[tor-commits] r26830: {website} get rid of trailing whitespace (website/trunk/docs/en)
Roger Dingledine
arma at torproject.org
Sat Jun 14 05:19:39 UTC 2014
Author: arma
Date: 2014-06-14 05:19:39 +0000 (Sat, 14 Jun 2014)
New Revision: 26830
Modified:
website/trunk/docs/en/faq.wml
Log:
get rid of trailing whitespace
Modified: website/trunk/docs/en/faq.wml
===================================================================
--- website/trunk/docs/en/faq.wml 2014-06-14 05:17:41 UTC (rev 26829)
+++ website/trunk/docs/en/faq.wml 2014-06-14 05:19:39 UTC (rev 26830)
@@ -83,7 +83,7 @@
</a></li>
<li><a href="#SophosOnMac">I'm using the Sophos anti-virus
software on my Mac, and Tor starts but I can't browse anywhere.</a></li>
- <li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an
+ <li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an
error message from the browser: "Cannot load XPCOM".</a></li>
<li><a href="#TBBOtherExtensions">Can I install other Firefox
extensions? Which extensions should I avoid using?</a></li>
@@ -173,7 +173,7 @@
with abuse issues.</a></li>
<li><a href="#BestOSForRelay">Why doesn't my Windows (or other OS) Tor
relay run well?</a></li>
- <li><a href="#PackagedTor">Should I install Tor from my package manager,
+ <li><a href="#PackagedTor">Should I install Tor from my package manager,
or build from source?</a></li>
<li><a href="#WhatIsTheBadExitFlag">What is the BadExit flag?</a></li>
<li><a href="#IGotTheBadExitFlagWhyDidThatHappen">I got the BadExit flag.
@@ -552,13 +552,13 @@
Tor software, though. They want to distribute the <a
href="<page projects/torbrowser>">Tor Browser</a>. This includes <a
href="https://www.mozilla.org/en-US/firefox/organizations/">Firefox
- Extended Support Release</a>, and the NoScript and HTTPS-Everywhere
- extensions. You will need to follow the license for those programs as
- well. Both of those Firefox extensions are distributed under
+ Extended Support Release</a>, and the NoScript and HTTPS-Everywhere
+ extensions. You will need to follow the license for those programs as
+ well. Both of those Firefox extensions are distributed under
the <a href="https://www.fsf.org/licensing/licenses/gpl.html">GNU General
- Public License</a>, while Firefox ESR is released under the Mozilla Public
- License. The simplest way to obey their licenses is to include the source
- code for these programs everywhere you include the bundles themselves.
+ Public License</a>, while Firefox ESR is released under the Mozilla Public
+ License. The simplest way to obey their licenses is to include the source
+ code for these programs everywhere you include the bundles themselves.
</p>
<p>
@@ -870,13 +870,13 @@
<a id="Mobile"></a>
- <h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile
+ <h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile
device?</a></h3>
<p>
- Tor on Android devices is maintained by the <a
- href="https://guardianproject.info">Guardian Project</a>. Currently, there
- is no supported way of using Tor on iOS; the Guardian Project is
+ Tor on Android devices is maintained by the <a
+ href="https://guardianproject.info">Guardian Project</a>. Currently, there
+ is no supported way of using Tor on iOS; the Guardian Project is
working to make this a reality in the future.
</p>
@@ -913,9 +913,9 @@
those relays, and those connections will fail, leading to complex
anonymity implications for the clients which we'd like to avoid.
</p>
-
+
<hr>
-
+
<a id="IsItWorking"></a>
<h3><a class="anchor" href="#IsItWorking">How can I tell if Tor is
working, and that my connections really are anonymized?</a></h3>
@@ -925,9 +925,9 @@
coming through the Tor network. Try the <a href="https://check.torproject.org">
Tor Check</a> site and see whether it thinks you are using Tor or not.
</p>
-
+
<hr>
-
+
<a id="FTP"></a>
<h3><a class="anchor" href="#FTP">How do I use my browser for ftp with Tor?
</a></h3>
@@ -941,7 +941,7 @@
</p>
<hr>
-
+
<a id="NoDataScrubbing"></a>
<h3><a class="anchor" href="#NoDataScrubbing">Does Tor remove personal
information from the data my application sends?</a></h3>
@@ -1164,9 +1164,9 @@
<h3><a class="anchor" href="#Ubuntu">
I'm using Ubuntu and I can't start Tor Browser.</a></h3>
<p>
-You'll need to tell Ubuntu that you want the ability to execute shell scripts
-from the graphical interface. Open "Files" (Unity's explorer), open
-Preferences-> Behavior Tab -> Set "Run executable text files when they are
+You'll need to tell Ubuntu that you want the ability to execute shell scripts
+from the graphical interface. Open "Files" (Unity's explorer), open
+Preferences-> Behavior Tab -> Set "Run executable text files when they are
opened" to "Ask every time", then OK.
</p>
<p>You can also start the Tor Browser from the command line by running </p>
@@ -1186,21 +1186,21 @@
the protections for "Malicious websites" and "Malicious downloads".
</p>
<p>
-We encourage affected Sophos users to contact Sophos support about
+We encourage affected Sophos users to contact Sophos support about
this issue.
</p>
<hr>
<a id="XPCOMError"></a>
-<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle
+<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle
I get an error message from the browser: "Cannot load XPCOM".</a></h3>
<p>
-This <a
-href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is
-specifically caused by the Webroot SecureAnywhere Antivirus software.
-Consider switching to a different antivirus program. We encourage affected
+This <a
+href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is
+specifically caused by the Webroot SecureAnywhere Antivirus software.
+Consider switching to a different antivirus program. We encourage affected
Webroot users to contact Webroot support about this issue.
</p>
@@ -1345,7 +1345,7 @@
If you really want to see Google in English you can click the link that
provides that. But we consider this a feature with Tor, not a bug --- the
Internet is not flat, and it in fact does look different depending on
-where you are. This feature reminds people of this fact.
+where you are. This feature reminds people of this fact.
</p>
<p>
Note that Google search URLs take name/value pairs as arguments and one
@@ -1461,7 +1461,7 @@
</p>
<p>
-If you're unable to use the application's native proxy settings, all hope is
+If you're unable to use the application's native proxy settings, all hope is
not lost. See <a href="#CantSetProxy">below</a>.
</p>
@@ -1568,12 +1568,12 @@
<h3><a class="anchor" href="#VerifyDownload">How do I verify the download
(sha256sums.txt)?</a></h3>
- <p>Instructions are on the <a
- href="<page docs/verifying-signatures>#BuildVerification">verifying
+ <p>Instructions are on the <a
+ href="<page docs/verifying-signatures>#BuildVerification">verifying
signatures</a> page.</p>
<hr>
-
+
<a id="NewIdentityClosingTabs"></a>
<h3><a class="anchor" href="#NewIdentityClosingTabs">Why does "New
Identity" close all my open tabs?</a></h3>
@@ -2206,9 +2206,9 @@
consider <a href="https://www.torproject.org/docs/tor-relay-debian">helping
out</a>.
</p>
-
+
<hr>
-
+
<a id="WhyIsntMyRelayBeingUsedMore"></a>
<h3><a class="anchor" href="#WhyIsntMyRelayBeingUsedMore">Why isn't my
relay being used more?</a></h3>
@@ -2227,7 +2227,7 @@
"https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays/">
tor-relays list</a>.
</p>
-
+
<hr>
<a id="IDontHaveAStaticIP"></a>
@@ -2268,17 +2268,17 @@
<hr>
- <a id="HighCapacityConnection"></a>
+ <a id="HighCapacityConnection"></a>
<h3><a class="anchor" href="#HighCapacityConnection">How can I get Tor to fully
make use of my high capacity connection?</a></h3>
-
+
<p>
See <a href="http://archives.seul.org/or/relays/Aug-2010/msg00034.html">this
tor-relays thread</a>.
</p>
-
- <hr>
-
+
+ <hr>
+
<a id="RelayFlexible"></a>
<h3><a class="anchor" href="#RelayFlexible">How stable does my relay
need to be?</a></h3>
@@ -2330,7 +2330,7 @@
</ul>
<hr>
-
+
<a id="BandwidthShaping"></a>
<h3><a class="anchor" href="#BandwidthShaping">What bandwidth shaping
options are available to Tor relays?</a></h3>
@@ -2599,29 +2599,29 @@
<hr>
<a id="PackagedTor"></a>
- <h3><a class="anchor" href="#PackagedTor">Should I install Tor from my
+ <h3><a class="anchor" href="#PackagedTor">Should I install Tor from my
package manager, or build from source?</a></h3>
<p>
- If you're using Debian or Ubuntu especially, there are a number of benefits
- to installing Tor from the <a
- href="https://www.torproject.org/docs/debian.html.en">Tor Project's
- repository</a>.
+ If you're using Debian or Ubuntu especially, there are a number of benefits
+ to installing Tor from the <a
+ href="https://www.torproject.org/docs/debian.html.en">Tor Project's
+ repository</a>.
</p>
<ul>
<li>
- You're ulimit -n gets set to 32768, high enough for Tor to keep open all
- the connections it needs.
+ You're ulimit -n gets set to 32768, high enough for Tor to keep open all
+ the connections it needs.
</li>
<li>
- A user profile is created just for Tor, so Tor doesn't need to run as
+ A user profile is created just for Tor, so Tor doesn't need to run as
root.
</li>
<li>
An init script is included so that Tor runs at boot.
</li>
<li>
- Tor runs with --verify-config, so that most problems with your
- config file get caught.
+ Tor runs with --verify-config, so that most problems with your
+ config file get caught.
</li>
<li>
Tor can bind to low level ports, then drop privileges.
@@ -2666,7 +2666,7 @@
of the Guards: A Framework for Understanding and Improving Entry Guard
Selection in Tor</a>.
</p>
-
+
<hr>
<a id="TorClientOnADifferentComputerThanMyApplications"></a>
@@ -3257,7 +3257,7 @@
<a id="AccessHiddenServices"></a>
<h3><a class="anchor" href="#AccessHiddenServices">How do I access
hidden services?</a></h3>
-
+
<p>
Tor hidden services are named with a special top-level domain (TLD)
name in DNS: .onion. Since the .onion TLD is not recognized by the
@@ -3272,7 +3272,7 @@
Tor directly. You can't try to resolve it to an IP address, since there
<i>is</i> no corresponding IP address: the server is hidden, after all!
</p>
-
+
<p>
So, how do you make your application pass the hostname directly to Tor?
You can't use SOCKS 4, since SOCKS 4 proxies require an IP from the
@@ -3282,7 +3282,7 @@
SOCKS proxy. SOCKS 4a, however, always accepts a hostname: You'll need
to use SOCKS 4a.
</p>
-
+
<p>
Some applications, such as the browsers Mozilla Firefox and Apple's
Safari, support sending DNS queries to Tor's SOCKS 5 proxy. Most web
@@ -3290,7 +3290,7 @@
to point your web browser at an HTTP proxy, and tell the HTTP proxy
to speak to Tor with SOCKS 4a. We recommend Polipo as your HTTP proxy.
</p>
-
+
<p>
For applications that do not support HTTP proxy, and so cannot use
Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an
@@ -3299,24 +3299,24 @@
will allow you to use almost any program with Tor without leaking DNS
lookups and allow those same programs to access hidden services.
</p>
-
+
<p>
See also the <a href="#SocksAndDNS">question on DNS</a>.
- </p>
-
+ </p>
+
<hr>
<a id="ProvideAHiddenService"></a>
<h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a
hidden service?</a></h3>
-
+
<p>
See the <a href="<page docs/tor-hidden-service>">
official hidden service configuration instructions</a>.
</p>
<hr>
-
+
<a id="Development"></a>
<h2><a class="anchor">Development:</a></h2>
@@ -3357,7 +3357,7 @@
<a id="PrivateTorNetwork"></a>
<h3><a class="anchor" href="#PrivateTorNetwork">How do I set up my
own private Tor network?</a></h3>
-
+
<p>
If you want to experiment locally with your own network, or you're
cut off from the Internet and want to be able to mess with Tor still,
@@ -3436,7 +3436,7 @@
<a id="WhatIsLibevent"></a>
<h3><a class="anchor" href="#WhatIsLibevent">What is Libevent?</a></h3>
-
+
<p>
When you want to deal with a bunch of net connections at once, you
have a few options:
@@ -3479,7 +3479,7 @@
<a id="MyNewFeature"></a>
<h3><a class="anchor" href="#MyNewFeature">What do I need to do to get
a new feature into Tor?</a></h3>
-
+
<p>
For a new feature to go into Tor, it needs to be designed (explain what
you think Tor should do), argued to be secure (explain why it's better
@@ -3502,7 +3502,7 @@
<a id="WhatProtectionsDoesTorProvide"></a>
<h3><a class="anchor" href="#WhatProtectionsDoesTorProvide">What
protections does Tor provide?</a></h3>
-
+
<p>
Internet communication is based on a store-and-forward model that
can be understood in analogy to postal mail: Data is transmitted in
@@ -3518,7 +3518,7 @@
server in the Internet that can see any of the packets can profile your
behaviour.
</p>
-
+
<p>
The aim of Tor is to improve your privacy by sending your traffic through
a series of proxies. Your communication is encrypted in multiple layers
@@ -3529,11 +3529,11 @@
communicating with Tor nodes. Similarly, servers in the Internet just
see that they are being contacted by Tor nodes.
</p>
-
+
<p>
Generally speaking, Tor aims to solve three privacy problems:
</p>
-
+
<p>
First, Tor prevents websites and other services from learning
your location, which they can use to build databases about your
@@ -3541,13 +3541,13 @@
give you away by default -- now you can have the ability to choose,
for each connection, how much information to reveal.
</p>
-
+
<p>
Second, Tor prevents people watching your traffic locally (such as
your ISP) from learning what information you're fetching and where
you're fetching it from. It also stops them from deciding what you're
allowed to learn and publish -- if you can get to any part of the Tor
- network, you can reach any site on the Internet.
+ network, you can reach any site on the Internet.
</p>
<p>
@@ -3557,26 +3557,26 @@
provides more security than the old <a href="#Torisdifferent">one hop proxy
</a> approach.
</p>
-
+
<p>
Note, however, that there are situations where Tor fails to solve these
privacy problems entirely: see the entry below on <a
- href="#AttacksOnOnionRouting">remaining attacks</a>.
+ href="#AttacksOnOnionRouting">remaining attacks</a>.
</p>
-
+
<hr>
-
+
<a id="CanExitNodesEavesdrop"></a>
<h3><a class="anchor" href="#CanExitNodesEavesdrop">Can exit nodes eavesdrop
on communications? Isn't that bad?</a></h3>
-
+
<p>
Yes, the guy running the exit node can read the bytes that come in and
out there. Tor anonymizes the origin of your traffic, and it makes sure
to encrypt everything inside the Tor network, but it does not magically
encrypt all traffic throughout the Internet.
</p>
-
+
<p>
This is why you should always use end-to-end encryption such as SSL for
sensitive Internet connections. (The corollary to this answer is that if
@@ -3584,7 +3584,7 @@
*not* using end-to-end encryption at the application layer, then something
has already gone wrong and you shouldn't be thinking that Tor is the problem.)
</p>
-
+
<p>
Tor does provide a partial solution in a very specific situation, though.
When you make a connection to a destination that also runs a Tor relay,
@@ -3602,9 +3602,9 @@
does the Tor client learn which relays are associated with which
websites in a decentralized yet non-gamable way?").
</p>
-
+
<hr>
-
+
<a id="AmITotallyAnonymous"></a>
<h3><a class="anchor" href="#AmITotallyAnonymous">So I'm totally anonymous
if I use Tor?</a></h3>
@@ -3729,7 +3729,7 @@
</p>
<hr>
-
+
<a id="KeyManagement"></a>
<h3><a class="anchor" href="#KeyManagement">Tell me about all the
keys Tor uses.</a></h3>
@@ -3995,10 +3995,10 @@
<a id="IsTorLikeAVPN"></a>
<h3><a class="anchor" href="#IsTorLikeAVPN">Is Tor like a VPN?</a></h3>
-
+
<p>
- <b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b>
- If you're looking for a trusted entry into the Tor network, or if you want
+ <b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b>
+ If you're looking for a trusted entry into the Tor network, or if you want
to obscure the fact that you're using Tor, <a
href="https://www.torproject.org/docs/bridges#RunningABridge">setting up
a private server as a bridge</a> works quite well.
@@ -4044,7 +4044,7 @@
<a id="Proxychains"></a>
<h3><a class="anchor" href="#Proxychains">Aren't 10 proxies
(proxychains) better than Tor with only 3 hops?</a></h3>
-
+
<p>
Proxychains is a program that sends your traffic through a series of
open web proxies that you supply before sending it on to your final
@@ -4066,10 +4066,10 @@
engine are compromised machines, misconfigured private proxies
not intended for public use, or honeypots set up to exploit users.
</p>
-
+
<hr>
-
+
<a id="AttacksOnOnionRouting"></a>
<h3><a class="anchor" href="#AttacksOnOnionRouting">What attacks remain
against onion routing?</a></h3>
@@ -4516,7 +4516,7 @@
<a id="SendPadding"></a>
<h3><a class="anchor" href="#SendPadding">You should send padding so it's
more secure.</a></h3>
-
+
<p>
Like all anonymous communication networks that are fast enough for web
browsing, Tor is vulnerable to statistical "traffic confirmation"
@@ -4525,7 +4525,7 @@
nice if we could use cover traffic to confuse this attack. But there
are three problems here:
</p>
-
+
<ul>
<li>
Cover traffic is really expensive. And *every* user needs to be doing
@@ -4548,26 +4548,26 @@
patterns later in the path.
</li>
</ul>
-
+
<p>
In short, for a system like Tor that aims to be fast, we don't see any
use for padding, and it would definitely be a serious usability problem.
We hope that one day somebody will prove us wrong, but we are not
optimistic.
</p>
-
+
<hr>
<a id="Steganography"></a>
<h3><a class="anchor" href="#Steganography">You should use steganography to hide Tor
traffic.</a></h3>
-
+
<p>
Many people suggest that we should use steganography to make it hard
to notice Tor connections on the Internet. There are a few problems
with this idea though:
</p>
-
+
<p>
First, in the current network topology, the Tor relays list <a
href="#HideExits">is public</a> and can be accessed by attackers.
@@ -4575,7 +4575,7 @@
always just notice <b>any connection</b> to or from a Tor relay's
IP address.
</p>
-
+
<hr>
<a id="Abuse"></a>
More information about the tor-commits
mailing list