Commit 5ecab407 authored by emmapeel's avatar emmapeel 🤖
Browse files

make internal links relative, remove trailing links, rename according to

slug
parent 82509e58
......@@ -27,7 +27,7 @@ The Tor software comes with a built-in list of location and public key for each
So the only way to trick users into using a fake Tor network is to give them a specially modified version of the software.
How do users know they've got the right software?
When we distribute the source code or a package, we digitally sign it with [GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to check Tor Browser's signature](https://support.torproject.org/tbb/how-to-verify-signature/).
When we distribute the source code or a package, we digitally sign it with [GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to check Tor Browser's signature](../../tbb/how-to-verify-signature/).
In order to be certain that it's really signed by us, you need to have met us in person and gotten a copy of our GPG key fingerprint, or you need to know somebody who has.
If you're concerned about an attack on this level, we recommend you get involved with the security community and start meeting people.
......
......@@ -11,7 +11,7 @@ In addition, every server in the Internet that can see any of the packets can pr
The aim of Tor is to improve your privacy by sending your traffic through a series of proxies.
Your communication is encrypted in multiple layers and routed via multiple hops through the Tor network to the final receiver.
More details on this process can be found in this [visualization](https://support.torproject.org/https/https-1/).
More details on this process can be found in this [visualization](../../https/https-1/).
Note that all your local ISP can observe now is that you are communicating with Tor nodes.
Similarly, servers in the Internet just see that they are being contacted by Tor nodes.
......@@ -24,9 +24,9 @@ Second, Tor prevents people watching your traffic locally (such as your ISP or s
It also stops them from deciding what you're allowed to learn and publish -- if you can get to any part of the Tor network, you can reach any site on the Internet.
Third, Tor routes your connection through more than one Tor relay so no single relay can learn what you're up to.
Because these relays are run by different individuals or organizations, distributing trust provides more security than the old [one hop proxy](https://support.torproject.org/about/#how-is-tor-different-from-other-proxies) approach.
Because these relays are run by different individuals or organizations, distributing trust provides more security than the old [one hop proxy](../how-is-tor-different-from-other-proxies/) approach.
Note, however, that there are situations where Tor fails to solve these privacy problems entirely: see the entry below on [remaining attacks](https://support.torproject.org/about/#attacks-on-onion-routing).
Note, however, that there are situations where Tor fails to solve these privacy problems entirely: see the entry below on [remaining attacks](../attacks-on-onion-routing/).
---
seo_slug: protections
---
......
......@@ -8,7 +8,7 @@ description:
There is nothing the Tor developers can do to trace Tor users.
The same protections that keep bad people from breaking Tor's anonymity also prevent us from figuring out what's going on.
Some fans have suggested that we redesign Tor to include a [backdoor](https://support.torproject.org/about/backdoor).
Some fans have suggested that we redesign Tor to include a [backdoor](../../about/backdoor/).
There are two problems with this idea.
First, it technically weakens the system too far.
Having a central way to link users to their activities is a gaping hole for all sorts of attackers; and the policy mechanisms needed to ensure correct handling of this responsibility are enormous and unsolved.
......
......@@ -24,4 +24,4 @@ You can select Snowflake from Tor Browser's [built-in bridge dropdown](/censorsh
1. **Private and unlisted obfs4 bridges:** users will need to request a private bridge to [frontdesk@torproject.org](mailto:frontdesk@torproject.org) with the phrase "private bridge" in the subject of the email or, if they are tech-savvy, they can run their own [obfs4 bridge](https://community.torproject.org/relay/setup/bridge/) from outside China.
It's important to note that bridges distributed by BridgeDB ([HTTPS](https://bridges.torproject.org), email), and built-in obfs4 bridges bundled in Tor Browser most likely won't work.
If one of these options below is not working, check your [Tor logs](https://support.torproject.org/connecting/connecting-2/) and try another option.
If one of these options below is not working, check your [Tor logs](../../connecting/connecting-2/) and try another option.
......@@ -14,5 +14,5 @@ If you're running Tor Browser for desktop for the first time, you can click on '
Click on 'Select a built-in bridge' and choose 'snowflake' from the dropdown menu.
Once you've selected Snowflake, scroll up and click 'Connect' to save your settings.
From within the browser, you can click on the [hamburger menu](https://support.torproject.org/glossary/hamburger-menu/), then go to 'Preferences' and go to 'Tor'.
From within the browser, you can click on the [hamburger menu ("≡")](../../glossary/hamburger-menu/), then go to 'Preferences' and go to 'Tor'.
Alternatively, you can also type `about:preferences#tor` in the url bar. Check 'Use a bridge' and 'Select a built-in bridge'. Then select 'snowflake' from the dropdown menu.
_model: question
_model: question
---
title: "Proxy server is refusing connection" error
---
seo_slug: tor-proxy-server-refusing-connection
---
description:
Proxy server errors can occur for a variety of reasons.
description:
Proxy server errors can occur for a variety of reasons.
You may try one or more of the following activities in case you encounter this error:
* If you have an antivirus, it may be interfering with the Tor service. Disable the antivirus and restart the browser.
* You should not have moved the Tor Browser folder from its original location to a different location.
If you did this, revert the change.
* You should not have moved the Tor Browser folder from its original location to a different location.
If you did this, revert the change.
* You should also check the port that you are connecting with. Try a different port from the one currently in use, such as 9050 or 9150.
* When all else fails, reinstall the browser. This time, make sure to install Tor Browser in a new directory, not over a previously installed browser.
If the error persists, please [get in touch](https://support.torproject.org/misc/bug-or-feedback/) with us.
If the error persists, please [get in touch](../../misc/bug-or-feedback/) with us.
......@@ -8,7 +8,7 @@ Even if your application is using the correct variant of the SOCKS protocol, the
This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc.
If you suspect your application might behave like this, follow the instructions below to check.
1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb/tbb-editing-torrc/).
1. Add `TestSocks 1` to your [torrc file](../../tbb/tbb-editing-torrc/).
1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (`socks5://127.0.0.1:9050` by default).
1. Watch your logs as you use your application. For each socks connection, Tor will log a `notice` for safe connections, and a `warn` for connections leaking DNS requests.
......
......@@ -3,6 +3,6 @@ title: Can I run a Tor relay using a dynamic IP address?
description:
Tor can handle relays with dynamic IP addresses just fine.
Just leave the "Address" line in your [torrc](https://support.torproject.org/tbb/tbb-editing-torrc/) blank, and Tor will guess.
Just leave the "Address" line in your [torrc](../../tbb/tbb-editing-torrc/) blank, and Tor will guess.
---
seo_slug: relay-with-dynamic-ip
......@@ -9,7 +9,7 @@ Great. That's exactly why we implemented exit policies.
Each Tor relay has an exit policy that specifies what sort of outbound connections are allowed or refused from that relay.
The exit policies are propagated to Tor clients via the directory, so clients will automatically avoid picking exit relays that would refuse to exit to their intended destination.
This way each relay can decide the services, hosts, and networks it wants to allow connections to, based on abuse potential and its own situation.
Read the [Support entry on issues you might encounter](https://support.torproject.org/abuse/exit-relay-expectations/) if you use the default exit policy, and then read Mike Perry's [tips for running an exit node with minimal harassment](https://blog.torproject.org/blog/tips-running-exit-node).
Read the [Support entry on issues you might encounter](../../abuse/exit-relay-expectations/) if you use the default exit policy, and then read Mike Perry's [tips for running an exit node with minimal harassment](https://blog.torproject.org/blog/tips-running-exit-node).
The default exit policy allows access to many popular services (e.g. web browsing), but restricts some due to abuse potential (e.g. mail) and some since the Tor network can't handle the load (e.g. default file-sharing ports).
You can change your exit policy by editing your torrc file.
......
......@@ -3,7 +3,7 @@ _model: question
title: Can I use IPv6 on my relay?
---
description:
Tor [has partial support for IPv6](https://blog.torproject.org/state-of-ipv6-support-tor-network) and we encourage every relay operator to [enable IPv6 functionality](https://community.torproject.org/relay/setup/post-install/) in their [torrc](https://support.torproject.org/tbb/tbb-editing-torrc/) configuration files when IPv6 connectivity is available.
Tor [has partial support for IPv6](https://blog.torproject.org/state-of-ipv6-support-tor-network) and we encourage every relay operator to [enable IPv6 functionality](https://community.torproject.org/relay/setup/post-install/) in their [torrc](../../tbb/tbb-editing-torrc/) configuration files when IPv6 connectivity is available.
For the time being Tor will require IPv4 addresses on relays, you can not run a Tor relay on a host with IPv6 addresses only.
---
seo_slug: ipv6-relay
......@@ -4,7 +4,7 @@ title: Should I install Tor from my package manager, or build from source?
---
description:
If you're using Debian or Ubuntu especially, there are a number of benefits to installing Tor from the [Tor Project's repository](https://support.torproject.org/apt/tor-deb-repo/).
If you're using Debian or Ubuntu especially, there are a number of benefits to installing Tor from the [Tor Project's repository](../../apt/tor-deb-repo/).
* Your `ulimit -n` gets set to 32768 high enough for Tor to keep open all the connections it needs.
* A user profile is created just for Tor, so Tor doesn't need to run as root.
......
......@@ -7,7 +7,7 @@ seo_slug: tor-browser-antivirus-false-positive
key: 30
---
description: Some antivirus software will pop up malware and/or vulnerability warnings when Tor Browser is launched.
If you downloaded Tor Browser from [our main website](https://www.torproject.org/download/) or used [GetTor](https://gettor.torproject.org/), and [verified it](https://support.torproject.org/tbb/how-to-verify-signature/), these are false positives and you have nothing to worry about.
If you downloaded Tor Browser from [our main website](https://www.torproject.org/download/) or used [GetTor](https://gettor.torproject.org/), and [verified it](../how-to-verify-signature/), these are false positives and you have nothing to worry about.
Some antiviruses consider that files that have not been seen by a lot of users as suspicious.
To make sure that the Tor program you download is the one we have created and has not been modified by some attacker, you can [verify Tor Browser's signature](https://support.torproject.org/tbb/how-to-verify-signature/).
You may also want to [permit certain processes](https://support.torproject.org/tbb/tbb-10) to prevent antiviruses from blocking access to Tor Browser.
To make sure that the Tor program you download is the one we have created and has not been modified by some attacker, you can [verify Tor Browser's signature](../how-to-verify-signature/).
You may also want to [permit certain processes](../tbb-10/) to prevent antiviruses from blocking access to Tor Browser.
......@@ -9,4 +9,4 @@ key: 20
description:
Tor Browser is built using [Firefox ESR](https://www.mozilla.org/en-US/firefox/organizations/), so errors regarding Firefox may occur.
Please be sure no other instance of Tor Browser is already running, and that you have extracted Tor Browser in a location that your user has the correct permissions for.
If you are running an anti-virus, please see [My antivirus/malware protection is blocking me from accessing Tor Browser](https://support.torproject.org/#tbb-10), it is common for anti-virus/anti-malware software to cause this type of issue.
If you are running an anti-virus, please see [My antivirus/malware protection is blocking me from accessing Tor Browser](../tbb-10/), it is common for anti-virus/anti-malware software to cause this type of issue.
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment