Author: arma Date: 2014-06-14 05:19:39 +0000 (Sat, 14 Jun 2014) New Revision: 26830
Modified: website/trunk/docs/en/faq.wml Log: get rid of trailing whitespace
Modified: website/trunk/docs/en/faq.wml =================================================================== --- website/trunk/docs/en/faq.wml 2014-06-14 05:17:41 UTC (rev 26829) +++ website/trunk/docs/en/faq.wml 2014-06-14 05:19:39 UTC (rev 26830) @@ -83,7 +83,7 @@ </a></li> <li><a href="#SophosOnMac">I'm using the Sophos anti-virus software on my Mac, and Tor starts but I can't browse anywhere.</a></li> - <li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an + <li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an error message from the browser: "Cannot load XPCOM".</a></li> <li><a href="#TBBOtherExtensions">Can I install other Firefox extensions? Which extensions should I avoid using?</a></li> @@ -173,7 +173,7 @@ with abuse issues.</a></li> <li><a href="#BestOSForRelay">Why doesn't my Windows (or other OS) Tor relay run well?</a></li> - <li><a href="#PackagedTor">Should I install Tor from my package manager, + <li><a href="#PackagedTor">Should I install Tor from my package manager, or build from source?</a></li> <li><a href="#WhatIsTheBadExitFlag">What is the BadExit flag?</a></li> <li><a href="#IGotTheBadExitFlagWhyDidThatHappen">I got the BadExit flag. @@ -552,13 +552,13 @@ Tor software, though. They want to distribute the <a href="<page projects/torbrowser>">Tor Browser</a>. This includes <a href="https://www.mozilla.org/en-US/firefox/organizations/">Firefox - Extended Support Release</a>, and the NoScript and HTTPS-Everywhere - extensions. You will need to follow the license for those programs as - well. Both of those Firefox extensions are distributed under + Extended Support Release</a>, and the NoScript and HTTPS-Everywhere + extensions. You will need to follow the license for those programs as + well. Both of those Firefox extensions are distributed under the <a href="https://www.fsf.org/licensing/licenses/gpl.html">GNU General - Public License</a>, while Firefox ESR is released under the Mozilla Public - License. The simplest way to obey their licenses is to include the source - code for these programs everywhere you include the bundles themselves. + Public License</a>, while Firefox ESR is released under the Mozilla Public + License. The simplest way to obey their licenses is to include the source + code for these programs everywhere you include the bundles themselves. </p>
<p> @@ -870,13 +870,13 @@
<a id="Mobile"></a> - <h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile + <h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile device?</a></h3>
<p> - Tor on Android devices is maintained by the <a - href="https://guardianproject.info%22%3EGuardian Project</a>. Currently, there - is no supported way of using Tor on iOS; the Guardian Project is + Tor on Android devices is maintained by the <a + href="https://guardianproject.info%22%3EGuardian Project</a>. Currently, there + is no supported way of using Tor on iOS; the Guardian Project is working to make this a reality in the future. </p>
@@ -913,9 +913,9 @@ those relays, and those connections will fail, leading to complex anonymity implications for the clients which we'd like to avoid. </p> - + <hr> - + <a id="IsItWorking"></a> <h3><a class="anchor" href="#IsItWorking">How can I tell if Tor is working, and that my connections really are anonymized?</a></h3> @@ -925,9 +925,9 @@ coming through the Tor network. Try the <a href="https://check.torproject.org"> Tor Check</a> site and see whether it thinks you are using Tor or not. </p> - + <hr> - + <a id="FTP"></a> <h3><a class="anchor" href="#FTP">How do I use my browser for ftp with Tor? </a></h3> @@ -941,7 +941,7 @@ </p>
<hr> - + <a id="NoDataScrubbing"></a> <h3><a class="anchor" href="#NoDataScrubbing">Does Tor remove personal information from the data my application sends?</a></h3> @@ -1164,9 +1164,9 @@ <h3><a class="anchor" href="#Ubuntu"> I'm using Ubuntu and I can't start Tor Browser.</a></h3> <p> -You'll need to tell Ubuntu that you want the ability to execute shell scripts -from the graphical interface. Open "Files" (Unity's explorer), open -Preferences-> Behavior Tab -> Set "Run executable text files when they are +You'll need to tell Ubuntu that you want the ability to execute shell scripts +from the graphical interface. Open "Files" (Unity's explorer), open +Preferences-> Behavior Tab -> Set "Run executable text files when they are opened" to "Ask every time", then OK. </p> <p>You can also start the Tor Browser from the command line by running </p> @@ -1186,21 +1186,21 @@ the protections for "Malicious websites" and "Malicious downloads". </p> <p> -We encourage affected Sophos users to contact Sophos support about +We encourage affected Sophos users to contact Sophos support about this issue. </p>
<hr>
<a id="XPCOMError"></a> -<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle +<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle I get an error message from the browser: "Cannot load XPCOM".</a></h3>
<p> -This <a -href="https://trac.torproject.org/projects/tor/ticket/10789%22%3Eproblem</a> is -specifically caused by the Webroot SecureAnywhere Antivirus software. -Consider switching to a different antivirus program. We encourage affected +This <a +href="https://trac.torproject.org/projects/tor/ticket/10789%22%3Eproblem</a> is +specifically caused by the Webroot SecureAnywhere Antivirus software. +Consider switching to a different antivirus program. We encourage affected Webroot users to contact Webroot support about this issue. </p>
@@ -1345,7 +1345,7 @@ If you really want to see Google in English you can click the link that provides that. But we consider this a feature with Tor, not a bug --- the Internet is not flat, and it in fact does look different depending on -where you are. This feature reminds people of this fact. +where you are. This feature reminds people of this fact. </p> <p> Note that Google search URLs take name/value pairs as arguments and one @@ -1461,7 +1461,7 @@ </p>
<p> -If you're unable to use the application's native proxy settings, all hope is +If you're unable to use the application's native proxy settings, all hope is not lost. See <a href="#CantSetProxy">below</a>. </p>
@@ -1568,12 +1568,12 @@ <h3><a class="anchor" href="#VerifyDownload">How do I verify the download (sha256sums.txt)?</a></h3>
- <p>Instructions are on the <a - href="<page docs/verifying-signatures>#BuildVerification">verifying + <p>Instructions are on the <a + href="<page docs/verifying-signatures>#BuildVerification">verifying signatures</a> page.</p>
<hr> - + <a id="NewIdentityClosingTabs"></a> <h3><a class="anchor" href="#NewIdentityClosingTabs">Why does "New Identity" close all my open tabs?</a></h3> @@ -2206,9 +2206,9 @@ consider <a href="https://www.torproject.org/docs/tor-relay-debian">helping out</a>. </p> - + <hr> - + <a id="WhyIsntMyRelayBeingUsedMore"></a> <h3><a class="anchor" href="#WhyIsntMyRelayBeingUsedMore">Why isn't my relay being used more?</a></h3> @@ -2227,7 +2227,7 @@ "https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays/%22%3E tor-relays list</a>. </p> - + <hr>
<a id="IDontHaveAStaticIP"></a> @@ -2268,17 +2268,17 @@
<hr>
- <a id="HighCapacityConnection"></a> + <a id="HighCapacityConnection"></a> <h3><a class="anchor" href="#HighCapacityConnection">How can I get Tor to fully make use of my high capacity connection?</a></h3> - + <p> See <a href="http://archives.seul.org/or/relays/Aug-2010/msg00034.html">this tor-relays thread</a>. </p> - - <hr> - + + <hr> + <a id="RelayFlexible"></a> <h3><a class="anchor" href="#RelayFlexible">How stable does my relay need to be?</a></h3> @@ -2330,7 +2330,7 @@ </ul>
<hr> - + <a id="BandwidthShaping"></a> <h3><a class="anchor" href="#BandwidthShaping">What bandwidth shaping options are available to Tor relays?</a></h3> @@ -2599,29 +2599,29 @@ <hr>
<a id="PackagedTor"></a> - <h3><a class="anchor" href="#PackagedTor">Should I install Tor from my + <h3><a class="anchor" href="#PackagedTor">Should I install Tor from my package manager, or build from source?</a></h3> <p> - If you're using Debian or Ubuntu especially, there are a number of benefits - to installing Tor from the <a - href="https://www.torproject.org/docs/debian.html.en%22%3ETor Project's - repository</a>. + If you're using Debian or Ubuntu especially, there are a number of benefits + to installing Tor from the <a + href="https://www.torproject.org/docs/debian.html.en%22%3ETor Project's + repository</a>. </p> <ul> <li> - You're ulimit -n gets set to 32768, high enough for Tor to keep open all - the connections it needs. + You're ulimit -n gets set to 32768, high enough for Tor to keep open all + the connections it needs. </li> <li> - A user profile is created just for Tor, so Tor doesn't need to run as + A user profile is created just for Tor, so Tor doesn't need to run as root. </li> <li> An init script is included so that Tor runs at boot. </li> <li> - Tor runs with --verify-config, so that most problems with your - config file get caught. + Tor runs with --verify-config, so that most problems with your + config file get caught. </li> <li> Tor can bind to low level ports, then drop privileges. @@ -2666,7 +2666,7 @@ of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor</a>. </p> - + <hr>
<a id="TorClientOnADifferentComputerThanMyApplications"></a> @@ -3257,7 +3257,7 @@ <a id="AccessHiddenServices"></a> <h3><a class="anchor" href="#AccessHiddenServices">How do I access hidden services?</a></h3> - + <p> Tor hidden services are named with a special top-level domain (TLD) name in DNS: .onion. Since the .onion TLD is not recognized by the @@ -3272,7 +3272,7 @@ Tor directly. You can't try to resolve it to an IP address, since there <i>is</i> no corresponding IP address: the server is hidden, after all! </p> - + <p> So, how do you make your application pass the hostname directly to Tor? You can't use SOCKS 4, since SOCKS 4 proxies require an IP from the @@ -3282,7 +3282,7 @@ SOCKS proxy. SOCKS 4a, however, always accepts a hostname: You'll need to use SOCKS 4a. </p> - + <p> Some applications, such as the browsers Mozilla Firefox and Apple's Safari, support sending DNS queries to Tor's SOCKS 5 proxy. Most web @@ -3290,7 +3290,7 @@ to point your web browser at an HTTP proxy, and tell the HTTP proxy to speak to Tor with SOCKS 4a. We recommend Polipo as your HTTP proxy. </p> - + <p> For applications that do not support HTTP proxy, and so cannot use Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an @@ -3299,24 +3299,24 @@ will allow you to use almost any program with Tor without leaking DNS lookups and allow those same programs to access hidden services. </p> - + <p> See also the <a href="#SocksAndDNS">question on DNS</a>. - </p> - + </p> + <hr>
<a id="ProvideAHiddenService"></a> <h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a hidden service?</a></h3> - + <p> See the <a href="<page docs/tor-hidden-service>"> official hidden service configuration instructions</a>. </p>
<hr> - + <a id="Development"></a> <h2><a class="anchor">Development:</a></h2>
@@ -3357,7 +3357,7 @@ <a id="PrivateTorNetwork"></a> <h3><a class="anchor" href="#PrivateTorNetwork">How do I set up my own private Tor network?</a></h3> - + <p> If you want to experiment locally with your own network, or you're cut off from the Internet and want to be able to mess with Tor still, @@ -3436,7 +3436,7 @@
<a id="WhatIsLibevent"></a> <h3><a class="anchor" href="#WhatIsLibevent">What is Libevent?</a></h3> - + <p> When you want to deal with a bunch of net connections at once, you have a few options: @@ -3479,7 +3479,7 @@ <a id="MyNewFeature"></a> <h3><a class="anchor" href="#MyNewFeature">What do I need to do to get a new feature into Tor?</a></h3> - + <p> For a new feature to go into Tor, it needs to be designed (explain what you think Tor should do), argued to be secure (explain why it's better @@ -3502,7 +3502,7 @@ <a id="WhatProtectionsDoesTorProvide"></a> <h3><a class="anchor" href="#WhatProtectionsDoesTorProvide">What protections does Tor provide?</a></h3> - + <p> Internet communication is based on a store-and-forward model that can be understood in analogy to postal mail: Data is transmitted in @@ -3518,7 +3518,7 @@ server in the Internet that can see any of the packets can profile your behaviour. </p> - + <p> The aim of Tor is to improve your privacy by sending your traffic through a series of proxies. Your communication is encrypted in multiple layers @@ -3529,11 +3529,11 @@ communicating with Tor nodes. Similarly, servers in the Internet just see that they are being contacted by Tor nodes. </p> - + <p> Generally speaking, Tor aims to solve three privacy problems: </p> - + <p> First, Tor prevents websites and other services from learning your location, which they can use to build databases about your @@ -3541,13 +3541,13 @@ give you away by default -- now you can have the ability to choose, for each connection, how much information to reveal. </p> - + <p> Second, Tor prevents people watching your traffic locally (such as your ISP) from learning what information you're fetching and where you're fetching it from. It also stops them from deciding what you're allowed to learn and publish -- if you can get to any part of the Tor - network, you can reach any site on the Internet. + network, you can reach any site on the Internet. </p>
<p> @@ -3557,26 +3557,26 @@ provides more security than the old <a href="#Torisdifferent">one hop proxy </a> approach. </p> - + <p> Note, however, that there are situations where Tor fails to solve these privacy problems entirely: see the entry below on <a - href="#AttacksOnOnionRouting">remaining attacks</a>. + href="#AttacksOnOnionRouting">remaining attacks</a>. </p> - + <hr> - + <a id="CanExitNodesEavesdrop"></a> <h3><a class="anchor" href="#CanExitNodesEavesdrop">Can exit nodes eavesdrop on communications? Isn't that bad?</a></h3> - + <p> Yes, the guy running the exit node can read the bytes that come in and out there. Tor anonymizes the origin of your traffic, and it makes sure to encrypt everything inside the Tor network, but it does not magically encrypt all traffic throughout the Internet. </p> - + <p> This is why you should always use end-to-end encryption such as SSL for sensitive Internet connections. (The corollary to this answer is that if @@ -3584,7 +3584,7 @@ *not* using end-to-end encryption at the application layer, then something has already gone wrong and you shouldn't be thinking that Tor is the problem.) </p> - + <p> Tor does provide a partial solution in a very specific situation, though. When you make a connection to a destination that also runs a Tor relay, @@ -3602,9 +3602,9 @@ does the Tor client learn which relays are associated with which websites in a decentralized yet non-gamable way?"). </p> - + <hr> - + <a id="AmITotallyAnonymous"></a> <h3><a class="anchor" href="#AmITotallyAnonymous">So I'm totally anonymous if I use Tor?</a></h3> @@ -3729,7 +3729,7 @@ </p>
<hr> - + <a id="KeyManagement"></a> <h3><a class="anchor" href="#KeyManagement">Tell me about all the keys Tor uses.</a></h3> @@ -3995,10 +3995,10 @@
<a id="IsTorLikeAVPN"></a> <h3><a class="anchor" href="#IsTorLikeAVPN">Is Tor like a VPN?</a></h3> - + <p> - <b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b> - If you're looking for a trusted entry into the Tor network, or if you want + <b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b> + If you're looking for a trusted entry into the Tor network, or if you want to obscure the fact that you're using Tor, <a href="https://www.torproject.org/docs/bridges#RunningABridge">setting up a private server as a bridge</a> works quite well. @@ -4044,7 +4044,7 @@ <a id="Proxychains"></a> <h3><a class="anchor" href="#Proxychains">Aren't 10 proxies (proxychains) better than Tor with only 3 hops?</a></h3> - + <p> Proxychains is a program that sends your traffic through a series of open web proxies that you supply before sending it on to your final @@ -4066,10 +4066,10 @@ engine are compromised machines, misconfigured private proxies not intended for public use, or honeypots set up to exploit users. </p> - + <hr> -
+ <a id="AttacksOnOnionRouting"></a> <h3><a class="anchor" href="#AttacksOnOnionRouting">What attacks remain against onion routing?</a></h3> @@ -4516,7 +4516,7 @@ <a id="SendPadding"></a> <h3><a class="anchor" href="#SendPadding">You should send padding so it's more secure.</a></h3> - + <p> Like all anonymous communication networks that are fast enough for web browsing, Tor is vulnerable to statistical "traffic confirmation" @@ -4525,7 +4525,7 @@ nice if we could use cover traffic to confuse this attack. But there are three problems here: </p> - + <ul> <li> Cover traffic is really expensive. And *every* user needs to be doing @@ -4548,26 +4548,26 @@ patterns later in the path. </li> </ul> - + <p> In short, for a system like Tor that aims to be fast, we don't see any use for padding, and it would definitely be a serious usability problem. We hope that one day somebody will prove us wrong, but we are not optimistic. </p> - + <hr>
<a id="Steganography"></a> <h3><a class="anchor" href="#Steganography">You should use steganography to hide Tor traffic.</a></h3> - + <p> Many people suggest that we should use steganography to make it hard to notice Tor connections on the Internet. There are a few problems with this idea though: </p> - + <p> First, in the current network topology, the Tor relays list <a href="#HideExits">is public</a> and can be accessed by attackers. @@ -4575,7 +4575,7 @@ always just notice <b>any connection</b> to or from a Tor relay's IP address. </p> - + <hr>
<a id="Abuse"></a>