h4>Documentation</h4>
+ <ul>
+ <li><a href="../docs/tor-manual.html">Manuals</a></li>
+ <li><a href="../docs/documentation.html">Installation Guides</a></li>
+ <li><a href="https://trac.torproject.org/projects/tor/wiki/">Tor Wiki</a></li>
+ <li><a href="../docs/faq.html">General Tor FAQ</a></li>
+ </ul>
+ </div>
+ <div class="col">
+ <a href="https://internetdefenseleague.org/"><img src="../images/InternetDefenseLeague-footer-badge.png" alt="Internet Defense League" width="125" height="125"></a>
+ </div>
+ <!-- END COL -->
+</div>
+ <!-- END FOOTER -->
+ </div>
+ <!-- END WRAP -->
+</body>
+</html>
1
0