Author: arma Date: 2014-03-24 07:00:12 +0000 (Mon, 24 Mar 2014) New Revision: 26674
Modified: website/trunk/docs/en/faq.wml Log: make the faq work better on website mirrors too
Modified: website/trunk/docs/en/faq.wml =================================================================== --- website/trunk/docs/en/faq.wml 2014-03-24 06:57:32 UTC (rev 26673) +++ website/trunk/docs/en/faq.wml 2014-03-24 07:00:12 UTC (rev 26674) @@ -981,7 +981,7 @@ it sends. The Tor Browser Bundle tries to keep application-level data, like the user-agent string, uniform for all users. The Tor Browser can't do anything about text that you type into forms, though. <a - href="https://www.torproject.org/download/download-easy.html.en#warning%22%3EBe + href="<page download/download-easy>#warning">Be careful and be smart.</a> </p>
@@ -1517,7 +1517,7 @@ You can set Proxy IP address, port, and authentication information in Tor Browser's Network Settings. If you're using Tor another way, check out the HTTPProxy and HTTPSProxy config options in the <a -href="https://www.torproject.org/docs/tor-manual.html.en%22%3Eman page</a>, +href="<page docs/tor-manual>">man page</a>, and modify your torrc file accordingly. You will need an HTTP proxy for doing GET requests to fetch the Tor directory, and you will need an HTTPS proxy for doing CONNECT requests to get to Tor relays. (It's fine @@ -1642,7 +1642,7 @@
<p>You can still verify your Tor Browser download by downloading the signature file (.asc) along with your package and <a - href="https://www.torproject.org/docs/verifying-signatures.html.en%22%3E + href="<page docs/verifying-signatures>"> checking the GPG signature</a> as before. We now have an additional verification method that allows you to verify the build as well as the download.</p> @@ -1658,7 +1658,7 @@ <pre>gpg --keyserver keys.mozilla.org --recv-keys 0x29846B3C683686CC</pre> (This will bring you developer Mike Perry's public key. Other developers' key IDs can be found on - <a href="https://www.torproject.org/docs/signing-keys.html.en">this + <a href="<page docs/signing-keys>">this page</a>.)</li> <li>Verify the sha256sums.txt file by executing this command: <pre>gpg --verify <NAME OF THE SIGNATURE FILE>.asc sha256sums.txt</pre></li> @@ -1794,7 +1794,7 @@ </pre> <p> If you've installed <a - href="https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en#in...</a>, + href="<page projects/obfsproxy-debian-instructions>#instructions">Obfsproxy</a>, you'll need to add one more line: </p> <pre> @@ -2845,7 +2845,7 @@ for most flaggings are documented on the <a href="https://trac.torproject.org/projects/tor/wiki/doc/badRelays">bad relays wiki</a>. Please <a - href="https://torproject.org/about/contact.html.en%22%3Econtact us</a> so + href="<page about/contact>">contact us</a> so we can sort out the issue.</p>
<hr> @@ -3400,7 +3400,7 @@ <p><a href="https://exonerator.torproject.org/"> Exonerator</a> is a web service that can check if an IP address was a relay at a given time. We can also <a - href="https://torproject.org/about/contact.html.en%22%3Eprovide a signed + href="<page about/contact>">provide a signed letter</a> if needed.</p>
<hr> @@ -3510,7 +3510,7 @@ hidden service?</a></h3>
<p> - See the <a href="https://www.torproject.org/docs/tor-hidden-service.html.en"> + See the <a href="<page docs/tor-hidden-service>"> official hidden service configuration instructions</a>. </p>
@@ -3838,7 +3838,7 @@ </p> <p> That's where the <a - href="https://torproject.org/projects/torbrowser.html.en%22%3ETor Browser + href="<page projects/torbrowser>">Tor Browser Bundle</a> comes in. We produce a web browser that is preconfigured to help you control the risks to your privacy and anonymity while browsing the Internet. Not only are the above technologies disabled to prevent @@ -4123,7 +4123,7 @@ But since we want to do a lot of work on quality-of-service and better queuing approaches first, you shouldn't expect this change anytime soon (if ever). However if you are keen, there are a couple of -<a href="https://www.torproject.org/getinvolved/volunteer.html.en#Research"> +<a href="<page getinvolved/volunteer>#Research"> research ideas</a> that may involve changing the cell size. </p>
@@ -4158,7 +4158,7 @@ </p> <p> We've made quite a bit of progress on this problem lately. You can read more -details on the <a href="https://www.torproject.org/docs/pluggable-transports.html.en"> +details on the <a href="<page docs/pluggable-transports>"> pluggable transports page</a>. You may also be interested in <a href="https://www.youtube.com/watch?v=GwMr8Xl7JMQ">Roger and Jake's talk at 28C3</a>, or <a href="https://www.youtube.com/watch?v=JZg1nqs793M">Runa's @@ -4224,10 +4224,10 @@ minutes, and often more frequently than that. This makes it extremely dificult for websites to create any sort of persistent profile of Tor users (assuming you did not <a - href="https://torproject.org/download/download.html.en#warning">identify + href="<page download/download>#warning">identify yourself in other ways</a>). No one Tor relay can know enough information to compromise any Tor user because of Tor's <a - href="https://www.torproject.org/about/overview.html.en#thesolution%22%3Eencrypted + href="<page about/overview>#thesolution">encrypted three-hop circuit</a> design. </p>
tor-commits@lists.torproject.org