commit 83a99998a98165df00d03d8a325a2d614c7ce1e4 Author: Harmony harmony@torproject.org Date: Tue Apr 7 13:45:57 2015 +0000
Include updated manual text --- C/about-tor-browser.page | 68 +++++++++++++ C/bridges.page | 163 +++++++++---------------------- C/circumvention.page | 69 +++++++++----- C/first-time.page | 68 +++++++++++++ C/known-issues.page | 8 +- C/managing-identities.page | 129 +++++++++++++++++++++++++ C/onionsites.page | 67 +++++++++++++ C/plugins.page | 70 ++++++++++++++ C/secure-connections.page | 118 +++++++++++++++++++++++ C/security-slider.page | 76 +++++++++++++++ C/tor.page | 228 -------------------------------------------- C/transports.page | 112 ++++++++++++++++++++++ C/troubleshooting.page | 101 ++++++++++++++++---- C/uninstalling.page | 18 ++-- C/updating.page | 73 ++++++++++++++ 15 files changed, 966 insertions(+), 402 deletions(-)
diff --git a/C/about-tor-browser.page b/C/about-tor-browser.page new file mode 100644 index 0000000..654eebe --- /dev/null +++ b/C/about-tor-browser.page @@ -0,0 +1,68 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="about-tor-browser"> + + <info> + <link type="guide" xref="index" group="#first"/> + <desc>Learn what Tor Browser can do to protect your privacy and anonymity.</desc> + </info> + + <title>About Tor Browser</title> + + <p> + Tor Browser uses the Tor network to protect your privacy and + anonymity. Using the Tor network has two main properties: + </p> + <list> + <item> + <p> + Your internet activity, including the names and addresses of + the websites you visit, will be hidden from your Internet + service provider and from anyone watching your connection + locally. + </p> + </item> + <item> + <p> + The operators of the websites and services that you use, and + anyone watching them, will see a connection coming from the + Tor network instead of your real Internet (IP) address, and + will not know who you are unless you explicitly identify + yourself. + </p> + </item> + </list> + <p> + In addition, Tor Browser is designed to prevent websites from + “fingerprinting” or identifying you based on your browser + configuration. + </p> + <p> + By default, Tor Browser does not keep any browsing history. + Cookies are only valid for a single session (until Tor Browser + is exited or a <link xref='managing-identities#new-identity'>New + Identity</link> is requested). + </p> + + <!-- XXX: ask Tor Browser team/mikeperry about things that are worth + adding here. --> + + <section id="how-tor-works"> + <title>How Tor works</title> + + <p> + Tor is a network of virtual tunnels that allows you to improve your + privacy and security on the Internet. Tor works by sending your + traffic through three random servers (also known as <em>relays</em>) + in the Tor network. The last relay in the circuit (the “exit relay”) + then sends the traffic out onto the public Internet. + </p> + <media type="image" src="media/how-tor-works.png" /> + <p> + The image above illustrates a user browsing to different websites + over Tor. The green monitors represent relays in the Tor network, + while the three keys represent the layers of encryption between the + user and each relay. + </p> + </section> +</page> diff --git a/C/bridges.page b/C/bridges.page index 6c4cc57..96aeb16 100644 --- a/C/bridges.page +++ b/C/bridges.page @@ -1,151 +1,78 @@ - <page xmlns="http://projectmallard.org/1.0/" type="topic" id="bridges">
<info> - <desc>What bridges are and how to use them.</desc> - <link type="guide" xref="index" /> + <desc>Learn what bridges are and how to get them</desc> + <link type="topic" xref="circumvention" /> </info>
<title>Bridges</title>
<p> -Bridges are quiet gateways into the Tor Network. Like Tor relays, they are run -by volunteers. Unlike relays, they are not listed publicly. Using bridges -disguise the fact that one is using Tor. + Most <link xref='transports'>Pluggable Transports</link>, such as obfs3 + and obfs4, rely on the use of “bridge” relays. Like ordinary Tor relays, bridges + are run by volunteers; unlike ordinary relays, however, they are not listed + publicly, so an adversary cannot identify them easily. Using bridges in + combination with pluggable transports helps to disguise the fact that you + are using Tor. </p>
<p> -Currently there are five bridge types, or transports, available. More are -being developed. +Other pluggable transports, like meek and Flashproxy, use different +anti-censorship techniques that do not rely on bridges. You do not need +to obtain bridge addresses in order to use these transports. </p> -<table frame='all' rules='all'> - <tr> - <td> - <p> - ORPort - </p> - </td> - <td> - <p> - Requesting 'bridges' without specifying the bridge type, will return - ORPort bridges, also called Vanilla bridges. ORPort bridges are NOT - reliable for circumventing censorship or national firewalls. ORPort - bridges can be useful as trusted entry points into the Tor network. - </p> - </td> - </tr> - <tr> - <td> - <p> - obfs2 - </p> - </td> - <td> - <p> - Censors have learned how to identify obfs2 bridges. This transport - is being deprecated. - </p> - </td> - </tr> - <tr> - <td> - <p> - obfs3 - </p> - </td> - <td> - <p> - Obfsproxy disguises Tor traffic as random noise. obfs3 bridges work - almost everywhere. A few obfs3 bridges have been blocked. - </p> - </td> - </tr> - <tr> - <td> - <p> - Scramblesuit - </p> - </td> - <td> - <p> - Scramblesuit is an additional tool for the obfsproxy transport. - Scramblesuit bridges are designed to be hard to identify and hard to - block. - </p> - </td> - </tr> - <tr> - <td> - <p> - FTE - </p> - </td> - <td> - <p> - Format-Transforming Encryption disguises Tor traffic as web (HTTP) - traffic or other types of internet traffic. FTE bridges are - effective, but in limited supply. - </p> - </td> - </tr> -</table>
-<p> -(Note that flashproxy is a Pluggable Transport, but does not rely on bridges.) -</p> +<section id="getting-bridges"> + <title>Getting bridge addresses</title> + <p> + Because bridge addresses are not public, you will need to request them + yourself. You have three options: + </p>
-<p> -There are four ways to get a bridge. -</p> - -<steps> - <item> - <p> - Visit <link href='https://bridges.torproject.org/'>https://bridges.torproject.org/</link> and follow the instructions. - </p> - </item> +<list> <item> <p> - Email bridges@bridges.torproject.org from a gmail or yahoo - email address. Put <cmd>get bridges</cmd> in the body for ORPort bridges - or <cmd>transport=obfs3</cmd> for obfs3 bridges. + Visit <link href='https://bridges.torproject.org/'>https://bridges.torproject.org/</link> + and follow the instructions, or </p> </item> <item> <p> - Politely ask a human at help@rt.torproject.org if you cannot access - either of the first two methods. + Email bridges@torproject.org from a Gmail, Yahoo, or Riseup email + address, or </p> </item> <item> <p> - Install and configure a Tor instance to be bridge - for yourself. The computer acting as a bridge must have uncensored internet - access to the Tor network. A full installation guide can be found at - <link href='https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en'>https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en</link> + Politely ask a human at help@rt.torproject.org if neither of the first + two methods works for you. </p> </item> -</steps> +</list> +</section>
-<p> -Enter the bridge information you get from any of the above steps in -Tor-launcher. -</p> +<section id="entering-bridges"> + <title>Entering bridge addresses</title> + <p> + Once you have obtained some bridge addresses, you will need to enter them + into Tor Launcher. + </p>
-<p> -Choose yes when asked if your Internet Service Provider blocks connections to -the Tor network. Select 'Use custom bridges' and enter each bridge identifier -on its own line. -</p> + <p> + Choose “yes” when asked if your Internet Service Provider blocks connections to + the Tor network. Select “Use custom bridges” and enter each bridge address + on a separate line. + </p>
-<media type="image" src="media/tor-launcher-custom-bridges_en-US.png" /> - -<p> -Click Connect. Using bridges slow down the connection. If the connection fails, -the bridges you received may be down. Get more and try again. -</p> + <media type="image" src="media/tor-launcher-custom-bridges_en-US.png" />
+ <p> + Click “Connect”. Using bridges may slow down the connection compared to + using ordinary Tor relays. If the connection fails, the bridges you + received may be down. Please use one of the above methods to obtain + more bridge addresses, and try again. + </p> +</section> </page> - diff --git a/C/circumvention.page b/C/circumvention.page index 5fc1f03..de0ba04 100644 --- a/C/circumvention.page +++ b/C/circumvention.page @@ -1,4 +1,3 @@ - <page xmlns="http://projectmallard.org/1.0/" type="topic" id="circumvention"> @@ -11,35 +10,61 @@ <title>Circumvention</title>
<p> -Some firewalls can detect and block connections to Tor. The Tor Browser -includes some circumvention tools for getting around blocking firewalls. -These circumvention tools are called Pluggable Transports. To turn them on, -click "Configure" in the Tor launcher window. +Direct access to the Tor network may sometimes be blocked by your Internet +Service Provider or by a government. Tor Browser includes some +circumvention tools for getting around these blocks. These tools are called +“pluggable transports”. See the <link xref='transports'>Pluggable +Transports</link> page for more information on the types of transport +that are currently available. </p>
-<media type="image" src="media/tor-launcher-configure_en-US.png" /> +<section id="using-transports"> +<title>Using pluggable transports</title> +<steps> + <item> + <p> + To use pluggable transports, click "Configure" in the Tor Launcher + window that appears when you first run Tor Browser. + </p>
-<p> -Select yes when asked if your internet service provider blocks connections -to Tor." -</p> + <media type="image" src="media/tor-launcher-configure_en-US.png" />
-<media type="image" src="media/tor-launcher-wizard_en-US.png" /> + <p> + You can also configure pluggable transports while Tor Browser is + running, by clicking on the Torbutton menu and selecting “Tor Network + Settings”. + </p>
-<p> -Select "Connect with provided bridges". Tor Browser has three Pluggable -Transports to choose from. If one fails to get you online, try selecting a -different transport. -</p> + <!-- XXX: insert screenshot of Torbutton menu --> + </item>
-<media type="image" src="media/tor-launcher-provided-bridges_en-US.png" /> + <item> + <p> + Select “yes” when asked if your Internet Service Provider blocks + connections to the Tor network. + </p> + + <media type="image" src="media/tor-launcher-wizard_en-US.png" /> + </item> + + <item> + <p> + Select “Connect with provided bridges”. Tor Browser currently has nine + pluggable transport options to choose from. If one fails to get you + online, try selecting a different transport. + </p> + + <!-- XXX: Update this image --> + <media type="image" src="media/tor-launcher-provided-bridges_en-US.png" /> + </item> +</steps>
<p> -If you try all three transports, and none of them get you online, select -"Enter custom bridges", and enter bridges manually. Read the <link -xref='bridges'>Getting Bridges</link> section for instructions on getting -custom bridges. +If you try all of these options, and none of them gets you online, +you will need to enter bridge addresses manually. Read the <link +xref='bridges'>Bridges</link> section to learn what bridges are and how +to obtain them. </p> +</section>
</page> - diff --git a/C/first-time.page b/C/first-time.page new file mode 100644 index 0000000..095380b --- /dev/null +++ b/C/first-time.page @@ -0,0 +1,68 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="first-time"> + + <info> + <link type="guide" xref="index" group="#first" /> + <desc>Learn how to use Tor Browser for the first time</desc> + </info> + + <title>Running Tor Browser for the First Time</title> + + <p> + When you run Tor Browser for the first time, you will see the Tor + Launcher window. This offers you the option to connect directly to the + Tor network, or to configure Tor Browser for your connection. + </p> + + <section id="connect"> + <title>Connect</title> + <p> + In most cases, this option will allow you to connect to the Tor network + without any further configuration. Once clicked, a status bar will + appear, showing Tor’s connection progress. If you are on a relatively + fast connection, but this bar seems to get stuck at a certain point, + see the <link xref='troubleshooting'>Troubleshooting</link> page for + help solving the problem. + </p> + </section> + <section id="configure"> + <title>Configure</title> + <p> + If you know that your connection is censored, or uses a proxy, you should + select this option. Tor Launcher will take you through a series of + configuration options. + </p> + <steps> + <item> + <p> + The first screen asks if access to the Tor network is blocked or + censored on your connection. If you do not believe this is the case, + select “No”. If you know your connection is censored, or you have + tried and failed to connect to the Tor network and no other solutions + have worked, select “Yes”. You will then be taken to the <link + xref='circumvention'>Circumvention</link> screen to configure + a pluggable transport. + </p> + </item> + <item> + <p> + The next screen asks if your connection uses a proxy. In most cases, + this is not necessary. You will usually know if you need to answer + “Yes”, as the same settings will be used for other browsers on your + system. If possible, ask your network administrator for guidance. If + your connection does not use a proxy, answer “No”. + </p> + </item> + <item> + <p> + The final screen asks if your connection is behind a firewall that + only allows certain ports. If the answer is “Yes”, enter all the + allowed ports, separated by a comma but no spaces. If the answer is + “No”, click “Connect”. + </p> + </item> + </steps> + </section> + +</page> diff --git a/C/known-issues.page b/C/known-issues.page index 327b8be..d4b87b8 100644 --- a/C/known-issues.page +++ b/C/known-issues.page @@ -1,11 +1,10 @@ - <page xmlns="http://projectmallard.org/1.0/" type="topic" id="known-issues">
<info> <desc>A list of known issues.</desc> - <link type="guide" xref="index" group="#last" /> + <link type="topic" xref="troubleshooting" /> </info>
<title>Known Issues</title> @@ -67,9 +66,4 @@ </p> </item> </list> -<p> -If you have an issue with Tor Browser that isn't on this list, feel free to -email help@rt.torproject.org. -</p> </page> - diff --git a/C/managing-identities.page b/C/managing-identities.page new file mode 100644 index 0000000..eb86ed6 --- /dev/null +++ b/C/managing-identities.page @@ -0,0 +1,129 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="managing-identities"> + +<info> + <desc>Learn how to control personally-identifying information in Tor Browser</desc> + <link type="guide" xref="index" /> +</info> + +<title>Managing Identities</title> + +<p> +When you connect to a website, it is not only the operators +of that website who can record information about your visit. Most +websites now use numerous third-party services, including social networking +“Like” buttons, analytics trackers, and advertising beacons, all of which +can link your activity across different sites. +</p> + +<p> +Using the Tor network stops observers from being able to +discover your exact location and IP address, but even without this +information they might be able to link different areas of +your activity together. For this reason, Tor Browser includes some additional +features that help you control what information can be tied to your identity. +</p> + +<section id="url-bar"> +<title>The URL bar</title> +<p> +Tor Browser centers your web experience around your relationship with +the website in the URL bar. Even if you connect to two different sites +that use the same third-party tracking service, Tor Browser will force +the content to be served over two different Tor circuits, so the tracker will +not know that both connections originate from your browser. +</p> + +<p> +On the other hand, all connections to a single website address will be +made over the same Tor circuit, meaning you can browse different pages +of a single website in separate tabs or windows, without any loss of +functionality. +</p> +</section> + +<section id="logins"> +<title>Logging in over Tor</title> +<p> +Although Tor Browser is designed to enable total user anonymity on the web, +there may be situations in which it makes sense to use Tor with websites +that require usernames, passwords, or other identifying information. +</p> + +<p> +If you log into a website using a regular browser, you also reveal your +IP address and geographical location in the process. The same is often +true when you send an email. Logging into your social networking or +email accounts using Tor Browser allows you to choose exactly which +information you reveal to the websites you browse. Logging in using Tor +Browser is also useful if the website you are trying to reach is +censored on your network. +</p> + +<p> +When you log in to a website over Tor, there are several points you +should bear in mind: +</p> + +<list> + <item> + <p> + See the <link + xref='secure-connections'>Secure Connections</link> page + for important information on how to secure your connection when + logging in. + </p> + </item> + <item> + <p> + Tor Browser often makes your connection appear as though it is coming + from an entirely different part of the world. Some websites, such as + banks or email providers, might interpret this as a sign that your + account has been hacked or compromised, and lock you out. The only + way to resolve this is by following the site’s recommended procedure + for account recovery, or contacting the operators and explaining the + situation. + </p> + </item> +</list> +</section> + +<section id="new-identity"> +<title>Changing identities and circuits</title> +<p> +Tor Browser features “New Identity” and “New Tor Circuit for this Site” +options, located in the Torbutton menu. +</p> + +<terms> + <item> + <title>New Identity</title> + <p> + This option is useful if you want to prevent your subsequent browser + activity from being linkable to what you + were doing before. Selecting it will close all your open tabs and + windows, clear all private information such as cookies and browsing + history, and use new Tor circuits for all connections. Make sure you + have completely finished all activity and downloads before clicking + “New Identity”, as you will not be able to resume them in the new + browser window without starting all over again. + </p> + </item> + <item> + <title>New Tor Circuit for this Site</title> + <p> + This option is useful if the <link + xref='about-tor-browser#how-tor-works'>exit relay</link> you are + using is unable to connect to the website you require, or is not + loading it properly. Selecting it will cause the currently-active + tab or window to be reloaded over a new Tor circuit. Other open tabs + and windows from the same website will use the new circuit as well + once they are reloaded. This option does not clear any private + information or unlink your activity, nor does it affect your current + connections to other websites. + </p> + </item> + </terms> +</section> +</page> diff --git a/C/onionsites.page b/C/onionsites.page new file mode 100644 index 0000000..809f099 --- /dev/null +++ b/C/onionsites.page @@ -0,0 +1,67 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="onionsites"> + +<info> + <desc>Websites hosted in the Tor network</desc> + <link type="guide" xref="index" /> +</info> + +<title>Onionsites</title> +<p> +Onionsites (also known as “hidden services”) are websites that are only +accessible through the Tor network. +</p> + +<p> +Onionsites offer several advantages over ordinary sites on the +non-private web: +</p> + +<list> + <item> + <p> + An onionsite’s location and IP address are hidden, making it difficult + for adversaries to censor it or identify its operators. + </p> + </item> + <item> + <p> + All traffic between Tor users and onionsites is end-to-end encrypted, + so you do not need to worry about <link + xref='secure-connections'>connecting over HTTPS</link>. + </p> + </item> + <item> + <p> + The address of an onionsite is automatically generated, so the + operators do not need to purchase a domain name; the .onion URL also + helps Tor ensure that it is connecting to the right location and that + the connection is not being tampered with. + </p> + </item> +</list> + +<section id="access"> +<title>How to access an onionsite</title> +<p> +Just like any other website, you will need to know the address of an +onionsite in order to connect to it. An onion address is a string of +sixteen mostly random letters and numbers, followed by “.onion”. +</p> +</section> + +<section id="troubleshooting"> +<title>Troubleshooting</title> +<p> +If you cannot reach the onionsite you require, make sure that you have +entered the 16-character onion address correctly: even a small mistake +will stop Tor Browser from being able to reach the site. +</p> +<p> +If you are still unable to connect to the onionsite, please try again +later. There may be a temporary connection issue, or the site operators +may have allowed it to go offline without warning. +</p> +</section> +</page> diff --git a/C/plugins.page b/C/plugins.page new file mode 100644 index 0000000..9d7e9c2 --- /dev/null +++ b/C/plugins.page @@ -0,0 +1,70 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="plugins"> + +<info> + <desc>How Tor Browser handles browser plugins and add-ons</desc> + <link type="guide" xref="index" group="#last" /> +</info> + +<title>Flash, JavaScript, and other add-ons</title> + +<section id="flash"> +<title>Flash Player</title> + <p> + Video websites, such as YouTube and Vimeo, make use of the + Flash Player plugin to display video content. Unfortunately, this + software operates independently of Tor Browser and cannot easily be + made to obey Tor Browser’s proxy settings. It can therefore reveal your + real location and IP address to the website operators, or to an outside + observer. For this reason, Flash is disabled by default in Tor Browser, + and enabling it is not recommended. + </p> + <p> + Some video websites offer alternative video delivery methods that do + not use Flash. These methods may be compatible with Tor Browser. + </p> +</section> + +<section id="javascript"> +<title>JavaScript</title> +<p> +JavaScript is a programming language that websites use to offer +interactive elements such as video, animation, audio, and status +timelines. Unfortunately, JavaScript can also enable attacks on the +security of the browser, which might lead to deanonymization. +</p> + +<p> +Tor Browser includes an add-on called NoScript, accessed through the +“S” icon at the top-left of the window, which allows you to control the +JavaScript that runs on individual web pages, or to block it entirely. +</p> + +<p> +Users who require a high degree of security in their web browsing should +select “Forbid Scripts Globally” from the NoScript drop-down menu. This +setting is also activated by default when Tor Browser’s <link +xref='security-slider'>Security Slider</link> is set to “Medium-High” +(for non-HTTPS websites) or “High” (for all websites). However, disabling +JavaScript will prevent many websites from displaying correctly, so Tor +Browser’s default setting is to allow all websites to run scripts. +</p> +</section> + +<section id="add-ons"> +<title>Browser Add-ons</title> +<p> +Tor Browser is based on Firefox, and any browser add-ons or themes that +are compatible with Firefox can also be installed in Tor Browser. +</p> + +<p> +However, the only add-ons that have been tested for use with Tor Browser +are those included by default. Installing any other browser +add-ons may break functionality in Tor Browser or cause more serious +problems that affect your privacy and security, and is done at your own +risk. +</p> +</section> +</page> diff --git a/C/secure-connections.page b/C/secure-connections.page new file mode 100644 index 0000000..bc95244 --- /dev/null +++ b/C/secure-connections.page @@ -0,0 +1,118 @@ +<page xmlns="http://projectmallard.org/1.0/" + xmlns:its="http://www.w3.org/2005/11/its" + xmlns:xi="http://www.w3.org/2001/XInclude" + type="topic" + id="secure-connections"> + + <info> + <desc>Learn how to protect your data using Tor Browser and HTTPS</desc> + <link type="guide" xref="index" /> + </info> + + <title>Secure Connections</title> + + <p> + If personal information such as a login password travels + unencrypted over the Internet, it can very easily be intercepted by an + eavesdropper. If you are logging into any website, you should + make sure that the site offers HTTPS encryption, which protects against + this kind of eavesdropping. You can verify this in the URL bar: if your + connection is encrypted, the address will begin with “https://”, rather + than “http://”. + </p> + + <p> + The following visualization shows what information is visible to + eavesdroppers with and without Tor Browser and HTTPS encryption: + </p> + + <xi:include href="media/tor-and-https.svg" /> + + <list> + <item> + <p> + Click the “Tor” button to see what data is visible to + observers when you're using Tor. The button will turn green to + indicate that Tor is on. + </p> + </item> + <item> + <p> + Click the “HTTPS” button to see what data is visible to + observers when you're using HTTPS. The button will turn green to + indicate that HTTPS is on. + </p> + </item> + <item> + <p> + When both buttons are green, you see the data that is visible to + observers when you are using both tools. + </p> + </item> + <item> + <p> + When both buttons are grey, you see the data that is visible + to observers when you don't use either tool. + </p> + </item> + </list> + <terms> + <title>Potentially visible data</title> + <item> + <title its:translate="no"> + <xi:include href="media/tor-and-https.svg" parse="xml" + xpointer="xpointer(//*[@id='string-site']/text())"> + xi:fallbacksite.com</xi:fallback> + </xi:include> + </title> + <p> + The site being visited. + </p> + </item> + <item> + <title its:translate="no"> + <xi:include href="media/tor-and-https.svg" parse="xml" + xpointer="xpointer(//*[@id='string-login']/text())"> + xi:fallbackuser / pw</xi:fallback> + </xi:include> + </title> + <p> + Username and password used for authentication. + </p> + </item> + <item> + <title its:translate="no"> + <xi:include href="media/tor-and-https.svg" parse="xml" + xpointer="xpointer(//*[@id='string-data']/text())"> + xi:fallbackdata</xi:fallback>--> + </xi:include> + </title> + <p> + Data being transmitted. + </p> + </item> + <item> + <title its:translate="no"> + <xi:include href="media/tor-and-https.svg" parse="xml" + xpointer="xpointer(//*[@id='string-location']/text())"> + xi:fallbacklocation</xi:fallback> + </xi:include> + </title> + <p> + Network location of the computer used to visit the website (the public + IP address). + </p> + </item> + <item> + <title its:translate="no"> + <xi:include href="media/tor-and-https.svg" parse="xml" + xpointer="xpointer(//*[@id='string-tor']/text())"> + xi:fallbackTor</xi:fallback> + </xi:include> + </title> + <p> + Whether or not Tor is being used. + </p> + </item> + </terms> +</page> diff --git a/C/security-slider.page b/C/security-slider.page new file mode 100644 index 0000000..17abe9d --- /dev/null +++ b/C/security-slider.page @@ -0,0 +1,76 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="security-slider"> + +<info> + <desc>Configuring Tor Browser for security and usability</desc> + <link type="guide" xref="index" /> +</info> + +<title>Security Slider</title> +<p> +Tor Browser includes a “Security Slider” that lets you +increase your security by disabling certain web features that can be +used to attack your security and anonymity. Increasing Tor Browser’s +security level will stop some web pages from functioning properly, so +you should weigh your security needs against the degree of usability +you require. +</p> + +<section id="access"> +<title>Accessing the Security Slider</title> +<p> +The Security Slider is located in Torbutton’s “Privacy and Security +Settings” menu. +</p> +</section> + +<section id="levels"> +<title>Security Levels</title> +<p> +Increasing the level of the Security Slider will disable or partially +disable certain browser features to protect against possible attacks. +</p> + +<terms> + <item> + <title>Low</title> + <p> + At this level, all browser features are enabled. This is the most + usable option. + </p> + </item> + <item> + <title>Medium-Low</title> + <p> + At this level, HTML5 video and audio media become click-to-play via + NoScript; some <link xref='plugins'>JavaScript</link> performance + optimizations are disabled, causing some websites to run more slowly; + and some mathematical equations may not display properly. + </p> + </item> + <item> + <title>Medium-High</title> + <p> + At this level, HTML5 video and audio media become click-to-play via + NoScript; all JavaScript performance optimizations are disabled; some + mathematical equations may not display properly; some font rendering + features are disabled; some types of image are disabled; and + JavaScript is disabled by default on all non-<link + xref='secure-connections'>HTTPS</link> sites. + </p> + </item> + <item> + <title>High</title> + <p> + At this level, HTML5 video and audio media become click-to-play via + NoScript; all JavaScript performance optimizations are disabled; some + mathematical equations may not display properly; some font rendering + features are disabled; some types of image are disabled; Javascript + is disabled by default on all sites; most video and audio formats are + disabled; and some fonts and icons may not display correctly. + </p> + </item> +</terms> +</section> +</page> diff --git a/C/tor.page b/C/tor.page deleted file mode 100644 index 2e86158..0000000 --- a/C/tor.page +++ /dev/null @@ -1,228 +0,0 @@ -<page xmlns="http://projectmallard.org/1.0/" - xmlns:its="http://www.w3.org/2005/11/its" - xmlns:xi="http://www.w3.org/2001/XInclude" - type="topic" - id="tor"> - - <info> - <link type="guide" xref="index" group="#first"/> - <desc>Learn what Tor can do to protect your privacy and anonymity.</desc> - </info> - - <title>Tor</title> - - <section id="what-tor-will-do"> - <title>What Tor will do</title> - - <p> - The <app its:translate="no">Tor Browser</app> uses the <app - its:translate="no">Tor</app> network to protect your privacy - and anonymity. Using the <app its:translate="no">Tor</app> network has two - main properties: - </p> - - <list> - <item> - <p> - The Internet access provider will not be able to learn the sites - being visited and will not be able to monitor the content of - the communication. - </p> - </item> - <item> - <p> - The sites will see a connection coming from the <app - its:translate="no">Tor</app> network and will not learn - the actual Internet connection used to visit them. - </p> - </item> - </list> - - <p> - On top of that, the <app its:translate="no">Tor Browser</app> is designed - to minimize the ability of websites to fingerprint the browser. - </p> - <p> - The Tor Browser does not keep any browsing history. <em>Cookies</em> - are only valid for a single session: until the <app its:translate="no">Tor - Browser</app> is exited or a <!-- XXX: add link --><gui>New Identity</gui> - is requested. - </p> - - <!-- XXX: add Tor Browser team/mikeperry about things that are worth - adding here. --> - </section> - - <section id="what-tor-will-not-do"> - <title>What Tor will <em>not</em> do</title> - - <p> - <app its:translate="no">Tor</app> and the <app its:translate="no">Tor - Browser</app> will protect your privacy and anonymity only if used - appropriately. - </p> - - <list> - <item> - <p> - <app its:translate="no">Tor</app> will not encrypt the whole - communication. What is sent to the <app its:translate="no">Tor</app> - network is what leaves the <app its:translate="no">Tor</app> network. - For web browsing, this means that any confidential information - should be sent using the HTTPS protocol. - <!-- XXX: add a link to another topic page / document HTTPS Everywhere - --> - <!-- XXX: mention hidden services? --> - </p> - </item> - <item> - <p> - If you give a website identifying information (e.g. a name, a - <em>login</em>), you will no longer be an anonymous visitor of this - website. - </p> - </item> - <item> - <p> - If you transfer files, they can contain identifying information in their - metadata, like the camera serial number. - </p> - </item> - <item> - <p> - Only connections made through the <app its:translate="no">Tor - Browser</app> will go through the <app its:translate="no">Tor</app> - network. Unless specific steps are taken, other applications on your - computer will continue to do direct Internet connections and can - reveal your location. - <!-- XXX: add topic page on how to deal with external documents? / - mention Tails? --> - </p> - </item> - </list> - - <p> - If loosing control over some information might have problematic - consequences, it is sometimes better to leave it off computers entirely. - </p> - </section> - - <section id="how-tor-works"> - <title>How Tor works</title> - - <p> - Tor is a network of virtual tunnels that allows you to improve your - privacy and security on the Internet. Tor works by sending your - traffic through three random servers (also known as <em>relays</em>) - in the Tor network, before the traffic is sent out onto the public - Internet - </p> - <media type="image" src="media/how-tor-works.png" /> - <p> - The image above illustrates a user browsing to different websites - over Tor. The green monitors represent relays in the Tor network, - while the three keys represent the layers of encryption between the - user and each relay. - </p> - </section> - - <section id="tor-and-https"> - <title>Tor and HTTPS</title> - - <p> - The following visualization helps understanding what data are visible to - eavesdroppers with or without the <app its:translate="no">Tor Browser</app> - and when encrypted connections (HTTPS) or not: - </p> - - <xi:include href="media/tor-and-https.svg" /> - - <list> - <item> - <p> - Click the <gui>Tor</gui> button to see what data is visible to - eavesdroppers when you're using Tor. The button will turn green to - indicate that Tor is on. - </p> - </item> - <item> - <p> - Click the <gui>HTTPS</gui> button to see what data is visible to - eavesdroppers when you're using HTTPS. The button will turn green to - indicate that HTTPS is on. - </p> - </item> - <item> - <p> - When both buttons are green, you see the data that is visible to - eavesdroppers when you are using both tools. - </p> - </item> - <item> - <p> - When both buttons are grey, you see the data that is visible - to eavesdroppers when you don't use either tool. - </p> - </item> - </list> - <terms> - <title>Potentially visible data</title> - <item> - <title its:translate="no"> - <xi:include href="media/tor-and-https.svg" parse="xml" - xpointer="xpointer(//*[@id='string-site']/text())"> - xi:fallbacksite.com</xi:fallback> - </xi:include> - </title> - <p> - The site being visited. - </p> - </item> - <item> - <title its:translate="no"> - <xi:include href="media/tor-and-https.svg" parse="xml" - xpointer="xpointer(//*[@id='string-login']/text())"> - xi:fallbackuser / pw</xi:fallback> - </xi:include> - </title> - <p> - Username and password used for authentication. - </p> - </item> - <item> - <title its:translate="no"> - <xi:include href="media/tor-and-https.svg" parse="xml" - xpointer="xpointer(//*[@id='string-data']/text())"> - xi:fallbackdata</xi:fallback>--> - </xi:include> - </title> - <p> - Data being transmited. - </p> - </item> - <item> - <title its:translate="no"> - <xi:include href="media/tor-and-https.svg" parse="xml" - xpointer="xpointer(//*[@id='string-location']/text())"> - xi:fallbacklocation</xi:fallback> - </xi:include> - </title> - <p> - Network location of the computer used to visit the website (the public - IP address). - </p> - </item> - <item> - <title its:translate="no"> - <xi:include href="media/tor-and-https.svg" parse="xml" - xpointer="xpointer(//*[@id='string-tor']/text())"> - xi:fallbackTor</xi:fallback> - </xi:include> - </title> - <p> - Whether or not Tor is being used. - </p> - </item> - </terms> - </section> -</page> diff --git a/C/transports.page b/C/transports.page new file mode 100644 index 0000000..03dc89b --- /dev/null +++ b/C/transports.page @@ -0,0 +1,112 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="transports"> + +<info> + <desc>Types of pluggable transport</desc> + <link type="topic" xref="circumvention" /> +</info> + +<title>Pluggable Transports</title> + +<p> +Pluggable transports are tools that Tor can use to disguise the +traffic it sends out. This can be useful in situations where an Internet +Service Provider or other authority is actively blocking connections to +the Tor network. +</p> + +<section id="types"> +<title>Types of pluggable transport</title> +<p> +Currently there are six pluggable transports available, but more are +being developed. +</p> +<table frame='all' rules='all'> + <tr> + <td> + <p> + obfs2 + </p> + </td> + <td> + <p> + Censors have learned how to identify obfs2 bridges. This transport + is deprecated, and you should not use it. + </p> + </td> + </tr> + <tr> + <td> + <p> + obfs3 + </p> + </td> + <td> + <p> + obfs3 disguises Tor traffic as random noise. obfs3 bridges work + almost everywhere, though some may have been identified and + blocked by censors. + </p> + </td> + </tr> + <tr> + <td> + <p> + Scramblesuit + </p> + </td> + <td> + <p> + Scramblesuit is an additional tool for the obfs3 transport that + tries to stop censors from identifying bridges through active + probing. + </p> + </td> + </tr> + <tr> + <td> + <p> + obfs4 + </p> + </td> + <td> + <p> + obfs4 offers the same features as Scramblesuit, but uses different + cryptographic and authentication methods that result in improved + speed. + </p> + </td> + </tr> + <tr> + <td> + <p> + meek + </p> + </td> + <td> + <p> + Rather than using bridges, meek works by making your Tor traffic + seem as though it is destined for a major website that a censor + cannot block without disrupting a lot of other activity on the + network. + </p> + </td> + </tr> + <tr> + <td> + <p> + FTE + </p> + </td> + <td> + <p> + Format-Transforming Encryption disguises Tor traffic as web (HTTP) + traffic or other types of internet traffic. FTE bridges are + effective, but in limited supply. + </p> + </td> + </tr> +</table> +</section> +</page> diff --git a/C/troubleshooting.page b/C/troubleshooting.page index d1cda52..952a0a5 100644 --- a/C/troubleshooting.page +++ b/C/troubleshooting.page @@ -1,54 +1,119 @@ - <page xmlns="http://projectmallard.org/1.0/" type="topic" id="troubleshooting">
<info> - <desc>What to do if Tor Browser doesn't work.</desc> + <desc>What to do if Tor Browser doesn’t work.</desc> <link type="guide" xref="index" group="#last" /> </info>
<title>Troubleshooting</title>
<p> -The Tor Browser should get you online automatically after clicking the -"Connect" button on the start up screen. +You should be able to start browsing the web using Tor Browser shortly +after running the program, and clicking the “Connect” button if you are +using it for the first time. </p>
<media type="image" src="media/tor-launcher-connect_en-US.png" />
+<section id="no-connection"> +<title>Quick fixes</title> <p> -If it doesn't connect, there may be a simple fix. Try each of the following: +If Tor Browser doesn’t connect, there may be a simple solution. Try each +of the following: </p>
<list> <item> - <p>Make sure another Tor Browser is not already running. If you're - not sure if Tor Browser is running, restart your computer.</p> + <p> + Your computer’s system clock must be set correctly, or Tor will not + be able to connect. + </p> + </item> + <item> + <p> + Make sure another Tor Browser is not already running. If you’re + not sure if Tor Browser is running, restart your computer. + </p> </item> <item> - <p>'Allow' Tor in your antivirus program.</p> + <p> + Make sure that any antivirus program you have installed is not + preventing Tor from running. You may need to consult the + documentation for your antivirus software if you do not know how to + do this. + </p> </item> <item> - <p>Temporarily disable your firewall.</p> + <p> + Temporarily disable your firewall. + </p> </item> <item> - <p>Delete Tor Browser and install it again. If updating, do not overwrite - your previous Tor Browser files.</p> + <p> + Delete Tor Browser and install it again. If updating, do not just + overwrite your previous Tor Browser files; ensure they are fully + deleted beforehand. + </p> </item> </list> +</section>
+<section id="blocked"> +<title>Is your connection censored?</title> <p> -If you still can't connect, your internet service provider might be censoring -connections to Tor. Follow the instructions in the <link -xref='circumvention'>Circumvention</link> section. +If you still can’t connect, your Internet Service Provider might be +censoring connections to the Tor network. Read the <link +xref='circumvention'>Circumvention</link> section for possible +solutions. </p> +</section>
+<section id="known-issues"> +<title>Known issues</title> <p> -If the above steps do not address your problem, email help@rt.torproject.org -with your operating system, the details of your problem, and what you've -already tried. +Tor Browser is under constant development, and some issues are known +about but not yet fixed. Please check the <link +xref='known-issues'>Known Issues</link> page to see if the problem you +are experiencing is already listed there. </p> +</section>
-</page> +<section id="helpdesk"> +<title>Contacting the Tor Help Desk</title> +<p> +If the above steps do not help you solve the problem, you can contact +Tor’s help desk. Send an email to help@rt.torproject.org with exact +details of the problem, your operating system, and the steps you have +already tried. Please only contact the help desk if you cannot find the +answer to your question in this manual. +</p> + +<p> +If possible, you should also include the “Tor log”, an +automatically-generated list of Tor’s activity that can help diagnose +the problem. To copy the Tor log, either: +</p> +<list> + <item> + <p> + click the button labelled “Copy Tor Log To Clipboard” that appears in + the dialog window while Tor Browser is connecting to the network, or + </p> + </item> + <item> + <p> + if Tor Browser is already open, click on the Torbutton icon (the small + green onion at the top left of the screen), then “Open Network + Settings”, then “Copy Tor Log To Clipboard”. + </p> + </item> +</list> +<p> +You can now paste the Tor log into your support request. +</p> +<!-- XXX: Include a screenshot of this --> +</section>
+</page> diff --git a/C/uninstalling.page b/C/uninstalling.page index 5c8ca62..4deef86 100644 --- a/C/uninstalling.page +++ b/C/uninstalling.page @@ -1,29 +1,29 @@ - <page xmlns="http://projectmallard.org/1.0/" type="topic" id="uninstalling">
<info> <desc>How to remove Tor Browser from your system.</desc> - <link type="guide" xref="index"/> + <link type="guide" xref="index" group="#last" /> </info>
<title>Uninstalling</title>
<p> -The Tor Browser does not affect any of the existing software -or settings on your computer. Uninstalling Tor Browser will not affect your -system's software or settings either. +Tor Browser does not affect any of the existing software or settings on +your computer. Uninstalling Tor Browser will not affect your system’s +software or settings. </p>
<p> -Removing the Tor Browser from your system is simple: +Removing Tor Browser from your system is simple: </p>
<steps> <item> <p>Locate your Tor Browser folder. The default location is your Desktop.</p> - </item> + <!-- is that true? --> + </item> <item> <p>Delete the Tor Browser folder.</p> </item> @@ -33,8 +33,8 @@ Removing the Tor Browser from your system is simple: </steps>
<p> -Note that your operating system's standard "Uninstall" utility is not used. +Note that your operating system’s standard “Uninstall” utility is not +used. </p>
</page> - diff --git a/C/updating.page b/C/updating.page new file mode 100644 index 0000000..1298893 --- /dev/null +++ b/C/updating.page @@ -0,0 +1,73 @@ +<page xmlns="http://projectmallard.org/1.0/" + type="topic" + id="updating"> + +<info> + <desc>How to update Tor Browser</desc> + <link type="guide" xref="index" /> +</info> + +<title>Updating</title> + +<p> +Tor Browser must be kept updated at all times. If you continue to use an +outdated version of the software, you may be vulnerable to serious +security flaws that compromise your privacy and anonymity. +</p> + +<p> +Tor Browser will prompt you to update the software once a new version +has been released: the Torbutton icon will display a yellow triangle, +and you may see a written update indicator when Tor Browser opens. You +can update either automatically or manually. +</p> + +<!-- XXX: Screenshot of update warning, plus screenshots for all the steps below --> + +<section id="automatic"> +<title>Updating Tor Browser automatically</title> +<steps> + <item> + <p> + When you are prompted to update Tor Browser, click on the Torbutton + icon, then select “Check for Tor Browser Update”. + </p> + </item> + <item> + <p> + When Tor Browser has finished checking for updates, click on the + “Update” button and wait for the update to download and install. + </p> + </item> + <item> + <p> + Restart Tor Browser. You will now be running the latest version. + </p> + </item> +</steps> +</section> +<section id="manual"> +<title>Updating Tor Browser manually</title> +<steps> + <item> + <p> + When you are prompted to update Tor Browser, finish the browsing + session and close the program. + </p> + </item> + <item> + <p> + Remove Tor Browser from your system by deleting the folder that + contains it (see the <link xref='uninstalling'>Uninstalling</link> + section for more information). + </p> + </item> + <item> + <p> + Visit https://www.torproject.org and download a copy of the latest Tor + Browser release, then install it as before. + </p> + </item> +</steps> +</section> +</page>