mirror of
https://github.com/torproject/webwml.git
synced 2025-03-01 14:45:41 +00:00
get rid of trailing whitespace
This commit is contained in:
parent
1ed9963e19
commit
2b63e88f02
184
docs/en/faq.wml
184
docs/en/faq.wml
@ -83,7 +83,7 @@ includes Tor?</a></li>
|
||||
</a></li>
|
||||
<li><a href="#SophosOnMac">I'm using the Sophos anti-virus
|
||||
software on my Mac, and Tor starts but I can't browse anywhere.</a></li>
|
||||
<li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an
|
||||
<li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an
|
||||
error message from the browser: "Cannot load XPCOM".</a></li>
|
||||
<li><a href="#TBBOtherExtensions">Can I install other Firefox
|
||||
extensions? Which extensions should I avoid using?</a></li>
|
||||
@ -173,7 +173,7 @@ be?</a></li>
|
||||
with abuse issues.</a></li>
|
||||
<li><a href="#BestOSForRelay">Why doesn't my Windows (or other OS) Tor
|
||||
relay run well?</a></li>
|
||||
<li><a href="#PackagedTor">Should I install Tor from my package manager,
|
||||
<li><a href="#PackagedTor">Should I install Tor from my package manager,
|
||||
or build from source?</a></li>
|
||||
<li><a href="#WhatIsTheBadExitFlag">What is the BadExit flag?</a></li>
|
||||
<li><a href="#IGotTheBadExitFlagWhyDidThatHappen">I got the BadExit flag.
|
||||
@ -552,13 +552,13 @@ Tor?</a></h3>
|
||||
Tor software, though. They want to distribute the <a
|
||||
href="<page projects/torbrowser>">Tor Browser</a>. This includes <a
|
||||
href="https://www.mozilla.org/en-US/firefox/organizations/">Firefox
|
||||
Extended Support Release</a>, and the NoScript and HTTPS-Everywhere
|
||||
extensions. You will need to follow the license for those programs as
|
||||
well. Both of those Firefox extensions are distributed under
|
||||
Extended Support Release</a>, and the NoScript and HTTPS-Everywhere
|
||||
extensions. You will need to follow the license for those programs as
|
||||
well. Both of those Firefox extensions are distributed under
|
||||
the <a href="https://www.fsf.org/licensing/licenses/gpl.html">GNU General
|
||||
Public License</a>, while Firefox ESR is released under the Mozilla Public
|
||||
License. The simplest way to obey their licenses is to include the source
|
||||
code for these programs everywhere you include the bundles themselves.
|
||||
Public License</a>, while Firefox ESR is released under the Mozilla Public
|
||||
License. The simplest way to obey their licenses is to include the source
|
||||
code for these programs everywhere you include the bundles themselves.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
@ -870,13 +870,13 @@ executive
|
||||
|
||||
|
||||
<a id="Mobile"></a>
|
||||
<h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile
|
||||
<h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile
|
||||
device?</a></h3>
|
||||
|
||||
<p>
|
||||
Tor on Android devices is maintained by the <a
|
||||
href="https://guardianproject.info">Guardian Project</a>. Currently, there
|
||||
is no supported way of using Tor on iOS; the Guardian Project is
|
||||
Tor on Android devices is maintained by the <a
|
||||
href="https://guardianproject.info">Guardian Project</a>. Currently, there
|
||||
is no supported way of using Tor on iOS; the Guardian Project is
|
||||
working to make this a reality in the future.
|
||||
</p>
|
||||
|
||||
@ -913,9 +913,9 @@ executive
|
||||
those relays, and those connections will fail, leading to complex
|
||||
anonymity implications for the clients which we'd like to avoid.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="IsItWorking"></a>
|
||||
<h3><a class="anchor" href="#IsItWorking">How can I tell if Tor is
|
||||
working, and that my connections really are anonymized?</a></h3>
|
||||
@ -925,9 +925,9 @@ executive
|
||||
coming through the Tor network. Try the <a href="https://check.torproject.org">
|
||||
Tor Check</a> site and see whether it thinks you are using Tor or not.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="FTP"></a>
|
||||
<h3><a class="anchor" href="#FTP">How do I use my browser for ftp with Tor?
|
||||
</a></h3>
|
||||
@ -941,7 +941,7 @@ executive
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="NoDataScrubbing"></a>
|
||||
<h3><a class="anchor" href="#NoDataScrubbing">Does Tor remove personal
|
||||
information from the data my application sends?</a></h3>
|
||||
@ -1164,9 +1164,9 @@ code under a video's "Share" option. The link switches out a URL that looks</p>
|
||||
<h3><a class="anchor" href="#Ubuntu">
|
||||
I'm using Ubuntu and I can't start Tor Browser.</a></h3>
|
||||
<p>
|
||||
You'll need to tell Ubuntu that you want the ability to execute shell scripts
|
||||
from the graphical interface. Open "Files" (Unity's explorer), open
|
||||
Preferences-> Behavior Tab -> Set "Run executable text files when they are
|
||||
You'll need to tell Ubuntu that you want the ability to execute shell scripts
|
||||
from the graphical interface. Open "Files" (Unity's explorer), open
|
||||
Preferences-> Behavior Tab -> Set "Run executable text files when they are
|
||||
opened" to "Ask every time", then OK.
|
||||
</p>
|
||||
<p>You can also start the Tor Browser from the command line by running </p>
|
||||
@ -1186,21 +1186,21 @@ internet. Go to Preferences -> Web Protection -> General, and turn off
|
||||
the protections for "Malicious websites" and "Malicious downloads".
|
||||
</p>
|
||||
<p>
|
||||
We encourage affected Sophos users to contact Sophos support about
|
||||
We encourage affected Sophos users to contact Sophos support about
|
||||
this issue.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="XPCOMError"></a>
|
||||
<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle
|
||||
<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle
|
||||
I get an error message from the browser: "Cannot load XPCOM".</a></h3>
|
||||
|
||||
<p>
|
||||
This <a
|
||||
href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is
|
||||
specifically caused by the Webroot SecureAnywhere Antivirus software.
|
||||
Consider switching to a different antivirus program. We encourage affected
|
||||
This <a
|
||||
href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is
|
||||
specifically caused by the Webroot SecureAnywhere Antivirus software.
|
||||
Consider switching to a different antivirus program. We encourage affected
|
||||
Webroot users to contact Webroot support about this issue.
|
||||
</p>
|
||||
|
||||
@ -1345,7 +1345,7 @@ Why does Google show up in foreign languages?</a></h3>
|
||||
If you really want to see Google in English you can click the link that
|
||||
provides that. But we consider this a feature with Tor, not a bug --- the
|
||||
Internet is not flat, and it in fact does look different depending on
|
||||
where you are. This feature reminds people of this fact.
|
||||
where you are. This feature reminds people of this fact.
|
||||
</p>
|
||||
<p>
|
||||
Note that Google search URLs take name/value pairs as arguments and one
|
||||
@ -1461,7 +1461,7 @@ configuration</a> of Tor and Privoxy.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
If you're unable to use the application's native proxy settings, all hope is
|
||||
If you're unable to use the application's native proxy settings, all hope is
|
||||
not lost. See <a href="#CantSetProxy">below</a>.
|
||||
</p>
|
||||
|
||||
@ -1568,12 +1568,12 @@ href="http://www.crowdstrike.com/community-tools/index.html#tool-79">proposed
|
||||
<h3><a class="anchor" href="#VerifyDownload">How do I verify the download
|
||||
(sha256sums.txt)?</a></h3>
|
||||
|
||||
<p>Instructions are on the <a
|
||||
href="<page docs/verifying-signatures>#BuildVerification">verifying
|
||||
<p>Instructions are on the <a
|
||||
href="<page docs/verifying-signatures>#BuildVerification">verifying
|
||||
signatures</a> page.</p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="NewIdentityClosingTabs"></a>
|
||||
<h3><a class="anchor" href="#NewIdentityClosingTabs">Why does "New
|
||||
Identity" close all my open tabs?</a></h3>
|
||||
@ -2206,9 +2206,9 @@ from the source code release tor-0.2.4.16-rc is:
|
||||
consider <a href="https://www.torproject.org/docs/tor-relay-debian">helping
|
||||
out</a>.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="WhyIsntMyRelayBeingUsedMore"></a>
|
||||
<h3><a class="anchor" href="#WhyIsntMyRelayBeingUsedMore">Why isn't my
|
||||
relay being used more?</a></h3>
|
||||
@ -2227,7 +2227,7 @@ from the source code release tor-0.2.4.16-rc is:
|
||||
"https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays/">
|
||||
tor-relays list</a>.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="IDontHaveAStaticIP"></a>
|
||||
@ -2268,17 +2268,17 @@ from the source code release tor-0.2.4.16-rc is:
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="HighCapacityConnection"></a>
|
||||
<a id="HighCapacityConnection"></a>
|
||||
<h3><a class="anchor" href="#HighCapacityConnection">How can I get Tor to fully
|
||||
make use of my high capacity connection?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
See <a href="http://archives.seul.org/or/relays/Aug-2010/msg00034.html">this
|
||||
tor-relays thread</a>.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="RelayFlexible"></a>
|
||||
<h3><a class="anchor" href="#RelayFlexible">How stable does my relay
|
||||
need to be?</a></h3>
|
||||
@ -2330,7 +2330,7 @@ too.
|
||||
</ul>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="BandwidthShaping"></a>
|
||||
<h3><a class="anchor" href="#BandwidthShaping">What bandwidth shaping
|
||||
options are available to Tor relays?</a></h3>
|
||||
@ -2599,29 +2599,29 @@ users
|
||||
<hr>
|
||||
|
||||
<a id="PackagedTor"></a>
|
||||
<h3><a class="anchor" href="#PackagedTor">Should I install Tor from my
|
||||
<h3><a class="anchor" href="#PackagedTor">Should I install Tor from my
|
||||
package manager, or build from source?</a></h3>
|
||||
<p>
|
||||
If you're using Debian or Ubuntu especially, there are a number of benefits
|
||||
to installing Tor from the <a
|
||||
href="https://www.torproject.org/docs/debian.html.en">Tor Project's
|
||||
repository</a>.
|
||||
If you're using Debian or Ubuntu especially, there are a number of benefits
|
||||
to installing Tor from the <a
|
||||
href="https://www.torproject.org/docs/debian.html.en">Tor Project's
|
||||
repository</a>.
|
||||
</p>
|
||||
<ul>
|
||||
<li>
|
||||
You're ulimit -n gets set to 32768, high enough for Tor to keep open all
|
||||
the connections it needs.
|
||||
You're ulimit -n gets set to 32768, high enough for Tor to keep open all
|
||||
the connections it needs.
|
||||
</li>
|
||||
<li>
|
||||
A user profile is created just for Tor, so Tor doesn't need to run as
|
||||
A user profile is created just for Tor, so Tor doesn't need to run as
|
||||
root.
|
||||
</li>
|
||||
<li>
|
||||
An init script is included so that Tor runs at boot.
|
||||
</li>
|
||||
<li>
|
||||
Tor runs with --verify-config, so that most problems with your
|
||||
config file get caught.
|
||||
Tor runs with --verify-config, so that most problems with your
|
||||
config file get caught.
|
||||
</li>
|
||||
<li>
|
||||
Tor can bind to low level ports, then drop privileges.
|
||||
@ -2666,7 +2666,7 @@ users
|
||||
of the Guards: A Framework for Understanding and Improving Entry Guard
|
||||
Selection in Tor</a>.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="TorClientOnADifferentComputerThanMyApplications"></a>
|
||||
@ -3257,7 +3257,7 @@ diversity,
|
||||
<a id="AccessHiddenServices"></a>
|
||||
<h3><a class="anchor" href="#AccessHiddenServices">How do I access
|
||||
hidden services?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Tor hidden services are named with a special top-level domain (TLD)
|
||||
name in DNS: .onion. Since the .onion TLD is not recognized by the
|
||||
@ -3272,7 +3272,7 @@ diversity,
|
||||
Tor directly. You can't try to resolve it to an IP address, since there
|
||||
<i>is</i> no corresponding IP address: the server is hidden, after all!
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
So, how do you make your application pass the hostname directly to Tor?
|
||||
You can't use SOCKS 4, since SOCKS 4 proxies require an IP from the
|
||||
@ -3282,7 +3282,7 @@ diversity,
|
||||
SOCKS proxy. SOCKS 4a, however, always accepts a hostname: You'll need
|
||||
to use SOCKS 4a.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Some applications, such as the browsers Mozilla Firefox and Apple's
|
||||
Safari, support sending DNS queries to Tor's SOCKS 5 proxy. Most web
|
||||
@ -3290,7 +3290,7 @@ diversity,
|
||||
to point your web browser at an HTTP proxy, and tell the HTTP proxy
|
||||
to speak to Tor with SOCKS 4a. We recommend Polipo as your HTTP proxy.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
For applications that do not support HTTP proxy, and so cannot use
|
||||
Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an
|
||||
@ -3299,24 +3299,24 @@ diversity,
|
||||
will allow you to use almost any program with Tor without leaking DNS
|
||||
lookups and allow those same programs to access hidden services.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
See also the <a href="#SocksAndDNS">question on DNS</a>.
|
||||
</p>
|
||||
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="ProvideAHiddenService"></a>
|
||||
<h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a
|
||||
hidden service?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
See the <a href="<page docs/tor-hidden-service>">
|
||||
official hidden service configuration instructions</a>.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="Development"></a>
|
||||
<h2><a class="anchor">Development:</a></h2>
|
||||
|
||||
@ -3357,7 +3357,7 @@ diversity,
|
||||
<a id="PrivateTorNetwork"></a>
|
||||
<h3><a class="anchor" href="#PrivateTorNetwork">How do I set up my
|
||||
own private Tor network?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
If you want to experiment locally with your own network, or you're
|
||||
cut off from the Internet and want to be able to mess with Tor still,
|
||||
@ -3436,7 +3436,7 @@ diversity,
|
||||
|
||||
<a id="WhatIsLibevent"></a>
|
||||
<h3><a class="anchor" href="#WhatIsLibevent">What is Libevent?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
When you want to deal with a bunch of net connections at once, you
|
||||
have a few options:
|
||||
@ -3479,7 +3479,7 @@ diversity,
|
||||
<a id="MyNewFeature"></a>
|
||||
<h3><a class="anchor" href="#MyNewFeature">What do I need to do to get
|
||||
a new feature into Tor?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
For a new feature to go into Tor, it needs to be designed (explain what
|
||||
you think Tor should do), argued to be secure (explain why it's better
|
||||
@ -3502,7 +3502,7 @@ diversity,
|
||||
<a id="WhatProtectionsDoesTorProvide"></a>
|
||||
<h3><a class="anchor" href="#WhatProtectionsDoesTorProvide">What
|
||||
protections does Tor provide?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Internet communication is based on a store-and-forward model that
|
||||
can be understood in analogy to postal mail: Data is transmitted in
|
||||
@ -3518,7 +3518,7 @@ diversity,
|
||||
server in the Internet that can see any of the packets can profile your
|
||||
behaviour.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
The aim of Tor is to improve your privacy by sending your traffic through
|
||||
a series of proxies. Your communication is encrypted in multiple layers
|
||||
@ -3529,11 +3529,11 @@ diversity,
|
||||
communicating with Tor nodes. Similarly, servers in the Internet just
|
||||
see that they are being contacted by Tor nodes.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Generally speaking, Tor aims to solve three privacy problems:
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
First, Tor prevents websites and other services from learning
|
||||
your location, which they can use to build databases about your
|
||||
@ -3541,13 +3541,13 @@ diversity,
|
||||
give you away by default -- now you can have the ability to choose,
|
||||
for each connection, how much information to reveal.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Second, Tor prevents people watching your traffic locally (such as
|
||||
your ISP) from learning what information you're fetching and where
|
||||
you're fetching it from. It also stops them from deciding what you're
|
||||
allowed to learn and publish -- if you can get to any part of the Tor
|
||||
network, you can reach any site on the Internet.
|
||||
network, you can reach any site on the Internet.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
@ -3557,26 +3557,26 @@ diversity,
|
||||
provides more security than the old <a href="#Torisdifferent">one hop proxy
|
||||
</a> approach.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Note, however, that there are situations where Tor fails to solve these
|
||||
privacy problems entirely: see the entry below on <a
|
||||
href="#AttacksOnOnionRouting">remaining attacks</a>.
|
||||
href="#AttacksOnOnionRouting">remaining attacks</a>.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="CanExitNodesEavesdrop"></a>
|
||||
<h3><a class="anchor" href="#CanExitNodesEavesdrop">Can exit nodes eavesdrop
|
||||
on communications? Isn't that bad?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Yes, the guy running the exit node can read the bytes that come in and
|
||||
out there. Tor anonymizes the origin of your traffic, and it makes sure
|
||||
to encrypt everything inside the Tor network, but it does not magically
|
||||
encrypt all traffic throughout the Internet.
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
This is why you should always use end-to-end encryption such as SSL for
|
||||
sensitive Internet connections. (The corollary to this answer is that if
|
||||
@ -3584,7 +3584,7 @@ diversity,
|
||||
*not* using end-to-end encryption at the application layer, then something
|
||||
has already gone wrong and you shouldn't be thinking that Tor is the problem.)
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
Tor does provide a partial solution in a very specific situation, though.
|
||||
When you make a connection to a destination that also runs a Tor relay,
|
||||
@ -3602,9 +3602,9 @@ diversity,
|
||||
does the Tor client learn which relays are associated with which
|
||||
websites in a decentralized yet non-gamable way?").
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="AmITotallyAnonymous"></a>
|
||||
<h3><a class="anchor" href="#AmITotallyAnonymous">So I'm totally anonymous
|
||||
if I use Tor?</a></h3>
|
||||
@ -3729,7 +3729,7 @@ diversity,
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
<a id="KeyManagement"></a>
|
||||
<h3><a class="anchor" href="#KeyManagement">Tell me about all the
|
||||
keys Tor uses.</a></h3>
|
||||
@ -3995,10 +3995,10 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
|
||||
|
||||
<a id="IsTorLikeAVPN"></a>
|
||||
<h3><a class="anchor" href="#IsTorLikeAVPN">Is Tor like a VPN?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
<b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b>
|
||||
If you're looking for a trusted entry into the Tor network, or if you want
|
||||
<b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b>
|
||||
If you're looking for a trusted entry into the Tor network, or if you want
|
||||
to obscure the fact that you're using Tor, <a
|
||||
href="https://www.torproject.org/docs/bridges#RunningABridge">setting up
|
||||
a private server as a bridge</a> works quite well.
|
||||
@ -4044,7 +4044,7 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
|
||||
<a id="Proxychains"></a>
|
||||
<h3><a class="anchor" href="#Proxychains">Aren't 10 proxies
|
||||
(proxychains) better than Tor with only 3 hops?</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Proxychains is a program that sends your traffic through a series of
|
||||
open web proxies that you supply before sending it on to your final
|
||||
@ -4066,9 +4066,9 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
|
||||
engine are compromised machines, misconfigured private proxies
|
||||
not intended for public use, or honeypots set up to exploit users.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
|
||||
<a id="AttacksOnOnionRouting"></a>
|
||||
<h3><a class="anchor" href="#AttacksOnOnionRouting">What attacks remain
|
||||
@ -4516,7 +4516,7 @@ only solution is to have no opinion.
|
||||
<a id="SendPadding"></a>
|
||||
<h3><a class="anchor" href="#SendPadding">You should send padding so it's
|
||||
more secure.</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Like all anonymous communication networks that are fast enough for web
|
||||
browsing, Tor is vulnerable to statistical "traffic confirmation"
|
||||
@ -4525,7 +4525,7 @@ only solution is to have no opinion.
|
||||
nice if we could use cover traffic to confuse this attack. But there
|
||||
are three problems here:
|
||||
</p>
|
||||
|
||||
|
||||
<ul>
|
||||
<li>
|
||||
Cover traffic is really expensive. And *every* user needs to be doing
|
||||
@ -4548,26 +4548,26 @@ only solution is to have no opinion.
|
||||
patterns later in the path.
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
|
||||
<p>
|
||||
In short, for a system like Tor that aims to be fast, we don't see any
|
||||
use for padding, and it would definitely be a serious usability problem.
|
||||
We hope that one day somebody will prove us wrong, but we are not
|
||||
optimistic.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="Steganography"></a>
|
||||
<h3><a class="anchor" href="#Steganography">You should use steganography to hide Tor
|
||||
traffic.</a></h3>
|
||||
|
||||
|
||||
<p>
|
||||
Many people suggest that we should use steganography to make it hard
|
||||
to notice Tor connections on the Internet. There are a few problems
|
||||
with this idea though:
|
||||
</p>
|
||||
|
||||
|
||||
<p>
|
||||
First, in the current network topology, the Tor relays list <a
|
||||
href="#HideExits">is public</a> and can be accessed by attackers.
|
||||
@ -4575,7 +4575,7 @@ only solution is to have no opinion.
|
||||
always just notice <b>any connection</b> to or from a Tor relay's
|
||||
IP address.
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="Abuse"></a>
|
||||
|
Loading…
x
Reference in New Issue
Block a user