[tor-commits] r26830: {website} get rid of trailing whitespace (website/trunk/docs/en)

Roger Dingledine arma at torproject.org
Sat Jun 14 05:19:39 UTC 2014


Author: arma
Date: 2014-06-14 05:19:39 +0000 (Sat, 14 Jun 2014)
New Revision: 26830

Modified:
   website/trunk/docs/en/faq.wml
Log:
get rid of trailing whitespace


Modified: website/trunk/docs/en/faq.wml
===================================================================
--- website/trunk/docs/en/faq.wml	2014-06-14 05:17:41 UTC (rev 26829)
+++ website/trunk/docs/en/faq.wml	2014-06-14 05:19:39 UTC (rev 26830)
@@ -83,7 +83,7 @@
     </a></li>
     <li><a href="#SophosOnMac">I'm using the Sophos anti-virus
     software on my Mac, and Tor starts but I can't browse anywhere.</a></li>
-    <li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an 
+    <li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an
 error message from the browser: "Cannot load XPCOM".</a></li>
     <li><a href="#TBBOtherExtensions">Can I install other Firefox
     extensions? Which extensions should I avoid using?</a></li>
@@ -173,7 +173,7 @@
     with abuse issues.</a></li>
     <li><a href="#BestOSForRelay">Why doesn't my Windows (or other OS) Tor
     relay run well?</a></li>
-    <li><a href="#PackagedTor">Should I install Tor from my package manager, 
+    <li><a href="#PackagedTor">Should I install Tor from my package manager,
     or build from source?</a></li>
     <li><a href="#WhatIsTheBadExitFlag">What is the BadExit flag?</a></li>
     <li><a href="#IGotTheBadExitFlagWhyDidThatHappen">I got the BadExit flag.
@@ -552,13 +552,13 @@
     Tor software, though. They want to distribute the <a
     href="<page projects/torbrowser>">Tor Browser</a>. This includes <a
     href="https://www.mozilla.org/en-US/firefox/organizations/">Firefox
-    Extended Support Release</a>, and the NoScript and HTTPS-Everywhere 
-    extensions. You will need to follow the license for those programs as 
-    well. Both of those Firefox extensions are distributed under 
+    Extended Support Release</a>, and the NoScript and HTTPS-Everywhere
+    extensions. You will need to follow the license for those programs as
+    well. Both of those Firefox extensions are distributed under
     the <a href="https://www.fsf.org/licensing/licenses/gpl.html">GNU General
-    Public License</a>, while Firefox ESR is released under the Mozilla Public 
-    License. The simplest way to obey their licenses is to include the source 
-    code for these programs everywhere you include the bundles themselves. 
+    Public License</a>, while Firefox ESR is released under the Mozilla Public
+    License. The simplest way to obey their licenses is to include the source
+    code for these programs everywhere you include the bundles themselves.
     </p>
 
     <p>
@@ -870,13 +870,13 @@
 
 
     <a id="Mobile"></a>
-    <h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile 
+    <h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile
     device?</a></h3>
 
     <p>
-    Tor on Android devices is maintained by the <a 
-    href="https://guardianproject.info">Guardian Project</a>. Currently, there 
-    is no supported way of using Tor on iOS; the Guardian Project is 
+    Tor on Android devices is maintained by the <a
+    href="https://guardianproject.info">Guardian Project</a>. Currently, there
+    is no supported way of using Tor on iOS; the Guardian Project is
     working to make this a reality in the future.
     </p>
 
@@ -913,9 +913,9 @@
     those relays, and those connections will fail, leading to complex
     anonymity implications for the clients which we'd like to avoid.
     </p>
- 
+
     <hr>
- 
+
     <a id="IsItWorking"></a>
     <h3><a class="anchor" href="#IsItWorking">How can I tell if Tor is
     working, and that my connections really are anonymized?</a></h3>
@@ -925,9 +925,9 @@
     coming through the Tor network. Try the <a href="https://check.torproject.org">
     Tor Check</a> site and see whether it thinks you are using Tor or not.
     </p>
- 
+
     <hr>
- 
+
     <a id="FTP"></a>
     <h3><a class="anchor" href="#FTP">How do I use my browser for ftp with Tor?
     </a></h3>
@@ -941,7 +941,7 @@
     </p>
 
     <hr>
- 
+
     <a id="NoDataScrubbing"></a>
     <h3><a class="anchor" href="#NoDataScrubbing">Does Tor remove personal
     information from the data my application sends?</a></h3>
@@ -1164,9 +1164,9 @@
 <h3><a class="anchor" href="#Ubuntu">
 I'm using Ubuntu and I can't start Tor Browser.</a></h3>
 <p>
-You'll need to tell Ubuntu that you want the ability to execute shell scripts 
-from the graphical interface. Open "Files" (Unity's explorer), open 
-Preferences-> Behavior Tab -> Set "Run executable text files when they are 
+You'll need to tell Ubuntu that you want the ability to execute shell scripts
+from the graphical interface. Open "Files" (Unity's explorer), open
+Preferences-> Behavior Tab -> Set "Run executable text files when they are
 opened" to "Ask every time", then OK.
 </p>
 <p>You can also start the Tor Browser from the command line by running </p>
@@ -1186,21 +1186,21 @@
 the protections for "Malicious websites" and "Malicious downloads".
 </p>
 <p>
-We encourage affected Sophos users to contact Sophos support about 
+We encourage affected Sophos users to contact Sophos support about
 this issue.
 </p>
 
 <hr>
 
 <a id="XPCOMError"></a>
-<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle 
+<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle
 I get an error message from the browser: "Cannot load XPCOM".</a></h3>
 
 <p>
-This <a 
-href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is 
-specifically caused by the Webroot SecureAnywhere Antivirus software. 
-Consider switching to a different antivirus program. We encourage affected 
+This <a
+href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is
+specifically caused by the Webroot SecureAnywhere Antivirus software.
+Consider switching to a different antivirus program. We encourage affected
 Webroot users to contact Webroot support about this issue.
  </p>
 
@@ -1345,7 +1345,7 @@
 If you really want to see Google in English you can click the link that
 provides that. But we consider this a feature with Tor, not a bug --- the
 Internet is not flat, and it in fact does look different depending on
-where you are. This feature reminds people of this fact. 
+where you are. This feature reminds people of this fact.
 </p>
 <p>
 Note that Google search URLs take name/value pairs as arguments and one
@@ -1461,7 +1461,7 @@
 </p>
 
 <p>
-If you're unable to use the application's native proxy settings, all hope is 
+If you're unable to use the application's native proxy settings, all hope is
 not lost. See <a href="#CantSetProxy">below</a>.
 </p>
 
@@ -1568,12 +1568,12 @@
     <h3><a class="anchor" href="#VerifyDownload">How do I verify the download
     (sha256sums.txt)?</a></h3>
 
-    <p>Instructions are on the <a 
-    href="<page docs/verifying-signatures>#BuildVerification">verifying 
+    <p>Instructions are on the <a
+    href="<page docs/verifying-signatures>#BuildVerification">verifying
     signatures</a> page.</p>
 
     <hr>
-    
+
     <a id="NewIdentityClosingTabs"></a>
     <h3><a class="anchor" href="#NewIdentityClosingTabs">Why does "New
     Identity" close all my open tabs?</a></h3>
@@ -2206,9 +2206,9 @@
     consider <a href="https://www.torproject.org/docs/tor-relay-debian">helping
     out</a>.
     </p>
- 
+
     <hr>
- 
+
     <a id="WhyIsntMyRelayBeingUsedMore"></a>
     <h3><a class="anchor" href="#WhyIsntMyRelayBeingUsedMore">Why isn't my
     relay being used more?</a></h3>
@@ -2227,7 +2227,7 @@
     "https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays/">
     tor-relays list</a>.
     </p>
- 
+
     <hr>
 
     <a id="IDontHaveAStaticIP"></a>
@@ -2268,17 +2268,17 @@
 
     <hr>
 
-    <a id="HighCapacityConnection"></a> 
+    <a id="HighCapacityConnection"></a>
     <h3><a class="anchor" href="#HighCapacityConnection">How can I get Tor to fully
     make use of my high capacity connection?</a></h3>
- 
+
     <p>
     See <a href="http://archives.seul.org/or/relays/Aug-2010/msg00034.html">this
     tor-relays thread</a>.
     </p>
- 
-    <hr> 
- 
+
+    <hr>
+
     <a id="RelayFlexible"></a>
     <h3><a class="anchor" href="#RelayFlexible">How stable does my relay
 need to be?</a></h3>
@@ -2330,7 +2330,7 @@
     </ul>
 
     <hr>
- 
+
     <a id="BandwidthShaping"></a>
     <h3><a class="anchor" href="#BandwidthShaping">What bandwidth shaping
     options are available to Tor relays?</a></h3>
@@ -2599,29 +2599,29 @@
     <hr>
 
     <a id="PackagedTor"></a>
-    <h3><a class="anchor" href="#PackagedTor">Should I install Tor from my 
+    <h3><a class="anchor" href="#PackagedTor">Should I install Tor from my
     package manager, or build from source?</a></h3>
     <p>
-    If you're using Debian or Ubuntu especially, there are a number of benefits 
-    to installing Tor from the <a 
-    href="https://www.torproject.org/docs/debian.html.en">Tor Project's 
-    repository</a>. 
+    If you're using Debian or Ubuntu especially, there are a number of benefits
+    to installing Tor from the <a
+    href="https://www.torproject.org/docs/debian.html.en">Tor Project's
+    repository</a>.
     </p>
     <ul>
       <li>
-      You're ulimit -n gets set to 32768, high enough for Tor to keep open all 
-      the connections it needs. 
+      You're ulimit -n gets set to 32768, high enough for Tor to keep open all
+      the connections it needs.
       </li>
       <li>
-      A user profile is created just for Tor, so Tor doesn't need to run as 
+      A user profile is created just for Tor, so Tor doesn't need to run as
       root.
       </li>
       <li>
       An init script is included so that Tor runs at boot.
       </li>
       <li>
-      Tor runs with --verify-config, so that most problems with your 
-      config file get caught. 
+      Tor runs with --verify-config, so that most problems with your
+      config file get caught.
       </li>
       <li>
       Tor can bind to low level ports, then drop privileges.
@@ -2666,7 +2666,7 @@
     of the Guards: A Framework for Understanding and Improving Entry Guard
     Selection in Tor</a>.
     </p>
- 
+
     <hr>
 
     <a id="TorClientOnADifferentComputerThanMyApplications"></a>
@@ -3257,7 +3257,7 @@
     <a id="AccessHiddenServices"></a>
     <h3><a class="anchor" href="#AccessHiddenServices">How do I access
     hidden services?</a></h3>
- 
+
     <p>
     Tor hidden services are named with a special top-level domain (TLD)
     name in DNS: .onion. Since the .onion TLD is not recognized by the
@@ -3272,7 +3272,7 @@
  Tor directly. You can't try to resolve it to an IP address, since there
  <i>is</i> no corresponding IP address: the server is hidden, after all!
 </p>
- 
+
     <p>
     So, how do you make your application pass the hostname directly to Tor?
     You can't use SOCKS 4, since SOCKS 4 proxies require an IP from the
@@ -3282,7 +3282,7 @@
     SOCKS proxy. SOCKS 4a, however, always accepts a hostname: You'll need
     to use SOCKS 4a.
     </p>
- 
+
     <p>
     Some applications, such as the browsers Mozilla Firefox and Apple's
     Safari, support sending DNS queries to Tor's SOCKS 5 proxy. Most web
@@ -3290,7 +3290,7 @@
     to point your web browser at an HTTP proxy, and tell the HTTP proxy
     to speak to Tor with SOCKS 4a. We recommend Polipo as your HTTP proxy.
     </p>
- 
+
     <p>
     For applications that do not support HTTP proxy, and so cannot use
     Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an
@@ -3299,24 +3299,24 @@
     will allow you to use almost any program with Tor without leaking DNS
     lookups and allow those same programs to access hidden services.
     </p>
- 
+
     <p>
     See also the <a href="#SocksAndDNS">question on DNS</a>.
-    </p> 
- 
+    </p>
+
     <hr>
 
     <a id="ProvideAHiddenService"></a>
     <h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a
     hidden service?</a></h3>
- 
+
     <p>
     See the <a href="<page docs/tor-hidden-service>">
     official hidden service configuration instructions</a>.
     </p>
 
     <hr>
- 
+
     <a id="Development"></a>
     <h2><a class="anchor">Development:</a></h2>
 
@@ -3357,7 +3357,7 @@
     <a id="PrivateTorNetwork"></a>
     <h3><a class="anchor" href="#PrivateTorNetwork">How do I set up my
     own private Tor network?</a></h3>
- 
+
     <p>
     If you want to experiment locally with your own network, or you're
     cut off from the Internet and want to be able to mess with Tor still,
@@ -3436,7 +3436,7 @@
 
     <a id="WhatIsLibevent"></a>
     <h3><a class="anchor" href="#WhatIsLibevent">What is Libevent?</a></h3>
- 
+
     <p>
     When you want to deal with a bunch of net connections at once, you
     have a few options:
@@ -3479,7 +3479,7 @@
     <a id="MyNewFeature"></a>
     <h3><a class="anchor" href="#MyNewFeature">What do I need to do to get
     a new feature into Tor?</a></h3>
- 
+
     <p>
     For a new feature to go into Tor, it needs to be designed (explain what
     you think Tor should do), argued to be secure (explain why it's better
@@ -3502,7 +3502,7 @@
     <a id="WhatProtectionsDoesTorProvide"></a>
     <h3><a class="anchor" href="#WhatProtectionsDoesTorProvide">What
     protections does Tor provide?</a></h3>
- 
+
     <p>
     Internet communication is based on a store-and-forward model that
     can be understood in analogy to postal mail: Data is transmitted in
@@ -3518,7 +3518,7 @@
     server in the Internet that can see any of the packets can profile your
     behaviour.
     </p>
- 
+
     <p>
     The aim of Tor is to improve your privacy by sending your traffic through
     a series of proxies. Your communication is encrypted in multiple layers
@@ -3529,11 +3529,11 @@
     communicating with Tor nodes. Similarly, servers in the Internet just
     see that they are being contacted by Tor nodes.
     </p>
- 
+
     <p>
     Generally speaking, Tor aims to solve three privacy problems:
     </p>
- 
+
     <p>
     First, Tor prevents websites and other services from learning
     your location, which they can use to build databases about your
@@ -3541,13 +3541,13 @@
     give you away by default -- now you can have the ability to choose,
     for each connection, how much information to reveal.
     </p>
- 
+
     <p>
     Second, Tor prevents people watching your traffic locally (such as
     your ISP) from learning what information you're fetching and where
     you're fetching it from. It also stops them from deciding what you're
     allowed to learn and publish -- if you can get to any part of the Tor
-    network, you can reach any site on the Internet.  
+    network, you can reach any site on the Internet.
     </p>
 
     <p>
@@ -3557,26 +3557,26 @@
     provides more security than the old <a href="#Torisdifferent">one hop proxy
     </a> approach.
     </p>
- 
+
     <p>
     Note, however, that there are situations where Tor fails to solve these
     privacy problems entirely: see the entry below on <a
-    href="#AttacksOnOnionRouting">remaining attacks</a>. 
+    href="#AttacksOnOnionRouting">remaining attacks</a>.
     </p>
- 
+
     <hr>
- 
+
     <a id="CanExitNodesEavesdrop"></a>
     <h3><a class="anchor" href="#CanExitNodesEavesdrop">Can exit nodes eavesdrop
     on communications? Isn't that bad?</a></h3>
- 
+
     <p>
     Yes, the guy running the exit node can read the bytes that come in and
     out there. Tor anonymizes the origin of your traffic, and it makes sure
     to encrypt everything inside the Tor network, but it does not magically
     encrypt all traffic throughout the Internet.
     </p>
- 
+
     <p>
     This is why you should always use end-to-end encryption such as SSL for
     sensitive Internet connections. (The corollary to this answer is that if
@@ -3584,7 +3584,7 @@
     *not* using end-to-end encryption at the application layer, then something
     has already gone wrong and you shouldn't be thinking that Tor is the problem.)
     </p>
- 
+
     <p>
     Tor does provide a partial solution in a very specific situation, though.
     When you make a connection to a destination that also runs a Tor relay,
@@ -3602,9 +3602,9 @@
     does the Tor client learn which relays are associated with which
     websites in a decentralized yet non-gamable way?").
     </p>
-         
+
     <hr>
- 
+
     <a id="AmITotallyAnonymous"></a>
     <h3><a class="anchor" href="#AmITotallyAnonymous">So I'm totally anonymous
     if I use Tor?</a></h3>
@@ -3729,7 +3729,7 @@
     </p>
 
     <hr>
- 
+
     <a id="KeyManagement"></a>
     <h3><a class="anchor" href="#KeyManagement">Tell me about all the
 keys Tor uses.</a></h3>
@@ -3995,10 +3995,10 @@
 
     <a id="IsTorLikeAVPN"></a>
     <h3><a class="anchor" href="#IsTorLikeAVPN">Is Tor like a VPN?</a></h3>
- 
+
     <p>
-    <b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b> 
-    If you're looking for a trusted entry into the Tor network, or if you want 
+    <b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b>
+    If you're looking for a trusted entry into the Tor network, or if you want
     to obscure the fact that you're using Tor, <a
     href="https://www.torproject.org/docs/bridges#RunningABridge">setting up
     a private server as a bridge</a> works quite well.
@@ -4044,7 +4044,7 @@
     <a id="Proxychains"></a>
     <h3><a class="anchor" href="#Proxychains">Aren't 10 proxies
     (proxychains) better than Tor with only 3 hops?</a></h3>
- 
+
     <p>
     Proxychains is a program that sends your traffic through a series of
     open web proxies that you supply before sending it on to your final
@@ -4066,10 +4066,10 @@
     engine are compromised machines, misconfigured private proxies
     not intended for public use, or honeypots set up to exploit users.
     </p>
- 
+
     <hr>
- 
 
+
 <a id="AttacksOnOnionRouting"></a>
     <h3><a class="anchor" href="#AttacksOnOnionRouting">What attacks remain
     against onion routing?</a></h3>
@@ -4516,7 +4516,7 @@
     <a id="SendPadding"></a>
     <h3><a class="anchor" href="#SendPadding">You should send padding so it's
     more secure.</a></h3>
- 
+
     <p>
     Like all anonymous communication networks that are fast enough for web
     browsing, Tor is vulnerable to statistical "traffic confirmation"
@@ -4525,7 +4525,7 @@
     nice if we could use cover traffic to confuse this attack. But there
     are three problems here:
     </p>
- 
+
     <ul>
     <li>
     Cover traffic is really expensive. And *every* user needs to be doing
@@ -4548,26 +4548,26 @@
     patterns later in the path.
     </li>
     </ul>
- 
+
     <p>
     In short, for a system like Tor that aims to be fast, we don't see any
     use for padding, and it would definitely be a serious usability problem.
     We hope that one day somebody will prove us wrong, but we are not
     optimistic.
     </p>
- 
+
     <hr>
 
     <a id="Steganography"></a>
     <h3><a class="anchor" href="#Steganography">You should use steganography to hide Tor
     traffic.</a></h3>
- 
+
     <p>
     Many people suggest that we should use steganography to make it hard
     to notice Tor connections on the Internet. There are a few problems
     with this idea though:
     </p>
- 
+
     <p>
     First, in the current network topology, the Tor relays list <a
     href="#HideExits">is public</a> and can be accessed by attackers.
@@ -4575,7 +4575,7 @@
     always just notice <b>any connection</b> to or from a Tor relay's
     IP address.
     </p>
- 
+
     <hr>
 
     <a id="Abuse"></a>



More information about the tor-commits mailing list