diff --git a/download/en/download-unix.wml b/download/en/download-unix.wml index 441ad721..f988201b 100644 --- a/download/en/download-unix.wml +++ b/download/en/download-unix.wml @@ -4,27 +4,27 @@ #include "head.wmi" TITLE="Tor: Download for Linux/Unix" CHARSET="UTF-8" ANNOUNCE_RSS="yes" -
+
+ +
+

Download Tor for Unix, Linux, BSD

-

Available Linux/Unix Packages

-
- -Warning: Want Tor to really work? ...then please don't just install it -and go on. You need to change some of your habits, and reconfigure your -software! Tor by itself is NOT all you need to maintain your anonymity. -Please take time to read the warning to familiarize yourself with the pitfalls and limits of Tor. -
- -
- - + +
+

Want Tor to really work?

+

...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. Read the full list of warnings. +

+
+ +
- - - - - + + + + + + @@ -33,7 +33,7 @@ Please take time to read the warning to familiarize yours - + @@ -49,7 +49,7 @@ Please take time to read the warning to familiarize yours - + @@ -62,18 +62,18 @@ Please take time to read the warning to familiarize yours - + - +
PlatformDownload StableDownload UnstableInstallation and Configuration
PlatformDownload StableDownload UnstableInstallation and Configuration
Debian Ubuntu Knoppix Linux/BSD/Unix
CentOS Fedora openSUSE 11 CentOS, Fedora, OpenSUSE repository packages
FreeBSD FreeBSD portinstall -s security/torcd /usr/ports/net/tor && make && make install Linux/BSD/Unix
-Guide to chrooting Tor in OpenBSD +Guide to chrooting Tor in OpenBSD
NetBSD NetBSD cd /usr/pkgsrc/net/tor && make install Linux/BSD/Unix
Source code Source tarballs @@ -89,7 +89,6 @@ Please take time to read the warning to familiarize yours
-

What's the difference between Stable & Unstable?

@@ -140,106 +139,12 @@ the list's RSS feed.
-
-
- -

Warning: Want Tor to really -work?

- -

-...then please don't just install it and go on. You need to change -some of your habits, and reconfigure your software! -Tor by itself is NOT all you need to maintain your anonymity. -There are several major pitfalls to watch out for: -

- -
    -
  1. -Tor only protects Internet applications that are configured to -send their traffic through Tor — it doesn't magically anonymize -all your traffic just because you install it. We recommend you -use Firefox with the Torbutton extension. -
  2. - -
  3. -Browser plugins such as Java, Flash, ActiveX, RealPlayer, -Quicktime, Adobe's PDF plugin, and others can be manipulated -into revealing your IP address. You should probably -uninstall your -plugins -(go to "about:plugins" to see what is installed), or investigate QuickJava, FlashBlock, and -NoScript -if you really need them. Consider removing extensions that look up -more information about the websites you type in (like Google toolbar), -as they may bypass Tor and/or broadcast sensitive information. Some -people prefer using two browsers (one for Tor, one for unsafe browsing). -
  4. - -
  5. -Beware of cookies: if you ever browse without Tor -and a site gives you a cookie, that cookie could identify you even when -you start using Tor again. You should clear your cookies frequently. CookieCuller can help -protect any cookies you do not want to lose. -
  6. - -
  7. -Tor anonymizes the origin of your traffic, -and it encrypts everything inside the Tor network, but it -can't encrypt your traffic between the Tor network and its final -destination. -If you are communicating sensitive information, you should use as much -care as you would on the normal scary Internet — use HTTPS or other -end-to-end encryption and authentication. -
  8. - -
  9. -While Tor blocks attackers -on your local network from discovering or influencing your destination, -it opens new risks: malicious or misconfigured Tor exit nodes can send -you the wrong page, or even send you embedded Java applets disguised as -domains you trust. -
  10. -
- -
-

-Be smart and learn more. Understand what Tor does and does not offer. -This list of pitfalls isn't complete, and we need your -help identifying and documenting -all the issues. -

-
- -
-
-

-See our instructions -on verifying package signatures, which allows -you to make sure you've downloaded the file we intended you to get. -

-

If you would like to research any past release of Tor source, packages, or other binaries, see the archive.

-

-See the developer -documentation for instructions on fetching Tor from Git to get -the very latest development version source code. -You can also download the Polipo source or Vidalia source. -

-
- -

If you have trouble downloading Tor from this site, here is a ChangeLog.

-
+
+ +
+
+
+

Verify Signatures

+

Verify your downloads with our PGP signatures:

+ Read how to +verify the signatures. +
+
+ + + +
+ +
+ + #include