Update templates

This commit is contained in:
hiro 2019-09-09 15:13:46 +02:00
parent 49b1c031a6
commit 0922d73b09
3 changed files with 52 additions and 53 deletions

View File

@ -12,53 +12,3 @@ body:
If personal information such as a login password travels unencrypted over the Internet, it can very easily be intercepted by an eavesdropper. If you are logging into any website, you should make sure that the site offers HTTPS encryption, which protects against this kind of eavesdropping. You can verify this in the URL bar: if your connection is encrypted, the address will begin with “https://”, rather than “http://”.
<img class="col-md-6" src="../../static/images/https.png">
The following visualization shows what information is visible to eavesdroppers with and without Tor Browser and HTTPS encryption:
<object data="../../static/images/tor-and-https.svg" type="image/svg+xml"></object>
* Click the “Tor” button to see what data is visible to observers when you're using Tor. The button will turn green to indicate that Tor is on.
* Click the “HTTPS” button to see what data is visible to observers when you're using HTTPS. The button will turn green to indicate that HTTPS is on.
* When both buttons are green, you see the data that is visible to observers when you are using both tools.
* When both buttons are grey, you see the data that is visible to observers when you don't use either tool.
##### POTENTIALLY VISIBLE DATA
<dl>
<dt>
Site.com
</dt>
<dd>
The site being visited.
</dd>
<dt>
user / pw
</dt>
<dd>
Username and password used for authentication.
</dd>
<dt>
data
</dt>
<dd>
Data being transmitted.
</dd>
<dt>
location
</dt>
<dd>
Network location of the computer used to visit the website (the public IP address).
</dd>
<dt>
Tor
</dt>
<dd>
Whether or not Tor is being used.
</dd>
</dl>

2
lego

@ -1 +1 @@
Subproject commit c8ea869b0d5743012a59742904a103a86c692f55
Subproject commit 263d35c4d784ae240a5a908b9f2caaf8577edbae

View File

@ -1,9 +1,17 @@
<p>The following visualization shows what information is visible to eavesdroppers with and without Tor Browser and HTTPS encryption:</p>
<ul>
<li>Click the “Tor” button to see what data is visible to observers when you're using Tor. The button will turn green to indicate that Tor is on.</li>
<li>Click the “HTTPS” button to see what data is visible to observers when you're using HTTPS. The button will turn green to indicate that HTTPS is on.</li>
<li>When both buttons are green, you see the data that is visible to observers when you are using both tools.</li>
<li>When both buttons are grey, you see the data that is visible to observers when you don't use either tool.</li>
</ul>
<br />
HTTPS
<label>HTTPS</label>
<input class="toggle" type="checkbox" id="https-switch"/>
<br />
TOR
<label>TOR</label>
<input class="toggle" type="checkbox" id="tor-switch"/>
<div id="http" class="switch-off">
@ -18,3 +26,44 @@ TOR
<div id="https-tor" class="switch-on">
<p>TOR + HTTPS!!!</p>
</div>
<h5>POTENTIALLY VISIBLE DATA</h5>
<dl>
<dt>
Site.com
</dt>
<dd>
The site being visited.
</dd>
<dt>
user / pw
</dt>
<dd>
Username and password used for authentication.
</dd>
<dt>
data
</dt>
<dd>
Data being transmitted.
</dd>
<dt>
location
</dt>
<dd>
Network location of the computer used to visit the website (the public IP address).
</dd>
<dt>
Tor
</dt>
<dd>
Whether or not Tor is being used.
</dd>
</dl>