[or-cvs] r16338: fix HTML Tags (website/trunk/torbutton/en)

mfr at seul.org mfr at seul.org
Fri Aug 1 21:39:25 UTC 2008


Author: mfr
Date: 2008-08-01 17:39:25 -0400 (Fri, 01 Aug 2008)
New Revision: 16338

Modified:
   website/trunk/torbutton/en/faq.wml
   website/trunk/torbutton/en/options.wml
Log:
fix HTML Tags

Modified: website/trunk/torbutton/en/faq.wml
===================================================================
--- website/trunk/torbutton/en/faq.wml	2008-08-01 20:30:02 UTC (rev 16337)
+++ website/trunk/torbutton/en/faq.wml	2008-08-01 21:39:25 UTC (rev 16338)
@@ -150,7 +150,7 @@
  More generally, any sort of extension that requires registration, or even
  extensions that provide information about websites you visit should be
  suspect.
- </p>	</li>
+ </p></li>
  <li>FoxyProxy
 <p>
 While FoxyProxy is a nice idea in theory, in practice it is impossible to
@@ -174,7 +174,7 @@
 in all the logs of all websites that use Google Analytics!  See <a
 href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this question</a> on
 the FoxyProxy FAQ for more information.
-
+ </p></li>
  <li>NoScript
  <p>
  Torbutton currently mitigates all known anonymity issues with Javascript.
@@ -193,19 +193,22 @@
 
 <strong>Which Firefox extensions do you recommend?</strong>
 <ol>
- <li><a href="https://crypto.stanford.edu/forcehttps/">ForceHTTPS</a><p>
+ <li><a href="https://crypto.stanford.edu/forcehttps/">ForceHTTPS</a>
+	<p>
 Many sites on the Internet are <a
 href="http://www.defcon.org/html/defcon-16/dc-16-speakers.html#Perry">sloppy
 about their use of HTTPS</a> and secure
 cookies. This addon can help you ensure that you always use HTTPS for sites
 that support it, and reduces the chances of your cookies being stolen for
 sites that do not secure them.</p></li>
- <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li>
- Mentioned above, this extension allows more fine-grained referrer spoofing
+ <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a>
+	<p>
+Mentioned above, this extension allows more fine-grained referrer spoofing
 than Torbutton currently provides. It should break less sites than Torbutton's
 referrer spoofing option.</p></li>
- <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a> <p>
- If you use Tor excessively, and rarely disable it, you probably want to
+ <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a>
+	<p>
+If you use Tor excessively, and rarely disable it, you probably want to
 install this extension to minimize the ability of sites to store long term
 identifiers in your cache. This extension applies same origin policy to the
 cache, so that elements are retrieved from the cache only if they are fetched

Modified: website/trunk/torbutton/en/options.wml
===================================================================
--- website/trunk/torbutton/en/options.wml	2008-08-01 20:30:02 UTC (rev 16337)
+++ website/trunk/torbutton/en/options.wml	2008-08-01 21:39:25 UTC (rev 16338)
@@ -22,14 +22,14 @@
 prevent this.)</p>
 
 <ul>
- <li>Disable plugins on Tor Usage (crucial)</li>
+ <li>Disable plugins on Tor Usage (crucial)</p> 
 
   This option is key to Tor security. Plugins perform their own networking
 independent of the browser, and many plugins only partially obey even their own
 proxy settings.
+</p></li>
+  <li>Isolate Dynamic Content to Tor State (crucial)</p> 
 
-  <li>Isolate Dynamic Content to Tor State (crucial)</li>
-
   Another crucial option, this setting causes the plugin to disable Javascript
   on tabs that are loaded during a Tor state different than the current one,
   to prevent delayed fetches of injected URLs that contain unique identifiers,
@@ -37,190 +37,190 @@
   Tor. It also prevents all fetches from tabs loaded with an opposite Tor
   state. This serves to block non-Javascript dynamic content such as CSS
   popups from revealing your IP address if you disable Tor.
+</p></li>
+  <li>Hook Dangerous Javascript (crucial)</p> 
 
-  <li>Hook Dangerous Javascript (crucial)</li>
-
 This setting enables the Javascript hooking code. Javascript is injected into
 pages to hook the Date object to mask your timezone, and to hook the navigator
 object to mask OS and user agent properties not handled by the standard
 Firefox user agent override settings.
+</p></li>
+  <li>Resize window dimensions to multiples of 50px on toggle (recommended)</p> 
 
-  <li>Resize window dimensions to multiples of 50px on toggle (recommended)</li>
-
 To cut down on the amount of state available to fingerprint users uniquely, 
 this pref causes windows to be resized to a multiple of 50 pixels on each
 side when Tor is enabled and pages are loaded.
+</p></li>
+  <li>Disable Updates During Tor (recommended)</p> 
 
-  <li>Disable Updates During Tor (recommended)</li>
-
 Under Firefox 2, many extension authors did not update their extensions from 
 SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to 
 existing extensions. Since Firefox 3 now enforces encrypted and/or
 authenticated updates, this setting is no longer as important as it once
 was (though updates do leak information about which extensions you have, it is
 fairly infrequent).
+</p></li>
+  <li>Disable Search Suggestions during Tor (optional)</p> 
 
-  <li>Disable Search Suggestions during Tor (optional)</li>
-
 This optional setting governs if you get Google search suggestions during Tor
 usage. Since no cookie is transmitted during search suggestions, this is a
 relatively benign behavior.
+</p></li>
+  <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</p> 
 
-  <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</li>
-
 These settings prevent local html documents from transmitting local files to
 arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that
 force the browser to save arbitrary pages locally (and also inject script into
 arbitrary html files you save to disk via Tor), it is probably a good idea to
 leave this setting on.
+</p></li>
+  <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</p> 
 
-  <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</li>
-
 These two settings allow you to obtain a greater degree of assurance that
 after you toggle out of Tor, the pages are really gone and can't perform any
 extra network activity. Currently, there is no known way that pages can still
 perform activity after toggle, but these options exist as a backup measure
 just in case a flaw is discovered. They can also serve as a handy 'Boss
 Button' feature for clearing all Tor browsing off your screen in a hurry.
+</p></li>
+  <li>Isolate access to history navigation to Tor state (crucial)</p> 
 
-  <li>Isolate access to history navigation to Tor state (crucial)</li>
-
 This setting prevents both Javascript and accidental user clicks from causing
 the session history to load pages that were fetched in a different Tor state
 than the current one. Since this can be used to correlate Tor and Non-Tor
 activity and thus determine your IP address, it is marked as a crucial 
 setting.
+</p></li>
+  <li>Block History Reads during Tor (crucial)</p> 
 
-  <li>Block History Reads during Tor (crucial)</li>
-
   Based on code contributed by <a href="http://www.collinjackson.com/">Collin
   Jackson</a>, when enabled and Tor is enabled, this setting prevents the
 rendering engine from knowing if certain links were visited.  This mechanism
 defeats all document-based history disclosure attacks, including CSS-only
 attacks.
+</p></li>
+  <li>Block History Reads during Non-Tor (recommended)</p> 
 
-  <li>Block History Reads during Non-Tor (recommended)</li>
-
   This setting accomplishes the same but for your Non-Tor activity.
+</p></li>
+  <li>Block History Writes during Tor (recommended)</p> 
 
-  <li>Block History Writes during Tor (recommended)</li>
-
   This setting prevents the rendering engine from recording visited URLs, and
 also disables download manager history. Note that if you allow writing of Tor history,
 it is recommended that you disable non-Tor history reads, since malicious
 websites you visit without Tor can query your history for .onion sites and
 other history recorded during Tor usage (such as Google queries).
+</p></li>
+  <li>Block History Writes during Non-Tor (optional)</p> 
 
-  <li>Block History Writes during Non-Tor (optional)</li>
-
 This setting also disables recording any history information during Non-Tor
 usage.
+</p></li>
+<li>Clear History During Tor Toggle (optional)</p> 
 
-<li>Clear History During Tor Toggle (optional)</li>
-
   This is an alternate setting to use instead of (or in addition to) blocking
 history reads or writes.
+</p></li>
+  <li>Block Password+Form saving during Tor/Non-Tor</p> 
 
-  <li>Block Password+Form saving during Tor/Non-Tor</li>
-
   These options govern if the browser writes your passwords and search
   submissions to disk for the given state.
+</p></li>
+  <li>Block Tor disk cache and clear all cache on Tor Toggle</p> 
 
-  <li>Block Tor disk cache and clear all cache on Tor Toggle</li>
-
   Since the browser cache can be leveraged to store unique identifiers, cache
 must not persist across Tor sessions. This option keeps the memory cache active
 during Tor usage for performance, but blocks disk access for caching.
+</p></li>
+  <li>Block disk and memory cache during Tor</p> 
 
-  <li>Block disk and memory cache during Tor</li>
-
   This setting entirely blocks the cache during Tor, but preserves it for
 Non-Tor usage.
+</p></li>
+  <li>Clear Cookies on Tor Toggle</p> 
 
-  <li>Clear Cookies on Tor Toggle</li>
-
   Fully clears all cookies on Tor toggle.
-  
-  <li>Store Non-Tor cookies in a protected jar</li>
+</p></li>
+  <li>Store Non-Tor cookies in a protected jar</p> 
 
   This option stores your persistent Non-Tor cookies in a special cookie jar
   file, in case you wish to preserve some cookies. Based on code contributed
   by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is
   compatible with third party extensions that you use to manage your Non-Tor
   cookies. Your Tor cookies will be cleared on toggle, of course.
+</p></li>
+  <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</p> 
 
-  <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</li>
-
   This option stores your persistent Tor and Non-Tor cookies 
   separate cookie jar files. Note that it is a bad idea to keep Tor
   cookies around for any length of time, as they can be retrieved by exit
   nodes that inject spoofed forms into plaintext pages you fetch.
+</p></li>
+  <li>Manage My Own Cookies (dangerous)</p> 
 
-  <li>Manage My Own Cookies (dangerous)</li>
-
   This setting allows you to manage your own cookies with an alternate
 extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous,
 since malicious exit nodes can spoof document elements that appear to be from
 sites you have preserved cookies for (and can then do things like fetch your
 entire gmail inbox, even if you were not using gmail or visiting any google
 pages at the time!).
- 
-  <li>Do not write Tor/Non-Tor cookies to disk</li>
+</p></li>
+  <li>Do not write Tor/Non-Tor cookies to disk</p> 
 
   These settings prevent Firefox from writing any cookies to disk during the
   corresponding Tor state. If cookie jars are enabled, those jars will
   exist in memory only, and will be cleared when Firefox exits.
+</p></li>
+  <li>Disable DOM Storage during Tor usage (crucial)</p> 
 
-  <li>Disable DOM Storage during Tor usage (crucial)</li>
-
   Firefox has recently added the ability to store additional state and
   identifiers in persistent tables, called <a
   href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>.
   Obviously this can compromise your anonymity if stored content can be
   fetched across Tor-state.
+</p></li>
+  <li>Clear HTTP auth sessions (recommended)</p> 
 
-  <li>Clear HTTP auth sessions (recommended)</li>
-
   HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. 
+</p></li>
+  <li>Clear cookies on Tor/Non-Tor shutdown</p> 
 
-  <li>Clear cookies on Tor/Non-Tor shutdown</li>
-
   These settings install a shutdown handler to clear cookies on Tor
 and/or Non-Tor browser shutdown. It is independent of your Clear Private Data
 settings, and does in fact clear the corresponding cookie jars.
+</p></li>
+  <li>Prevent session store from saving Tor-loaded tabs (recommended)</p> 
 
-  <li>Prevent session store from saving Tor-loaded tabs (recommended)</li>
-
   This option augments the session store to prevent it from writing out
   Tor-loaded tabs to disk. Unfortunately, this also disables your ability to 
   undo closed tabs. The reason why this setting is recommended is because
   after a session crash, your browser will be in an undefined Tor state, and
   can potentially load a bunch of Tor tabs without Tor. The following option
   is another alternative to protect against this.
+</p></li>
+  <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</p> 
 
-  <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</li>
-
   This setting allows you to choose which Tor state you want the browser to
   start in normally: Tor, Non-Tor, or whatever state the browser shut down in.
+</p></li>
+  <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</p> 
 
-  <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</li>
-
   When Firefox crashes, the Tor state upon restart usually is completely
   random, and depending on your choice for the above option, may load 
   a bunch of tabs in the wrong state. This setting allows you to choose
   which state the crashed session should always be restored in to.
+</p></li>
+  <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</p> 
 
-  <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</li>
-
   These two settings allow you to control what the Firefox Session Store
   writes to disk. Since the session store state is used to automatically
   load websites after a crash or upgrade, it is advisable not to allow
   Tor tabs to be written to disk, or they may get loaded in Non-Tor
   after a crash (or the reverse, depending upon the crash recovery setting, 
   of course).
+</p></li>
+  <li>Set user agent during Tor usage (crucial)</p> 
 
-  <li>Set user agent during Tor usage (crucial)</li>
-
   User agent masking is done with the idea of making all Tor users appear
 uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this
 string and supporting navigator.* properties, and this version will remain the
@@ -230,14 +230,14 @@
 must also allow Hook Dangerous Javascript ensure that the navigator.*
 properties are reset correctly.  The browser does not set some of them via the
 exposed user agent override preferences.
+</p></li>
+  <li>Spoof US English Browser</p> 
 
-  <li>Spoof US English Browser</li>
-
 This option causes Firefox to send http headers as if it were an English
 browser. Useful for internationalized users.
+</p></li>
+  <li>Don't send referrer during Tor Usage</p> 
 
-  <li>Don't send referrer during Tor Usage</li>
-
 This option disables the referrer header, preventing sites from determining
 where you came from to visit them. This can break some sites, however. <a
 href="http://www.digg.com">Digg</a> in particular seemed to be broken by this.
@@ -245,6 +245,7 @@
 eventually. In the meantime, <a
 href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can
 provide this functionality via a default option of <b>Forge</b>.
+</p></li>
 </ul>
 
     </div><!-- #main -->



More information about the tor-commits mailing list