[or-cvs] r19526: {website} fix spelling, links, etc on torbutton faq changes (website/trunk/torbutton/en)

arma at seul.org arma at seul.org
Sat May 16 21:47:16 UTC 2009


Author: arma
Date: 2009-05-16 17:47:15 -0400 (Sat, 16 May 2009)
New Revision: 19526

Modified:
   website/trunk/torbutton/en/faq.wml
Log:
fix spelling, links, etc on torbutton faq changes


Modified: website/trunk/torbutton/en/faq.wml
===================================================================
--- website/trunk/torbutton/en/faq.wml	2009-05-16 10:17:55 UTC (rev 19525)
+++ website/trunk/torbutton/en/faq.wml	2009-05-16 21:47:15 UTC (rev 19526)
@@ -75,7 +75,7 @@
 IP address</a>, and <a
 href="http://epic.org/privacy/cookies/flash.html">storing their own
 cookies</a>. It is possible to use a LiveCD or VMWare-based solution such as
-<a href="https://www.torproject.org/torvm/">TorVM</a> or
+<a href="<page torvm/index>">Tor VM</a> or
 <a href="http://anonymityanywhere.com/incognito/">Incognito</a> that creates a
 secure, transparent proxy to protect you from proxy bypass, however issues
 with local IP address discovery and Flash cookies potentially remain.
@@ -87,14 +87,14 @@
 local censors noticing you visit them, you can enable plugins by going into
 the Torbutton Preferences-&gt;Security Settings-&gt;Dynamic Content tab and
 unchecking "Disable plugins during Tor usage" box. If you do do this without
-TorVM, Incognitio or appropriate firewall rules, we strongly suggest you at
+Tor VM, Incognito or appropriate firewall rules, we strongly suggest you at
 least use <a
 href="https://addons.mozilla.org/en-US/firefox/addon/433">FlashBlock</a> or <a
 href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> along
 with <a href="https://addons.mozilla.org/en-US/firefox/addon/6623">Better
 Privacy</a> to block unwanted plugins and their cookies. Neither of these are
 foolproof protection against proxy bypass and
-<a href="http://decloak.net">unmasking</a>, but you will at least be better off.
+<a href="http://decloak.net/">unmasking</a>, but you will at least be better off.
 
 </p>
 
@@ -111,9 +111,9 @@
 <b>Simply do not use Tor</b> and you will have the same (and in some cases,
 better) security.  For more information on the types of attacks you are exposed
 to with a "homegrown" solution, please see <a
-href="https://www.torproject.org/torbutton/design/#adversary">The Torbutton
+href="design/index.html#adversary">The Torbutton
 Adversary Model</a>, in particular the <a
-href="https://www.torproject.org/torbutton/design/#attacks">Adversary
+href="design/index.html#attacks">Adversary
 Capabilities - Attacks</a> subsection. If there are any specific Torbutton
 behaviors that you do not like, please file a bug on <a
 href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5">the
@@ -181,7 +181,7 @@
 
 <ol>
  <li>StumbleUpon, et al
-	<p>
+ <p>
  These extensions will send all sorts of information about the websites you
  visit to the stumbleupon servers, and correlate this information with a
  unique identifier. This is obviously terrible for your anonymity.
@@ -225,7 +225,7 @@
 referrer spoofing option.</p></li>
 
  <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a>
-	<p>
+<p>
 If you use Tor excessively, and rarely disable it, you probably want to
 install this extension to minimize the ability of sites to store long term
 identifiers in your cache. This extension applies same origin policy to the
@@ -280,8 +280,9 @@
 <a href="http://fscked.org/category/tags/insecurecookies">insecure
  cookies</a>.<br>
 
- It can be difficult to configure such that the majority sites will work
- properly though. In particular, you want to make sure you do not remove the Javascript whitelist for
+ It can be difficult to configure such that the most sites will work
+ properly though. In particular, you want to make sure you do not remove
+ the Javascript whitelist for
  addons.mozilla.org, as extensions are downloaded via http and verified by
  javascript from the https page.
 
@@ -306,7 +307,7 @@
 
 <p>
 There are a few known security issues with Torbutton (all of which are due to
-<a href="https://www.torproject.org/torbutton/design/#FirefoxBugs">unfixed
+<a href="design/index.html#FirefoxBugs">unfixed
 Firefox security bugs</a>). The most important for anonymity is that it is
 possible to unmask the javascript hooks that wrap the Date object to conceal
 your timezone in Firefox 2, and the timezone masking code does not work at all



More information about the tor-commits mailing list