diff --git a/docs/debian-selector.js b/docs/debian-selector.js index c8db5c2a..2f6c3efe 100644 --- a/docs/debian-selector.js +++ b/docs/debian-selector.js @@ -12,6 +12,7 @@ var software = { 'xenial': [ 'xenial'], 'artful': [ 'artful'], 'bionic': [ 'bionic'], + 'cosmic': [ 'cosmic'], }, 'experimental-0.3.4.x': { 'jessie': [ 'jessie' ], @@ -22,6 +23,7 @@ var software = { 'xenial': [ 'xenial'], 'artful': [ 'artful'], 'bionic': [ 'bionic'], + 'cosmic': [ 'cosmic'], }, 'nightly-master': { 'jessie': [ 'jessie' ], @@ -32,6 +34,7 @@ var software = { 'xenial': [ 'xenial'], 'artful': [ 'artful'], 'bionic': [ 'bionic'], + 'cosmic': [ 'cosmic'], }, }, 'tor (from source)': { @@ -44,6 +47,7 @@ var software = { 'xenial': [ 'xenial'], 'artful': [ 'artful'], 'bionic': [ 'bionic'], + 'cosmic': [ 'cosmic'], }, 'experimental-0.3.4.x': { 'jessie': [ 'jessie' ], @@ -54,6 +58,7 @@ var software = { 'xenial': [ 'xenial'], 'artful': [ 'artful'], 'bionic': [ 'bionic'], + 'cosmic': [ 'cosmic'], }, }, }; diff --git a/download/en/download-easy.wml b/download/en/download-easy.wml index 804c3974..62f24a82 100644 --- a/download/en/download-easy.wml +++ b/download/en/download-easy.wml @@ -30,6 +30,9 @@ +
+ Are you looking for the Tor source tarball? +
@@ -218,111 +221,7 @@
-
- - -

Want Tor to really work?

-

You need to change some of your habits, as some things won't work -exactly as you are used to.

- -
    - -
  1. Use Tor Browser -

    Tor does not protect all of your computer's Internet traffic when you -run it. Tor only protects your applications that are properly configured -to send their Internet traffic through Tor. To avoid problems with -Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to -protect your privacy and anonymity on the web as long as you're browsing -with Tor Browser itself. Almost any other web browser configuration -is likely to be unsafe to use with Tor.

    -
  2. -
  3. Don't torrent over Tor -

    -Torrent file-sharing applications have been observed to ignore proxy -settings and make direct connections even when they are told to use Tor. -Even if your torrent application connects only through Tor, you will -often send out your real IP address in the tracker GET request, -because that's how torrents work. Not only do you -deanonymize your torrent traffic and your other simultaneous Tor web -traffic this way, you also slow down the entire Tor network for everyone else. -

    -
  4. -
  5. Don't enable or install browser plugins -

    Tor Browser will block browser plugins such as Flash, RealPlayer, -Quicktime, and others: they can be manipulated into revealing your IP -address. Similarly, we do not recommend installing additional addons or -plugins into Tor Browser, as these may bypass Tor or otherwise harm -your anonymity and privacy.

    -
  6. - -
  7. Use HTTPS versions of websites -

    Tor will encrypt your traffic to -and within the Tor network, but the encryption of your traffic to -the final destination website depends upon on that website. To help -ensure private encryption to websites, Tor Browser includes -HTTPS Everywhere -to force the use of HTTPS encryption with major websites that -support it. However, you should still watch the browser URL bar to -ensure that websites you provide sensitive information to display a blue -or green URL bar button, include https:// in the URL, and -display the proper expected name for the website. -Also see EFF's interactive page -explaining how Tor -and HTTPS relate. -

    -
  8. - -
  9. Don't open documents downloaded through Tor while online -

    Tor Browser will warn you before automatically opening -documents that are handled by external applications. DO NOT -IGNORE THIS WARNING. You should be very careful when downloading -documents via Tor (especially DOC and PDF files, unless you use the PDF -viewer that's built into Tor Browser) as these documents -can contain Internet resources that will be downloaded outside of -Tor by the application that opens them. This will reveal your non-Tor -IP address. If you must work with DOC and/or PDF files, we strongly -recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking -disabled, or using Tails. -Under no circumstances is it safe to use BitTorrent -and Tor together, however.

    -
  10. - -
  11. Use bridges and/or find company -

    Tor tries to prevent attackers from learning what destination websites -you connect to. However, by default, it does not prevent somebody -watching your Internet traffic from learning that you're using Tor. If -this matters to you, you can reduce this risk by configuring Tor to use a -Tor bridge relay rather than connecting -directly to the public Tor network. Ultimately the best protection is -a social approach: the more Tor users there are near you and the more -diverse their interests, the less -dangerous it will be that you are one of them. Convince other people to -use Tor, too!

    -
  12. -
-
-

Be smart and learn more. Understand what Tor does and does not offer. -This list of pitfalls isn't complete, and we need your help identifying and documenting all -the issues.


-

Where else can I get Tor?

-

In some countries the Tor Project website is blocked or censored and -it is not possible to download Tor directly. The Tor Project hosts a -Tor Browser mirror on Github.


-

Using the GetTor service is -another way to download Tor Browser when the Project website and mirrors -are blocked.

- -
+#include
diff --git a/download/en/download-unix.wml b/download/en/download-unix.wml index 70d5ab79..679b76b5 100644 --- a/download/en/download-unix.wml +++ b/download/en/download-unix.wml @@ -19,6 +19,9 @@ list of warnings.

+ +

Looking for a source tarball?

+ @@ -53,13 +56,22 @@ + + + + + + + - + @@ -69,14 +81,14 @@ - + - +
SlackwareSlackwareSlackBuilds.org +Linux/BSD/Unix
+
FreeBSD FreeBSD pkg install tor Linux/BSD/Unix
OpenBSD OpenBSD pkg_add tor
NetBSD NetBSD cd /usr/pkgsrc/net/tor && make install Linux/BSD/Unix
Source code Source tarballs diff --git a/download/en/download.wml b/download/en/download.wml index 8d6fc943..80c6b946 100644 --- a/download/en/download.wml +++ b/download/en/download.wml @@ -21,6 +21,15 @@
+ + +
@@ -33,7 +42,7 @@ you are used to. Please read the full list of warnings fo
- Microsoft Windows + Microsoft Windows
@@ -82,7 +91,7 @@ you are used to. Please read the full list of warnings fo
- Apple OS X
+ Apple OS X
@@ -108,7 +117,7 @@ you are used to. Please read the full list of warnings fo
- Linux
+ Linux
@@ -157,6 +166,7 @@ custom configurations. All an apt-get or yum install away.

+ - - +
- Smartphone -
+ Smartphones
-
-
-
+
+

iOS

+

+ Unfortunately we do not have the capacity to offer a version of + Tor Browser for IOS at the moment, but + + we recommend Onion Browser. See also + IOS | prism-break. +

+
+
+ +
- Source Code
+ Source Code
- - -

Source Tarball

-

Configure with: ./configure && make && src/or/tor

-

The current stable version of Tor is . Its release notes are available.

-

The current unstable/alpha version of Tor is . Its Changelog is available.

-
+

Want to build Tor or + Tor Browser from source? + Read the + Tor Browser Hacking Guide

+

-
- - -

Want Tor to really work?

-

You need to change some of your habits, as some things won't work exactly as -you are used to.

- -
    -
  1. Use Tor Browser - -

    - -Tor does not protect all of your computer's Internet traffic when you -run it. Tor only protects your applications that are properly configured to -send their Internet traffic through Tor. To avoid problems with Tor -configuration, we strongly recommend you use the -Tor Browser. It is pre-configured to protect -your privacy and anonymity on the web as long as you're browsing with Tor -Browser itself. Almost any other web browser configuration is likely to be -unsafe to use with Tor. - -

    - -
  2. - -
  3. Don't torrent over Tor -

    -Torrent file-sharing applications have been observed to ignore proxy -settings and make direct connections even when they are told to use Tor. -Even if your torrent application connects only through Tor, you will -often send out your real IP address in the tracker GET request, -because that's how torrents work. Not only do you -deanonymize your torrent traffic and your other simultaneous Tor web -traffic this way, you also slow down the entire Tor network for everyone else. -

    -
  4. - -
  5. Don't enable or install browser plugins - -

    - -Tor Browser will block browser plugins such as Flash, RealPlayer, -Quicktime, and others: they can be manipulated into revealing your IP address. -Similarly, we do not recommend installing additional addons or plugins into -Tor Browser, as these may bypass Tor or otherwise harm your anonymity and -privacy. - -

    - -
  6. - -
  7. Use HTTPS versions of websites - -

    - -Tor will encrypt your traffic -to and -within the Tor network, but the encryption of your traffic to the final -destination website depends upon on that website. To help ensure private -encryption to websites, Tor Browser includes HTTPS Everywhere to force the -use of HTTPS encryption with major websites that support it. However, you -should still watch the browser URL bar to ensure that websites you provide -sensitive information to display a -blue or -green URL bar button, include https:// in the URL, and display the -proper expected name for the website. Also see EFF's interactive page -explaining how Tor -and HTTPS relate. - -

    - -
  8. - -
  9. Don't open documents downloaded through Tor while online - -

    - -Tor Browser will warn you before automatically opening documents that are -handled by external applications. DO NOT IGNORE THIS WARNING. You -should be very careful when downloading documents via Tor (especially DOC and -PDF files, unless you use the PDF viewer that's built into Tor Browser) as -these documents can contain Internet resources that will be downloaded outside -of Tor by the application that opens them. This will reveal your non-Tor IP -address. If you must work with DOC and/or PDF files, we strongly recommend -either using a disconnected computer, -downloading the free VirtualBox and -using it with a virtual machine image -with networking disabled, or using Tails. -Under no circumstances is it safe to use -BitTorrent -and Tor together, however. - -

    - -
  10. - -
  11. Use bridges and/or find company - -

    - -Tor tries to prevent attackers from learning what destination websites you -connect to. However, by default, it does not prevent somebody watching your Internet -traffic from learning that you're using Tor. If this matters to you, you can -reduce this risk by configuring Tor to use a Tor -bridge relay rather than connecting directly to the public Tor network. -Ultimately the best protection is a social approach: the more Tor -users there are near you and the more -diverse their interests, the less -dangerous it will be that you are one of them. Convince other people to use -Tor, too! - -

    - -
  12. - -
-
-

-Be smart and learn more. Understand what Tor does and does not offer. -This list of pitfalls isn't complete, and we need your -help identifying and documenting -all the issues. -

-
+#include diff --git a/download/en/tor.wml b/download/en/tor.wml new file mode 100644 index 00000000..bda66352 --- /dev/null +++ b/download/en/tor.wml @@ -0,0 +1,241 @@ +## translation metadata +# Revision: $Revision$ +# Translation-Priority: 3-low + +# +# + +# +# +en-US + +# +Tor Browser +Currently Unused +Tor Browser +# +Tor Browser (32-Bit) +Tor Browser (64-Bit) + +#include "dlhead.wmi" TITLE="Download Tor" CHARSET="UTF-8" + +
+ +
+ +
+

Want Tor to really work?

+

You need to change some of your habits, as some things won't work exactly as +you are used to. Please read the full list of warnings for details. +

+
+ + +
+
+

Tor Source Tarballs

+

Build and run with: ./configure && make && src/or/tor
+ See the Changelog for what's new.

+ + +
+
+
+ + + + + +
+
+
+

What is Tor?

+ +
+
+ + +
+
+

Having Trouble?

+ +
+
+ +
+ +
+ +
+ +

Want Tor to really work?

+

You need to change some of your habits, as some things won't work exactly as +you are used to.

+ +
    +
  1. Use Tor Browser + +

    + +Tor does not protect all of your computer's Internet traffic when you +run it. Tor only protects your applications that are properly configured to +send their Internet traffic through Tor. To avoid problems with Tor +configuration, we strongly recommend you use the +Tor Browser. It is pre-configured to protect +your privacy and anonymity on the web as long as you're browsing with Tor +Browser itself. Almost any other web browser configuration is likely to be +unsafe to use with Tor. + +

    + +
  2. + +
  3. Don't torrent over Tor +

    +Torrent file-sharing applications have been observed to ignore proxy +settings and make direct connections even when they are told to use Tor. +Even if your torrent application connects only through Tor, you will +often send out your real IP address in the tracker GET request, +because that's how torrents work. Not only do you +deanonymize your torrent traffic and your other simultaneous Tor web +traffic this way, you also slow down the entire Tor network for everyone else. +

    +
  4. + +
  5. Don't enable or install browser plugins + +

    + +Tor Browser will block browser plugins such as Flash, RealPlayer, +Quicktime, and others: they can be manipulated into revealing your IP address. +Similarly, we do not recommend installing additional addons or plugins into +Tor Browser, as these may bypass Tor or otherwise harm your anonymity and +privacy. + +

    + +
  6. + +
  7. Use HTTPS versions of websites + +

    + +Tor will encrypt your traffic +to and +within the Tor network, but the encryption of your traffic to the final +destination website depends upon on that website. To help ensure private +encryption to websites, Tor Browser includes HTTPS Everywhere to force the +use of HTTPS encryption with major websites that support it. However, you +should still watch the browser URL bar to ensure that websites you provide +sensitive information to display a +blue or +green URL bar button, include https:// in the URL, and display the +proper expected name for the website. Also see EFF's interactive page +explaining how Tor +and HTTPS relate. + +

    + +
  8. + +
  9. Don't open documents downloaded through Tor while online + +

    + +Tor Browser will warn you before automatically opening documents that are +handled by external applications. DO NOT IGNORE THIS WARNING. You +should be very careful when downloading documents via Tor (especially DOC and +PDF files, unless you use the PDF viewer that's built into Tor Browser) as +these documents can contain Internet resources that will be downloaded outside +of Tor by the application that opens them. This will reveal your non-Tor IP +address. If you must work with DOC and/or PDF files, we strongly recommend +either using a disconnected computer, +downloading the free VirtualBox and +using it with a virtual machine image +with networking disabled, or using Tails. +Under no circumstances is it safe to use +BitTorrent +and Tor together, however. + +

    + +
  10. + +
  11. Use bridges and/or find company + +

    + +Tor tries to prevent attackers from learning what destination websites you +connect to. However, by default, it does not prevent somebody watching your Internet +traffic from learning that you're using Tor. If this matters to you, you can +reduce this risk by configuring Tor to use a Tor +bridge relay rather than connecting directly to the public Tor network. +Ultimately the best protection is a social approach: the more Tor +users there are near you and the more +diverse their interests, the less +dangerous it will be that you are one of them. Convince other people to use +Tor, too! + +

    + +
  12. + +
+
+

+Be smart and learn more. Understand what Tor does and does not offer. +This list of pitfalls isn't complete, and we need your +help identifying and documenting +all the issues. +

+
+ +
+ +
+ + +#include diff --git a/en/index.wml b/en/index.wml index fc675683..50514944 100644 --- a/en/index.wml +++ b/en/index.wml @@ -18,7 +18,7 @@

Protect your privacy. Defend yourself against network surveillance and traffic analysis.

diff --git a/images/distros/slackware.png b/images/distros/slackware.png new file mode 100644 index 00000000..5f56a64a Binary files /dev/null and b/images/distros/slackware.png differ diff --git a/include/versions.wmi b/include/versions.wmi index 57cc3ab8..eeb86628 100644 --- a/include/versions.wmi +++ b/include/versions.wmi @@ -1,6 +1,11 @@ +# Tor +0.2.9.16 0.3.3.9 +0.3.4.5-rc +0.3.4.6-rc 0.3.4.7-rc +# Tor Browser - development branch maint-7.5 # *** tor browser stable *** @@ -42,8 +47,15 @@ +# Tor files +tor-.tar.gz +../dist/ tor-.tar.gz ../dist/ +tor-.tar.gz +../dist/ +tor-.tar.gz +../dist/ tor-.tar.gz ../dist/ diff --git a/include/warning.wmi b/include/warning.wmi new file mode 100644 index 00000000..0e0eb2ee --- /dev/null +++ b/include/warning.wmi @@ -0,0 +1,132 @@ +#! /usr/bin/wml +<: use strict; :> +<: use warnings; :> + +# + +
+ + +

Want Tor to really work?

+

You need to change some of your habits, as some things won't work exactly as +you are used to.

+ +
    +
  1. Use Tor Browser + +

    + +Tor does not protect all of your computer's Internet traffic when you +run it. Tor only protects your applications that are properly configured to +send their Internet traffic through Tor. To avoid problems with Tor +configuration, we strongly recommend you use the +Tor Browser. It is pre-configured to protect +your privacy and anonymity on the web as long as you're browsing with Tor +Browser itself. Almost any other web browser configuration is likely to be +unsafe to use with Tor. + +

    + +
  2. + +
  3. Don't torrent over Tor +

    +Torrent file-sharing applications have been observed to ignore proxy +settings and make direct connections even when they are told to use Tor. +Even if your torrent application connects only through Tor, you will +often send out your real IP address in the tracker GET request, +because that's how torrents work. Not only do you +deanonymize your torrent traffic and your other simultaneous Tor web +traffic this way, you also slow down the entire Tor network for everyone else. +

    +
  4. + +
  5. Don't enable or install browser plugins + +

    + +Tor Browser will block browser plugins such as Flash, RealPlayer, +Quicktime, and others: they can be manipulated into revealing your IP address. +Similarly, we do not recommend installing additional addons or plugins into +Tor Browser, as these may bypass Tor or otherwise harm your anonymity and +privacy. + +

    + +
  6. + +
  7. Use HTTPS versions of websites + +

    + +Tor will encrypt your traffic +to and +within the Tor network, but the encryption of your traffic to the final +destination website depends upon on that website. To help ensure private +encryption to websites, Tor Browser includes HTTPS Everywhere to force the +use of HTTPS encryption with major websites that support it. However, you +should still watch the browser URL bar to ensure that websites you provide +sensitive information to display a +blue or +green URL bar button, include https:// in the URL, and display the +proper expected name for the website. Also see EFF's interactive page +explaining how Tor +and HTTPS relate. + +

    + +
  8. + +
  9. Don't open documents downloaded through Tor while online + +

    + +Tor Browser will warn you before automatically opening documents that are +handled by external applications. DO NOT IGNORE THIS WARNING. You +should be very careful when downloading documents via Tor (especially DOC and +PDF files, unless you use the PDF viewer that's built into Tor Browser) as +these documents can contain Internet resources that will be downloaded outside +of Tor by the application that opens them. This will reveal your non-Tor IP +address. If you must work with DOC and/or PDF files, we strongly recommend +either using a disconnected computer, +downloading the free VirtualBox and +using it with a virtual machine image +with networking disabled, or using Tails. +Under no circumstances is it safe to use +BitTorrent +and Tor together, however. + +

    + +
  10. + +
  11. Use bridges and/or find company + +

    + +Tor tries to prevent attackers from learning what destination websites you +connect to. However, by default, it does not prevent somebody watching your Internet +traffic from learning that you're using Tor. If this matters to you, you can +reduce this risk by configuring Tor to use a +Pluggable Transport rather than connecting directly to the public Tor network. +Ultimately the best protection is a social approach: the more Tor +users there are near you and the more +diverse their interests, the less +dangerous it will be that you are one of them. Convince other people to use +Tor, too! + +

    + +
  12. + +
+
+

+Be smart and learn more. Understand what Tor does and does not offer. +This list of pitfalls isn't complete, and we need your +help identifying and documenting +all the issues. +

+