diff --git a/docs/en/faq.wml b/docs/en/faq.wml index 69e4568d..ad6c9a94 100644 --- a/docs/en/faq.wml +++ b/docs/en/faq.wml @@ -837,27 +837,43 @@

- Tor Browser does not install itself in the classic sense of applications. - You just simply delete the folder or directory named "Tor Browser" and it - is removed from your system. + For Tor Browser please have a look at + the uninstall section of our + Tor + Browser User Manual. + +

+ How to uninstall Tor depends on how it was installed and which operating + system you have. In any case also make sure to remove the Tor's + data directory if you want to wipe all traces.

- If this is not related to Tor Browser, uninstallation depends entirely on - how you installed it and which operating system you have. If you installed - a package, then hopefully your package has a way to uninstall itself. - The Windows packages include uninstallers. + If you installed Tor with a + package manage (the recommended way), then it should provide an easy + way to remove as well (check the manpage if you are unfamiliar with it). + If you also want to remove traces of Tor, follow the link above to find + Tor's data directory and check that the package manager does not accumulate + logs (usually they do) exposing the former existence of Tor on this system + (for example in /var/log/dpkg.log on Debian based systems). + Tor itself does not create logs by default.

- For Mac OS X, follow the - uninstall directions. + If you installed it from source, there is no easy uninstall method, but you + are on the bright side: By default it only creates files in + /usr/local/ and it should be pretty easy to notice things + there.

- If you installed by source, I'm afraid there is no easy uninstall method. - But on the bright side, by default it only installs into /usr/local/ and it - should be pretty easy to notice things there. + The Windows packages include uninstallers. See below if you installed Tor + as a system service for example on Windows NT. +

+ +

+ To remove Tor from Mac OS X, follow these + uninstall directions.


@@ -2750,6 +2766,7 @@ don't want to deal with abuse issues. be sure to run the service removal command (shown above) first before running the uninstaller from "Add/Remove Programs". The uninstaller is currently not capable of removing the active service. + Also see How to uninstall Tor?


diff --git a/docs/en/tor-doc-osx.wml b/docs/en/tor-doc-osx.wml index 168e7617..bdde826d 100644 --- a/docs/en/tor-doc-osx.wml +++ b/docs/en/tor-doc-osx.wml @@ -106,13 +106,17 @@

Change your application proxy settings back to their original - values. If you just want to stop using Tor, you can end at this + values. If you just want to stop using Tor, you can end at this point.

If you want to completely remove Tor, type into a Terminal window:

sudo port uninstall tor
+

Also see + How to uninstall Tor? +

+
diff --git a/include/warning.wmi b/include/warning.wmi new file mode 100644 index 00000000..0e0eb2ee --- /dev/null +++ b/include/warning.wmi @@ -0,0 +1,132 @@ +#! /usr/bin/wml +<: use strict; :> +<: use warnings; :> + +# + +
+ + +

Want Tor to really work?

+

You need to change some of your habits, as some things won't work exactly as +you are used to.

+ +
    +
  1. Use Tor Browser + +

    + +Tor does not protect all of your computer's Internet traffic when you +run it. Tor only protects your applications that are properly configured to +send their Internet traffic through Tor. To avoid problems with Tor +configuration, we strongly recommend you use the +Tor Browser. It is pre-configured to protect +your privacy and anonymity on the web as long as you're browsing with Tor +Browser itself. Almost any other web browser configuration is likely to be +unsafe to use with Tor. + +

    + +
  2. + +
  3. Don't torrent over Tor +

    +Torrent file-sharing applications have been observed to ignore proxy +settings and make direct connections even when they are told to use Tor. +Even if your torrent application connects only through Tor, you will +often send out your real IP address in the tracker GET request, +because that's how torrents work. Not only do you +deanonymize your torrent traffic and your other simultaneous Tor web +traffic this way, you also slow down the entire Tor network for everyone else. +

    +
  4. + +
  5. Don't enable or install browser plugins + +

    + +Tor Browser will block browser plugins such as Flash, RealPlayer, +Quicktime, and others: they can be manipulated into revealing your IP address. +Similarly, we do not recommend installing additional addons or plugins into +Tor Browser, as these may bypass Tor or otherwise harm your anonymity and +privacy. + +

    + +
  6. + +
  7. Use HTTPS versions of websites + +

    + +Tor will encrypt your traffic +to and +within the Tor network, but the encryption of your traffic to the final +destination website depends upon on that website. To help ensure private +encryption to websites, Tor Browser includes HTTPS Everywhere to force the +use of HTTPS encryption with major websites that support it. However, you +should still watch the browser URL bar to ensure that websites you provide +sensitive information to display a +blue or +green URL bar button, include https:// in the URL, and display the +proper expected name for the website. Also see EFF's interactive page +explaining how Tor +and HTTPS relate. + +

    + +
  8. + +
  9. Don't open documents downloaded through Tor while online + +

    + +Tor Browser will warn you before automatically opening documents that are +handled by external applications. DO NOT IGNORE THIS WARNING. You +should be very careful when downloading documents via Tor (especially DOC and +PDF files, unless you use the PDF viewer that's built into Tor Browser) as +these documents can contain Internet resources that will be downloaded outside +of Tor by the application that opens them. This will reveal your non-Tor IP +address. If you must work with DOC and/or PDF files, we strongly recommend +either using a disconnected computer, +downloading the free VirtualBox and +using it with a virtual machine image +with networking disabled, or using Tails. +Under no circumstances is it safe to use +BitTorrent +and Tor together, however. + +

    + +
  10. + +
  11. Use bridges and/or find company + +

    + +Tor tries to prevent attackers from learning what destination websites you +connect to. However, by default, it does not prevent somebody watching your Internet +traffic from learning that you're using Tor. If this matters to you, you can +reduce this risk by configuring Tor to use a +Pluggable Transport rather than connecting directly to the public Tor network. +Ultimately the best protection is a social approach: the more Tor +users there are near you and the more +diverse their interests, the less +dangerous it will be that you are one of them. Convince other people to use +Tor, too! + +

    + +
  12. + +
+
+

+Be smart and learn more. Understand what Tor does and does not offer. +This list of pitfalls isn't complete, and we need your +help identifying and documenting +all the issues. +

+