Commit 9e66690c authored by emmapeel's avatar emmapeel 🤖
Browse files

user relative links to maintain consistency across strings

parent 8f897782
......@@ -20,7 +20,7 @@ But that said, there are still plenty of subtle attacks people might try.
Somebody might impersonate us, or break into our computers, or something like that.
Tor is open source, and you should always check the source (or at least the diffs since the last release) for suspicious things.
If we (or the distributors that gave you Tor) don't give you access to the source code, that's a sure sign something funny might be going on.
You should also check the [PGP signatures](/tbb/how-to-verify-signature/) on the releases, to make sure nobody messed with the distribution sites.
You should also check the [PGP signatures](../../tbb/how-to-verify-signature/) on the releases, to make sure nobody messed with the distribution sites.
Also, there might be accidental bugs in Tor that could affect your anonymity.
We periodically find and fix anonymity-related bugs, so make sure you keep your Tor versions up-to-date.
......
......@@ -11,6 +11,6 @@ Our wiki has a community-maintained list of instructions for [Torifying specific
Please add to this list and help us keep it accurate!
Most people use Tor Browser, which includes everything you need to browse the web safely using Tor.
Using Tor with other browsers is [dangerous and not recommended](/tbb/tbb-9/).
Using Tor with other browsers is [dangerous and not recommended](../../tbb/tbb-9/).
---
_slug: can-i-use-tor-with
......@@ -39,6 +39,6 @@ Possibly.
A bad third of three servers can see the traffic you sent into Tor.
It won't know who sent this traffic.
If you're using encryption (like HTTPS), it will only know the destination.
See this visualization of [Tor and HTTPS](/https/https-1/) to understand how Tor and HTTPS interact.
See this visualization of [Tor and HTTPS](../../https/https-1/) to understand how Tor and HTTPS interact.
---
_slug: how-is-tor-different-from-other-proxies
......@@ -25,7 +25,7 @@ You need to decide whether banning the Tor network is worth losing the contribut
At this point, you should also ask yourself what you do about other services that aggregate many users behind a few IP addresses.
Tor is not so different from AOL in this respect.
Lastly, please remember that Tor relays have [individual exit policies](/relay-operators/exit-policies/).
Lastly, please remember that Tor relays have [individual exit policies](../../relay-operators/exit-policies/).
Many Tor relays do not allow exiting connections at all.
Many of those that do allow some exit connections might already disallow connections to your service.
When you go about banning nodes, you should parse the exit policies and only block the ones that allow these connections; and you should keep in mind that exit policies can change (as well as the overall list of nodes in the network).
......
......@@ -18,9 +18,9 @@ There are three options to unblock Tor in China:
1. **meek-azure:** it looks like you are browsing a Microsoft website instead of using Tor.
However, because it has a bandwidth limitation, this option will be quite slow.
You can select meek-azure from Tor Browser's built-in bridges dropdown.
1. **[Snowflake](/censorship/what-is-snowflake/):** uses ephemeral proxies to connect to the Tor network.
1. **[Snowflake](../what-is-snowflake/):** uses ephemeral proxies to connect to the Tor network.
It's available in Tor Browser stable version (Desktop and Android).
You can select Snowflake from Tor Browser's [built-in bridge dropdown](/censorship/how-can-i-use-snowflake/).
You can select Snowflake from Tor Browser's [built-in bridge dropdown](../how-can-i-use-snowflake/).
1. **Private and unlisted obfs4 bridges:** users will need to request a private bridge to [frontdesk@torproject.org](mailto:frontdesk@torproject.org) with the phrase "private bridge" in the subject of the email or, if they are tech-savvy, they can run their own [obfs4 bridge](https://community.torproject.org/relay/setup/bridge/) from outside China.
It's important to note that bridges distributed by BridgeDB ([HTTPS](https://bridges.torproject.org), email), and built-in obfs4 bridges bundled in Tor Browser most likely won't work.
......
......@@ -20,8 +20,8 @@ Web browsing:
File sharing:
- Safe: [OnionShare](/misc/misc-12)
- Unsafe: [BitTorrent over Tor](/misc/misc-4)
- Safe: [OnionShare](../../misc/misc-12/)
- Unsafe: [BitTorrent over Tor](../../misc/misc-4/)
### Control what information you provide through web forms
......@@ -41,14 +41,14 @@ Not only do you [deanonymize your torrent traffic and your other simultaneous To
### Don't enable or install browser plugins
Tor Browser will block browser plugins such as Flash, RealPlayer, Quicktime, and others: they can be manipulated into revealing your IP address.
Similarly, we do not recommend [installing additional addons or plugins](/tbb/tbb-14) into Tor Browser, as these may bypass Tor or otherwise harm your anonymity and privacy.
Similarly, we do not recommend [installing additional addons or plugins](../../tbb/tbb-14/) into Tor Browser, as these may bypass Tor or otherwise harm your anonymity and privacy.
### Use HTTPS versions of websites
Tor will encrypt your traffic to and within the Tor network, but the encryption of your traffic to the final destination website depends on that website.
To help ensure private encryption to websites, Tor Browser includes [HTTPS Everywhere](https://www.eff.org/https-everywhere) to force the use of HTTPS encryption with major websites that support it.
However, you should still watch the browser URL bar to ensure that websites you provide sensitive information to display a [padlock](https://support.mozilla.org/en-US/kb/how-do-i-tell-if-my-connection-is-secure) or [onion icon](/onionservices/onionservices-5) in the address bar, include **https://** in the URL, and display the proper expected name for the website.
Also see EFF's interactive graphic explaining [how Tor and HTTPS relate](/https/https-1).
However, you should still watch the browser URL bar to ensure that websites you provide sensitive information to display a [padlock](https://support.mozilla.org/en-US/kb/how-do-i-tell-if-my-connection-is-secure) or [onion icon](../../onionservices/onionservices-5/) in the address bar, include **https://** in the URL, and display the proper expected name for the website.
Also see EFF's interactive graphic explaining [how Tor and HTTPS relate](../../https/https-1/).
### Don't open documents downloaded through Tor while online
......
......@@ -5,8 +5,8 @@ term: cryptographic signature
definition:
A cryptographic signature proves the authenticity of a message or file. It is created by the holder of the private portion of a [public key cryptography](../public-key-cryptography) key pair and can be verified by the corresponding public key. If you download software from torproject.org, you will find it as signature files (.asc). These are PGP signatures, so you can verify that the file you have downloaded is exactly the one that we intended you to get.
For more information, see [how you can verify signatures](/tbb/how-to-verify-signature/).
For more information, see [how you can verify signatures](../../tbb/how-to-verify-signature/).
---
translation:
translation:
---
spelling:
spelling:
......@@ -11,7 +11,7 @@ _slug: verify-little-t-tor
description:
**Attention: These instructions are to verify the tor source code.**
**Please follow the right instructions to verify [Tor Browser's signature](/tbb/how-to-verify-signature/).**
**Please follow the right instructions to verify [Tor Browser's signature](../../tbb/how-to-verify-signature/).**
Digital signature is a process ensuring that a certain package was generated by its developers and has not been tampered with.
Below we explain why it is important and how to verify that the [tor source code](https://www.torproject.org/download/tor/) you download is the one we have created and has not been modified by some attacker.
......
......@@ -10,7 +10,7 @@ description:
No, Tor Browser is an open source software and it is free.
Any browser forcing you to pay and is claiming to be Tor Browser is fake.
To make sure you are downloading the right Tor Browser visit our [download page](https://www.torproject.org/download/).
After downloading, you can make sure that you have the official version of Tor Browser by [verifying the signature](/tbb/how-to-verify-signature/).
If you are not able to access our website, then visit [censorship section](/censorship/gettor-1) to get information about alternate way of downloading Tor Browser.
After downloading, you can make sure that you have the official version of Tor Browser by [verifying the signature](../how-to-verify-signature/).
If you are not able to access our website, then visit [censorship section](../../censorship/gettor-1/) to get information about alternate way of downloading Tor Browser.
You can report fake Tor Browsers on frontdesk@torproject.org
......@@ -9,4 +9,4 @@ key: 6
description:
Whenever we release a new stable version of Tor Browser, we write a blog post that details its new features and known issues.
If you started having issues with your Tor Browser after an update, check out [blog.torproject.org](https://blog.torproject.org) for a post on the most recent stable Tor Browser to see if your issue is listed.
If your issue is not listed there, please check first [Tor Browser's issue tracker](https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues) and create a [GitLab issue](/misc/bug-or-feedback/) about what you're experiencing.
If your issue is not listed there, please check first [Tor Browser's issue tracker](https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues) and create a [GitLab issue](../../misc/bug-or-feedback/) about what you're experiencing.
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment