[tor-commits] [community/translations] better internal links

emmapeel at torproject.org emmapeel at torproject.org
Sat Oct 9 16:54:05 UTC 2021


commit d2395c15bced91ecea0bd64875273f2ed9248bd9
Author: emma peel <emma.peel at riseup.net>
Date:   Sat Oct 9 18:38:40 2021 +0200

    better internal links
---
 content/onion-services/advanced/client-auth/contents.lr      |  2 +-
 content/onion-services/advanced/dos/contents.lr              |  2 +-
 content/onion-services/advanced/https/contents.lr            |  2 +-
 content/onion-services/advanced/opsec/contents.lr            |  2 +-
 content/onion-services/setup/contents.lr                     |  8 ++++----
 content/onion-services/talk/contents.lr                      | 10 +++++-----
 content/outreach/meetup/contents.lr                          | 10 +++++-----
 .../community-resources/tor-exit-guidelines/contents.lr      |  2 +-
 .../community-resources/tor-relay-universities/contents.lr   |  4 +++-
 content/relay/setup/bridge/centos-rhel-opensuse/contents.lr  |  4 ++--
 content/relay/setup/bridge/debian-ubuntu/contents.lr         |  4 ++--
 content/relay/setup/bridge/docker/contents.lr                |  4 ++--
 content/relay/setup/bridge/dragonflybsd/contents.lr          |  4 ++--
 content/relay/setup/bridge/fedora/contents.lr                |  4 ++--
 content/relay/setup/bridge/freebsd/contents.lr               |  4 ++--
 content/relay/setup/bridge/netbsd/contents.lr                |  2 +-
 content/relay/setup/bridge/openbsd/contents.lr               |  4 ++--
 content/relay/setup/bridge/windows/contents.lr               |  2 +-
 content/training/checklist/contents.lr                       |  6 +++---
 content/training/risks/contents.lr                           |  2 +-
 content/user-research/how-to-volunteer/contents.lr           | 12 ++++++------
 content/user-research/open/contents.lr                       |  2 +-
 22 files changed, 49 insertions(+), 47 deletions(-)

diff --git a/content/onion-services/advanced/client-auth/contents.lr b/content/onion-services/advanced/client-auth/contents.lr
index 24cb573..14f80c9 100644
--- a/content/onion-services/advanced/client-auth/contents.lr
+++ b/content/onion-services/advanced/client-auth/contents.lr
@@ -28,7 +28,7 @@ If no authorization is configured, the service will be accessible to anyone with
 
 ### Service side
 
-To configure client authorization on the service side, the `<HiddenServiceDir>/authorized_clients/` directory needs to exist. Following the instructions described in the section [Setup](https://community.torproject.org/onion-services/setup/) will automatically create this directory.
+To configure client authorization on the service side, the `<HiddenServiceDir>/authorized_clients/` directory needs to exist. Following the instructions described in the section [Setup](../../setup/) will automatically create this directory.
 Client authorization will only be enabled for the service if tor successfully loads at least one authorization file.
 
 For now, you need to create the keys yourself with a script (like these written in [Bash](https://gist.github.com/mtigas/9c2386adf65345be34045dace134140b), [Rust](https://github.com/haxxpop/torkeygen) or [Python](https://github.com/pastly/python-snippits/blob/master/src/tor/x25519-gen.py)) or manually.
diff --git a/content/onion-services/advanced/dos/contents.lr b/content/onion-services/advanced/dos/contents.lr
index 297e88b..80b6ecb 100644
--- a/content/onion-services/advanced/dos/contents.lr
+++ b/content/onion-services/advanced/dos/contents.lr
@@ -32,7 +32,7 @@ Onionbalance is available for [v3 onion services](https://blog.torproject.org/co
 
 If you have users you trust, give them dedicated onion service and client authorization credentials so that it can always be available.
 For users you don't trust, split them into multiple addresses.
-That said, having too many onion addresses is actually bad for your security (because of the use of many guard nodes), so try to use [client authorization](https://community.torproject.org/onion-services/advanced/client-auth) when possible.
+That said, having too many onion addresses is actually bad for your security (because of the use of many guard nodes), so try to use [client authorization](../client-auth/) when possible.
 
 ### Captchas and cookies
 
diff --git a/content/onion-services/advanced/https/contents.lr b/content/onion-services/advanced/https/contents.lr
index 9122a0e..dda57df 100644
--- a/content/onion-services/advanced/https/contents.lr
+++ b/content/onion-services/advanced/https/contents.lr
@@ -34,7 +34,7 @@ We compiled some topics and arguments, so you can analyze what's the best for yo
 
 1. As anyone can generate an onion address and its 56 random alphanumeric characters, some enterprise onions believe that associating their onion site to an HTTPS certificate might be a solution to announce their service to users.
 Users would need to click and do a manual verification, and that would show that they're visiting the onion site that they're expecting.
-Alternatively, websites can provide other ways to verify their onion address using HTTPS, for example, linking their onion site address from an HTTPS-authenticated page, or using [Onion-Location](https://community.torproject.org/onion-services/advanced/onion-location/).
+Alternatively, websites can provide other ways to verify their onion address using HTTPS, for example, linking their onion site address from an HTTPS-authenticated page, or using [Onion-Location](../onion-location/).
 
 2. Another topic of this discussion is user expectations and modern browsers.
 While there is extensive criticism regarding HTTPS and the CA trust model, the information security community has taught users to look for HTTPS when visiting a website as a synonym of secure connection, and to avoid HTTP connections.
diff --git a/content/onion-services/advanced/opsec/contents.lr b/content/onion-services/advanced/opsec/contents.lr
index 6debce0..5120d12 100644
--- a/content/onion-services/advanced/opsec/contents.lr
+++ b/content/onion-services/advanced/opsec/contents.lr
@@ -20,7 +20,7 @@ Onion services operators need to practice proper [operational security](https://
 For some security suggestions please make sure you read over Riseup's ["Tor Hidden (Onion) Services Best Practices" document](https://riseup.net/en/security/network-security/tor/onionservices-best-practices).
 Also, here are some more anonymity issues you should keep in mind:
 
- - As mentioned [here](https://community.torproject.org/onion-services/setup/), be careful of letting your web server reveal identifying information about you, your computer, or your location.
+ - As mentioned [here](../../setup/), be careful of letting your web server reveal identifying information about you, your computer, or your location.
 For example, readers can probably determine whether it's thttpd or Apache, and learn something about your operating system.
  - If your computer isn't online all the time, your onion service won't be either.
 This leaks information to an observant adversary.
diff --git a/content/onion-services/setup/contents.lr b/content/onion-services/setup/contents.lr
index 807ed06..f9f40c4 100644
--- a/content/onion-services/setup/contents.lr
+++ b/content/onion-services/setup/contents.lr
@@ -25,7 +25,7 @@ For the technical details of how the onion service protocol works, see our onion
 ## Step 0: Get a working Tor
 
 As part of this guide, we will assume you have a functional Tor in your machine.
-To set up Tor, please follow the [Tor installation guide](https://community.torproject.org/onion-services/setup/install/).
+To set up Tor, please follow the [Tor installation guide](./install/).
 Tor should be up and running correctly for this guide to work.
 You should also know where Tor's configuration files are.
 
@@ -109,7 +109,7 @@ If it doesn't work, look in your logs for some hints, and keep playing with it u
 
 It is important to note that an onion service configured like this will be readable by anybody who knows or discovers the address.
 You can make onion services require authentication, and only users with a private key will access the service.
-Read more about [Client authorization](https://community.torproject.org/onion-services/advanced/client-auth/) documentation.
+Read more about [Client authorization](../advanced/client-auth/) documentation.
 
 ## (Optional) Step 5: Running multiple onion services
 
@@ -157,11 +157,11 @@ Some onion site operators may not want to disclose their onion service location.
 Therefore, you need to configure your web server so it doesn't give away any information about you, your computer, or your location.
 That is not an easy task, and these resources will help on how to make this possible:
 
- * [Operational Security](https://community.torproject.org/onion-services/advanced/opsec/).
+ * [Operational Security](../advanced/opsec/).
  * [Onion services best practices](https://riseup.net/en/security/network-security/tor/onionservices-best-practices) by Riseup Collective.
  * [OnionScan](https://onionscan.org/) is a tool to check if your onion site is leaking information that could compromise your anonymity like your server IP address.
 
 Finally, if you plan to keep your service available for a long time, you might want to make a backup copy of the `private_key` file somewhere.
 
-Now that you have an onion site working, you may want to deploy [Onion-Location](https://community.torproject.org/onion-services/advanced/onion-location/), or use tools like Docker, [Heroku](https://gitlab.torproject.org/hiro/onions-on-heroku), [Terraform](https://gitlab.torproject.org/hiro/terraform-onions), [Ansible](https://galaxy.ansible.com/systemli/onion) or [stem](https://stem.torproject.org/tutorials/over_the_river.html) to automate the management of your onion services.
+Now that you have an onion site working, you may want to deploy [Onion-Location](../advanced/onion-location/), or use tools like Docker, [Heroku](https://gitlab.torproject.org/hiro/onions-on-heroku), [Terraform](https://gitlab.torproject.org/hiro/terraform-onions), [Ansible](https://galaxy.ansible.com/systemli/onion) or [stem](https://stem.torproject.org/tutorials/over_the_river.html) to automate the management of your onion services.
 If you have a static website, but never installed Nginx or Apache, another project to try is [OnionShare](https://onionshare.org), where running an onion site will be easier: guided with a graphic interface and with minimal configuration.
diff --git a/content/onion-services/talk/contents.lr b/content/onion-services/talk/contents.lr
index 6196620..07be9be 100644
--- a/content/onion-services/talk/contents.lr
+++ b/content/onion-services/talk/contents.lr
@@ -33,17 +33,17 @@ These talking points will help to explain how onion services offer multiple priv
 ### How Onion Services Work
 
 A potential adopter has probably already heard about the Tor Project, the network and even Tor relays, and that's great!
-[Tor relays](https://community.torproject.org/relay/types-of-relays/) are part of a [public infrastructure](https://metrics.torproject.org/rs.html#toprelays), where Tor users encrypted traffic is routed around to reach out the open internet.
+[Tor relays](../../relay/types-of-relays/) are part of a [public infrastructure](https://metrics.torproject.org/rs.html#toprelays), where Tor users encrypted traffic is routed around to reach out the open internet.
 Onion services aren't like a Tor relay in the network.
 
 An onion service on the Tor network behaves like any other Tor clients.
 The Onion Service to become available on the network connects to rendezvous nodes.
-A client that wants to access the onion service does the same. 
+A client that wants to access the onion service does the same.
 
 This means that connections from the client to the server never leave the Tor network.
-In contrast to running a [Tor relay](https://community.torproject.org/relay), running a Tor Onion Service does not result in your IP address being publicly listed anywhere, nor does your service relay other Tor traffic.
+In contrast to running a [Tor relay](../../relay), running a Tor Onion Service does not result in your IP address being publicly listed anywhere, nor does your service relay other Tor traffic.
 
-For a broader understanding, read [Onion Services overview](https://community.torproject.org/onion-services/overview/) and watch this talk: [DEF CON 25 - Next Generation Tor Onion Services](https://www.youtube.com/watch?v=Di7qAVidy1Y).
+For a broader understanding, read [Onion Services overview](../overview/) and watch this talk: [DEF CON 25 - Next Generation Tor Onion Services](https://www.youtube.com/watch?v=Di7qAVidy1Y).
 
 ### Freedom of Press and Censorship Circumvention
 
@@ -139,4 +139,4 @@ Using them eliminates all metadata that may be associated with the service other
 
 ### One onion a day keeps the surveillance away
 
-Now that you know all the benefits of onion services, you may want to set up an [onion site](https://community.torproject.org/onion-services/setup/) and read about the [protocol overview](https://community.torproject.org/onion-services/overview/).
+Now that you know all the benefits of onion services, you may want to set up an [onion site](../setup/) and read about the [protocol overview](../overview/).
diff --git a/content/outreach/meetup/contents.lr b/content/outreach/meetup/contents.lr
index ce4cfca..d01e340 100644
--- a/content/outreach/meetup/contents.lr
+++ b/content/outreach/meetup/contents.lr
@@ -31,19 +31,19 @@ After confirming a local and date, create a poster and an online invitation to s
 
 ### Step 3
 
-Find a meetup facilitator and draft an agenda, for example, question & answer about Tor, how to setup relays. 
-Read and follow our [best practices](https://community.torproject.org/training/best-practices/).
+Find a meetup facilitator and draft an agenda, for example, question & answer about Tor, how to setup relays.
+Read and follow our [best practices](../../training/best-practices/).
 
 ### Step 4
 
-Before the meetup, organize the space. Buy some chips and snacks, hang some [posters](https://community.torproject.org/outreach/kit/) nearby the local, so people can find easily.
+Before the meetup, organize the space. Buy some chips and snacks, hang some [posters](../kit/) nearby the local, so people can find easily.
 If you have some printed materials and/or Tor swag, put it on a table.
 
 ### Step 5
 
-Load your presentation and wait a few minutes to people arrive. 
+Load your presentation and wait a few minutes to people arrive.
 During the activity take notes about questions, how many knew about Tor before, how many are relay operators, etc
 
 ### Step 6
 
-After the meetup, clean up the space, remove the posters and upload your notes to [Tor Community Team](https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-community-team) mailing list.
+After the meetup, clean up the space, remove the posters and send your notes to the [Tor Community Team](https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-community-team) mailing list.
diff --git a/content/relay/community-resources/tor-exit-guidelines/contents.lr b/content/relay/community-resources/tor-exit-guidelines/contents.lr
index 2f56184..b5308fc 100644
--- a/content/relay/community-resources/tor-exit-guidelines/contents.lr
+++ b/content/relay/community-resources/tor-exit-guidelines/contents.lr
@@ -123,7 +123,7 @@ If you have your own experience of abuse handling, just share it on our public m
 
 Please read all the technical details before getting started. If you have any questions or need help, please contact us at [tor-relays](https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays).
 
-* [Tor Relay Guide](/relay)
+* [Tor Relay Guide](../../)
 
 * Set up an informative website on the exit IP(s) on port 80.
 
diff --git a/content/relay/community-resources/tor-relay-universities/contents.lr b/content/relay/community-resources/tor-relay-universities/contents.lr
index 95a4b52..fc4f369 100644
--- a/content/relay/community-resources/tor-relay-universities/contents.lr
+++ b/content/relay/community-resources/tor-relay-universities/contents.lr
@@ -72,7 +72,9 @@ If the authorities contact your university for logs, be pleasant and helpful.
 Tor's default log level doesn't provide much that's useful, so if they want copies of your logs, that's fine.
 Be helpful and take the opportunity to explain to them about Tor and why it's useful to the world. (If they contact you directly for logs, you should send them to your university's lawyers -- acting on it yourself is [almost always a poor idea](/relay/community-resources/eff-tor-legal-faq/)).
 
-If there are too many complaints coming in, there are several approaches you can take to reduce them. First, you should follow the tips in the [Tor relay documentation](https://community.torproject.org/relay), such as picking a descriptive hostname or getting your own IP address. If that doesn't work, you can scale back the advertised speed of your relay, by using the `MaxAdvertisedBandwidth` to attract less traffic from the Tor network. Lastly, you can scale back your exit policy.
+If there are too many complaints coming in, there are several approaches you can take to reduce them.
+First, you should follow the tips in the [Tor relay documentation](../../), such as picking a descriptive hostname or getting your own IP address.
+If that doesn't work, you can scale back the advertised speed of your relay, by using the `MaxAdvertisedBandwidth` to attract less traffic from the Tor network. Lastly, you can scale back your exit policy.
 
 Some people have found that their university only tolerates their Tor relay if they're involved in a research project around anonymity.
 So if you're interested, you might want to get that started early in the process -- see our [Research Portal](https://research.torproject.org/).
diff --git a/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr b/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr
index 8a75476..6d222fd 100644
--- a/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr
+++ b/content/relay/setup/bridge/centos-rhel-opensuse/contents.lr
@@ -119,8 +119,8 @@ To confirm your bridge is running with no issues, you should see something like
 
 ### 6. Final notes
 
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 html: two-columns-page.html
diff --git a/content/relay/setup/bridge/debian-ubuntu/contents.lr b/content/relay/setup/bridge/debian-ubuntu/contents.lr
index 9a8aff8..200332b 100644
--- a/content/relay/setup/bridge/debian-ubuntu/contents.lr
+++ b/content/relay/setup/bridge/debian-ubuntu/contents.lr
@@ -82,8 +82,8 @@ To confirm your bridge is running with no issues, you should see something like
 
 ### 6. Final notes
 
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 key: 2
diff --git a/content/relay/setup/bridge/docker/contents.lr b/content/relay/setup/bridge/docker/contents.lr
index 5cf2eb1..a3d1e0a 100644
--- a/content/relay/setup/bridge/docker/contents.lr
+++ b/content/relay/setup/bridge/docker/contents.lr
@@ -62,8 +62,8 @@ This will return a string similar to the following:
 obfs4 1.2.3.4:1234 B0E566C9031657EA7ED3FC9D248E8AC4F37635A4 cert=OYWq67L7MDApdJCctUAF7rX8LHvMxvIBPHOoAp0+YXzlQdsxhw6EapaMNwbbGICkpY8CPQ iat-mode=0
 ```
 
-Make sure to check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ### 4. Advanced usage
 
diff --git a/content/relay/setup/bridge/dragonflybsd/contents.lr b/content/relay/setup/bridge/dragonflybsd/contents.lr
index 0d449f8..a30f67f 100644
--- a/content/relay/setup/bridge/dragonflybsd/contents.lr
+++ b/content/relay/setup/bridge/dragonflybsd/contents.lr
@@ -128,8 +128,8 @@ To confirm your bridge is running with no issues, you should see something like
 
 ### 6. Final Notes
 
-If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having troubles setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 subtitle: How to deploy an obfs4 bridge on DragonflyBSD
diff --git a/content/relay/setup/bridge/fedora/contents.lr b/content/relay/setup/bridge/fedora/contents.lr
index bd953f4..6e2a730 100644
--- a/content/relay/setup/bridge/fedora/contents.lr
+++ b/content/relay/setup/bridge/fedora/contents.lr
@@ -87,8 +87,8 @@ To confirm your bridge is running with no issues, you should see something like
 
 ### 5. Final notes
 
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 html: two-columns-page.html
diff --git a/content/relay/setup/bridge/freebsd/contents.lr b/content/relay/setup/bridge/freebsd/contents.lr
index d954e06..50921b0 100644
--- a/content/relay/setup/bridge/freebsd/contents.lr
+++ b/content/relay/setup/bridge/freebsd/contents.lr
@@ -103,8 +103,8 @@ FreeBSDlatest: {
 
 ### 7. Final notes
 
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 subtitle: How to deploy an obfs4 bridge on FreeBSD
diff --git a/content/relay/setup/bridge/netbsd/contents.lr b/content/relay/setup/bridge/netbsd/contents.lr
index f81e965..37af844 100644
--- a/content/relay/setup/bridge/netbsd/contents.lr
+++ b/content/relay/setup/bridge/netbsd/contents.lr
@@ -84,7 +84,7 @@ To confirm your bridge is running with no issues, you should see something like
 
 ### 5. Final Notes
 
-If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 subtitle: How to deploy an obfs4 bridge on NetBSD
diff --git a/content/relay/setup/bridge/openbsd/contents.lr b/content/relay/setup/bridge/openbsd/contents.lr
index 4fc5f65..0c86c1e 100644
--- a/content/relay/setup/bridge/openbsd/contents.lr
+++ b/content/relay/setup/bridge/openbsd/contents.lr
@@ -85,8 +85,8 @@ To confirm your bridge is running with no issues, you should see something like
 
 ### 6. Final notes
 
-If you are having trouble setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/).
-If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having trouble setting up your bridge, have a look at [our help section](../../../getting-help/).
+If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 subtitle: How to deploy an obfs4 bridge on OpenBSD
diff --git a/content/relay/setup/bridge/windows/contents.lr b/content/relay/setup/bridge/windows/contents.lr
index 26e8789..9b6a011 100644
--- a/content/relay/setup/bridge/windows/contents.lr
+++ b/content/relay/setup/bridge/windows/contents.lr
@@ -95,7 +95,7 @@ To confirm your bridge is running with no issues, you should see something like
 
 ### 6. Final notes
 
-If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](https://community.torproject.org/relay/setup/bridge/post-install/).
+If you are having troubles setting up your bridge, have a look at [our help section](https://community.torproject.org/relay/getting-help/). If your bridge is now running, check out the [post-install notes](../post-install/).
 
 ---
 subtitle: How to deploy an obfs4 bridge on Windows
diff --git a/content/training/checklist/contents.lr b/content/training/checklist/contents.lr
index 88065d0..2ba9852 100644
--- a/content/training/checklist/contents.lr
+++ b/content/training/checklist/contents.lr
@@ -8,13 +8,13 @@ Complete this checklist before running a Tor training.
 
 ## Prepare
 
-  * I read and agree with the Tor Project [Code of Coduct](https://community.torproject.org/training/code-of-conduct/)
+  * I read and agree with the Tor Project [Code of Coduct](../code-of-conduct/)
 
-  * I read the Training [Best Practices](https://community.torproject.org/training/best-practices/)
+  * I read the Training [Best Practices](../best-practices/)
 
   * I have an agenda for the training
 
-  * I reviewed my [training slides](https://community.torproject.org/training/resources/)
+  * I reviewed my [training slides](../resources/)
 
 ## Security Protocol
 
diff --git a/content/training/risks/contents.lr b/content/training/risks/contents.lr
index bc65942..061f775 100644
--- a/content/training/risks/contents.lr
+++ b/content/training/risks/contents.lr
@@ -44,7 +44,7 @@ However, we may be able to put you in touch with lawyers who are capable of addr
 Some relevant resources include:
 
   * [EFF Know your rights](https://www.eff.org/issues/know-your-rights)
-  * [EFF Tor legal FAQ](https://community.torproject.org/relay/community-resources/eff-tor-legal-faq/)
+  * [EFF Tor legal FAQ](../../relay/community-resources/eff-tor-legal-faq/)
   * [OONI disclaimer](https://ooni.io/about/risks/)
 ---
 color: primary
diff --git a/content/user-research/how-to-volunteer/contents.lr b/content/user-research/how-to-volunteer/contents.lr
index 754db35..b6da55b 100644
--- a/content/user-research/how-to-volunteer/contents.lr
+++ b/content/user-research/how-to-volunteer/contents.lr
@@ -18,12 +18,12 @@ Please remember to update the issue as your research evolves.
 Not all of the data collected in our research is disclosed to the public, but our general findings are.
 To protect our participants' privacy we take care to anonymize their responses and avoid recording our sessions.
 
-If you're already familiar with the Tor Project and user testing, have a look at our [current needs for user research](https://community.torproject.org/user-research/open/) and see which study better suits you.
+If you're already familiar with the Tor Project and user testing, have a look at our [current needs for user research](../open/) and see which study better suits you.
 Remember to drop us an email telling us about your plans so we can follow and support your research.
 
-As a volunteer we also ask that you read and follow our [Code of Conduct](https://gitweb.torproject.org/community/policies.git/tree/code_of_conduct.txt), as well our [Guidelines for Research](https://community.torproject.org/user-research/guidelines/).
+As a volunteer we also ask that you read and follow our [Code of Conduct](https://gitweb.torproject.org/community/policies.git/tree/code_of_conduct.txt), as well our [Guidelines for Research](../guidelines/).
 
-**Why do we run Demographics?** 
+### Why do we run Demographics?
 We don't collect personal data in our [Demographics](https://gitlab.torproject.org/tpo/ux/research/-/blob/master/scripts%20and%20activities/2020/user_demographics-en.md), and all questions are optional.
 We believe it's important to collect basic demographics to help us understand if we are meeting our mission regarding diversity and inclusion.
 In addition, collecting these demographics is required for specific studies to support human rights.
@@ -44,16 +44,16 @@ We also ask anyone running research not use software hosted by third parties lik
 After conducting your research, it's normal to be excited to see your feedback implemented as soon as possible.
 However all feedback must be discussed internally across the different teams at the Tor Project first.
 This means that it's often necessary to run the same research more than once to validate your findings, and meet the expectations of the engineers, developers, designers, researchers and others at Tor.
-Please read our [Guidelines](https://community.torproject.org/user-research/guidelines/) to get to know this process more.
+Please read our [Guidelines](../guidelines/) to get to know this process more.
 
 ## Checklist
 
 - Read the guidelines on [how to do user research with Tor](https://gitlab.torproject.org/tpo/ux/research/-/blob/master/README.md).
 - Read and follow our [Code of Conduct](https://gitweb.torproject.org/community/policies.git/tree/code_of_conduct.txt).
 - If you don't have one yet, [request a Gitlab account](https://support.torproject.org/misc/bug-or-feedback/).
-- Open an issue in the [UX Research Repository](https://gitlab.torproject.org/tpo/ux/research/-/issues). 
+- Open an issue in the [UX Research Repository](https://gitlab.torproject.org/tpo/ux/research/-/issues).
 - Subscribe to the [UX mailing list](https://lists.torproject.org/cgi-bin/mailman/listinfo).
-- Learn more about our users by reading [Tor's user personas](https://community.torproject.org/user-research/persona).
+- Learn more about our users by reading [Tor's user personas](../persona/).
 ---
 color: primary
 ---
diff --git a/content/user-research/open/contents.lr b/content/user-research/open/contents.lr
index 91d34df..d8f36ef 100644
--- a/content/user-research/open/contents.lr
+++ b/content/user-research/open/contents.lr
@@ -19,7 +19,7 @@ html: two-columns-page.html
 body:
 
 These are our current needs for testing Tor products, as well as methodologies and testing scripts.
-Before running Tor user research, be sure you read our [Guidelines to becoming a user researcher with Tor](https://community.torproject.org/user-research/guidelines).
+Before running Tor user research, be sure you read our [Guidelines to becoming a user researcher with Tor](../guidelines/).
 
 ### Tor Browser for Desktop
 * [Tor Browser Usage](https://gitlab.torproject.org/tpo/ux/research/-/blob/master/scripts%20and%20activities/2020/browser-usage.md)





More information about the tor-commits mailing list