[tor-commits] r25272: {website} Clean up some more of the warning text and try to make it ac (website/trunk/download/en)

Mike Perry mikeperry-svn at fscked.org
Sun Dec 25 01:10:12 UTC 2011


Author: mikeperry
Date: 2011-12-25 01:10:12 +0000 (Sun, 25 Dec 2011)
New Revision: 25272

Modified:
   website/trunk/download/en/download-easy.wml
   website/trunk/download/en/download.wml
Log:
Clean up some more of the warning text and try to make it
accessible to average humans.



Modified: website/trunk/download/en/download-easy.wml
===================================================================
--- website/trunk/download/en/download-easy.wml	2011-12-24 23:04:19 UTC (rev 25271)
+++ website/trunk/download/en/download-easy.wml	2011-12-25 01:10:12 UTC (rev 25272)
@@ -153,13 +153,14 @@
 
 <p>
 
-Tor only protects Internet applications that are configured to send their
-traffic through Tor — it doesn't magically anonymize all of your traffic
-just because you install it. We strongly recommend you use the <a href="<page
-projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect
-your privacy and anonymity on the web as long as you're browsing with Tor
+Tor does not protect all of your computer's Internet traffic when you
+run it. Tor only protects your applications that are properly configured to
+send their Internet traffic through Tor. To avoid problems with Tor
+configuration, we strongly recommend you use the
+<a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect
+your privacy and anonymity on the web as long as you're browsing with the Tor
 Browser itself. Almost any other web browser configuration is likely to be
-unsafe.
+unsafe to use with Tor.
 
 </p>
 
@@ -169,17 +170,14 @@
 
 <p>
 
-The Tor Browser will block browser plugins such as Java, Flash, ActiveX,
-RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated
-into revealing your IP address. Similarly, we do not recommend installing
-additional addons or plugins into the Tor Browser, as these may bypass Tor or
-otherwise impede your anonymity. This means Youtube is disabled by default.
-Youtube provides an experimental
-<a href="https://www.youtube.com/html5">non-Flash HTML5 mode</a> that works for
-many videos, but you must visit that link to opt-in manually. Youtube's
-support for the HTML5 feature is buggy and incomplete, so we are also working
-to provide a safe way to temporarily enable Flash in future Tor Browser
-versions.
+The Tor Browser will block browser plugins such as Flash, RealPlayer,
+Quicktime, and others: they can be manipulated into revealing your IP address.
+Similarly, we do not recommend installing additional addons or plugins into
+the Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
+privacy. The lack of plugins means that Youtube videos are blocked by default,
+but Youtube does provide an experimental opt-in feature
+<a href="https://www.youtube.com/html5">(enable it here)</a> that works for some
+videos.
 
 </p>
 
@@ -188,18 +186,20 @@
 <li><b>Use HTTPS versions of websites</b>
 
 <p>
-Tor anonymizes the origin of your traffic, and it encrypts everything between
-you and the Tor network and everything inside the Tor network, but 
-<a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it can't encrypt your traffic
-between the Tor network and its final destination.</a> To help ensure
-privacy for the last leg, the Tor Browser Bundle includes 
-<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force
-the use of HTTPS with a number of major websites, but you should still
-watch the browser URL bar to ensure that websites you provide sensitive information
-to display a 
+
+Tor will encrypt your traffic
+<a href="https://www.torproject.org/about/overview.html.en#thesolution">to and
+within the Tor network</a>, but the encryption of your traffic to the final
+destination website depends upon on that website. To help ensure private
+encryption to websites, the Tor Browser Bundle includes <a
+href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
+use of HTTPS encryption with major websites that support it. However, you
+should still watch the browser URL bar to ensure that websites you provide
+sensitive information to display a
 <a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or
-green validation</a>, include <b>https://</b> in the URL bar, 
-and display the proper name for the current website.
+green URL bar button</a>, include <b>https://</b> in the URL, and display the
+proper expected name for the website.
+
 </p>
 
 </li>
@@ -208,20 +208,19 @@
 
 <p>
 
-The Tor Browser will warn you before automatically opening documents
-that are handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.
-You should be very careful when downloading documents via Tor (especially DOC
-and PDF files) as these documents can contain Internet resources that will be
-downloaded outside of Tor by the application that opens them. These documents
-can be modified by malicious exit nodes, or by a website that is trying to trick
-you into revealing your non-Tor IP address. If you must work with DOC and/or
-PDF files, we strongly recommend using a disconnected computer, a 
-<a href="https://www.virtualbox.org/">VirtualBox</a> free 
-<a href="http://virtualboxes.org/">image</a> with networking disabled, or 
-<a href="http://tails.boum.org/">Tails</a>. Under no circumstances is it safe to
-use <a
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
-and Tor</a> together.
+The Tor Browser will warn you before automatically opening documents that are
+handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
+should be very careful when downloading documents via Tor (especially DOC and
+PDF files) as these documents can contain Internet resources that will be
+downloaded outside of Tor by the application that opens them. This will reveal
+your non-Tor IP address. If you must work with DOC and/or PDF files, we
+strongly recommend either using a disconnected computer,
+downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
+using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
+with networking disabled, or using <a href="http://tails.boum.org/">Tails</a>.
+Under no circumstances is it safe to use
+<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
+and Tor</a> together, however.
 
 </p>
 
@@ -230,17 +229,22 @@
 <li><b>Use bridges and/or find company</b>
 
 <p>
-Tor tries to prevent attackers from learning what destinations you connect
-to. It doesn't prevent somebody watching your traffic from learning that
-you're using Tor. You can mitigate (but not fully resolve) the risk
-by using a <a href="<page docs/bridges>">Tor bridge relay</a> rather than
-connecting directly to the public Tor network, but ultimately the best
-protection here is a social approach: the more Tor users there are near
-you and the more <a href="<page about/torusers>">diverse</a> their interests,
-the less dangerous it will be that you are one of them.
+
+Tor tries to prevent attackers from learning what destination websites you
+connect to. However, by default, it does not prevent somebody watching your Internet
+traffic from learning that you're using Tor. If this matters to you, you can
+reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor
+bridge relay</a> rather than connecting directly to the public Tor network.
+Ultimately the best protection is a social approach: the more Tor
+users there are near you and the more 
+<a href="<page about/torusers>">diverse</a> their interests, the less 
+dangerous it will be that you are one of them. Convince other people to use
+Tor, too!
+
 </p>
 
 </li>
+
 </ol>
 <br>
 <p>

Modified: website/trunk/download/en/download.wml
===================================================================
--- website/trunk/download/en/download.wml	2011-12-24 23:04:19 UTC (rev 25271)
+++ website/trunk/download/en/download.wml	2011-12-25 01:10:12 UTC (rev 25272)
@@ -290,13 +290,14 @@
 
 <p>
 
-Tor only protects Internet applications that are configured to send their
-traffic through Tor — it doesn't magically anonymize all of your traffic
-just because you install it. We strongly recommend you use the <a href="<page
-projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect
-your privacy and anonymity on the web as long as you're browsing with Tor
+Tor does not protect all of your computer's Internet traffic when you
+run it. Tor only protects your applications that are properly configured to
+send their Internet traffic through Tor. To avoid problems with Tor
+configuration, we strongly recommend you use the
+<a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It is pre-configured to protect
+your privacy and anonymity on the web as long as you're browsing with the Tor
 Browser itself. Almost any other web browser configuration is likely to be
-unsafe.
+unsafe to use with Tor.
 
 </p>
 
@@ -306,17 +307,14 @@
 
 <p>
 
-The Tor Browser will block browser plugins such as Java, Flash, ActiveX,
-RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated
-into revealing your IP address. Similarly, we do not recommend installing
-additional addons or plugins into the Tor Browser, as these may bypass Tor or
-otherwise impede your anonymity. This means Youtube is disabled by default.
-Youtube provides an experimental
-<a href="https://www.youtube.com/html5">non-Flash HTML5 mode</a> that works for
-many videos, but you you must visit that link opt-in manually. Youtube's
-support for the HTML5 feature is buggy and incomplete, so we are also working
-to provide a safe way to temporarily enable Flash in future Tor Browser
-versions.
+The Tor Browser will block browser plugins such as Flash, RealPlayer,
+Quicktime, and others: they can be manipulated into revealing your IP address.
+Similarly, we do not recommend installing additional addons or plugins into
+the Tor Browser, as these may bypass Tor or otherwise harm your anonymity and
+privacy. The lack of plugins means that Youtube videos are blocked by default,
+but Youtube does provide an experimental opt-in feature
+<a href="https://www.youtube.com/html5">(enable it here)</a> that works for some
+videos.
 
 </p>
 
@@ -325,18 +323,20 @@
 <li><b>Use HTTPS versions of websites</b>
 
 <p>
-Tor anonymizes the origin of your traffic, and it encrypts everything between
-you and the Tor network and everything inside the Tor network, but 
-<a href="<wikifaq>#SoImtotallyanonymousifIuseTor">it can't encrypt your traffic
-between the Tor network and its final destination.</a> To help ensure
-privacy for the last leg, the Tor Browser Bundle includes 
-<a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force
-the use of HTTPS with a number of major websites, but you should still
-watch the browser URL bar to ensure that websites you provide sensitive information
-to display a 
+
+Tor will encrypt your traffic
+<a href="https://www.torproject.org/about/overview.html.en#thesolution">to and
+within the Tor network</a>, but the encryption of your traffic to the final
+destination website depends upon on that website. To help ensure private
+encryption to websites, the Tor Browser Bundle includes <a
+href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> to force the
+use of HTTPS encryption with major websites that support it. However, you
+should still watch the browser URL bar to ensure that websites you provide
+sensitive information to display a
 <a href="https://support.mozilla.com/en-US/kb/Site%20Identity%20Button">blue or
-green validation</a>, include <b>https://</b> in the URL bar, 
-and display the proper name for the current website.
+green URL bar button</a>, include <b>https://</b> in the URL, and display the
+proper expected name for the website.
+
 </p>
 
 </li>
@@ -345,20 +345,19 @@
 
 <p>
 
-The Tor Browser will warn you before automatically opening documents
-that are handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.
-You should be very careful when downloading documents via Tor (especially DOC
-and PDF files) as these documents can contain Internet resources that will be
-downloaded outside of Tor by the application that opens them. These documents
-can be modified by malicious exit nodes, or by a website who is trying to trick
-you into revealing your non-Tor IP address. If you must work with DOC and/or
-PDF files, we strongly recommend using a disconnected computer, a 
-<a href="https://www.virtualbox.org/">VirtualBox</a> free 
-<a href="http://virtualboxes.org/">image</a> with networking disabled, or 
-<a href="http://tails.boum.org/">Tails</a>. Under no circumstances is it safe to
-use <a
-href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
-and Tor</a> together.
+The Tor Browser will warn you before automatically opening documents that are
+handled by external applications. <b>DO NOT IGNORE THIS WARNING</b>.  You
+should be very careful when downloading documents via Tor (especially DOC and
+PDF files) as these documents can contain Internet resources that will be
+downloaded outside of Tor by the application that opens them. This will reveal
+your non-Tor IP address. If you must work with DOC and/or PDF files, we
+strongly recommend either using a disconnected computer,
+downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
+using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
+with networking disabled, or using <a href="http://tails.boum.org/">Tails</a>.
+Under no circumstances is it safe to use
+<a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
+and Tor</a> together, however.
 
 </p>
 
@@ -367,14 +366,18 @@
 <li><b>Use bridges and/or find company</b>
 
 <p>
-Tor tries to prevent attackers from learning what destinations you connect
-to. It doesn't prevent somebody watching your traffic from learning that
-you're using Tor. You can mitigate (but not fully resolve) the risk
-by using a <a href="<page docs/bridges>">Tor bridge relay</a> rather than
-connecting directly to the public Tor network, but ultimately the best
-protection here is a social approach: the more Tor users there are near
-you and the more <a href="<page about/torusers>">diverse</a> their interests,
-the less dangerous it will be that you are one of them.
+
+Tor tries to prevent attackers from learning what destination websites you
+connect to. However, by default, it does not prevent somebody watching your Internet
+traffic from learning that you're using Tor. If this matters to you, you can
+reduce this risk by configuring Tor to use a <a href="<page docs/bridges>">Tor
+bridge relay</a> rather than connecting directly to the public Tor network.
+Ultimately the best protection is a social approach: the more Tor
+users there are near you and the more 
+<a href="<page about/torusers>">diverse</a> their interests, the less 
+dangerous it will be that you are one of them. Convince other people to use
+Tor, too!
+
 </p>
 
 </li>



More information about the tor-commits mailing list