Changes between Version 562 and Version 563 of doc/TorifyHOWTO


Ignore:
Timestamp:
Nov 1, 2018, 11:58:27 PM (6 weeks ago)
Author:
cypherpunks
Comment:

changed "an user" to "a user"

Legend:

Unmodified
Added
Removed
Modified
  • doc/TorifyHOWTO

    v562 v563  
    11[[TOC(depth=5)]]
    22= TorifyHOWTO - An Overview =
    3 The documents contained within this section provide information and instructions on configuring various software to securely connect to the Internet via Tor. The network is constantly evolving, and with it, the knowledge and understanding about anonymity online also evolves. As we learned more on the subject and implementation of online anonymity, we discovered it was increasingly easy for a user to leak sensitive information to those interested in obtaining it. For example: In past times, an user would simply change the internal settings of a particular piece of software to "torify" it, like Mozilla Firefox - eventually as the dangers became more clear, the Tor Browser was created. More details on fingerprinting and mitigation techniques are provided in the below sections.
     3The documents contained within this section provide information and instructions on configuring various software to securely connect to the Internet via Tor. The network is constantly evolving, and with it, the knowledge and understanding about anonymity online also evolves. As we learned more on the subject and implementation of online anonymity, we discovered it was increasingly easy for a user to leak sensitive information to those interested in obtaining it. For example: In past times, a user would simply change the internal settings of a particular piece of software to "torify" it, like Mozilla Firefox - eventually as the dangers became more clear, the Tor Browser was created. More details on fingerprinting and mitigation techniques are provided in the below sections.
    44
    55In short, '''do not torify any applications yourself unless you know exactly what you are doing'''. If, however, you wish to study the complexities surrounding the subject, then please feel free to indulge yourself and even go as far as providing new instructions or implementations. In the meantime, see this article more as a reference for developers and advanced users. If you do not fall into one of these two categories then for your own security, stick with the Tor Browser from https://www.torproject.org.