Commit 414c0734 authored by cbrownstein's avatar cbrownstein

Update torproject.org links (ref: #17717)

parent a693bb32
......@@ -19,9 +19,9 @@ Networking
- the Onion Circuits graphical frontend ([[More...|doc/anonymous_internet/tor_status#circuits]])
* [NetworkManager](http://projects.gnome.org/NetworkManager/) for easy
network configuration ([[More...|doc/anonymous_internet/networkmanager]])
* [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en) ([[More...|doc/anonymous_internet/Tor_Browser]]), a web
* [Tor Browser](https://www.torproject.org/download/) ([[More...|doc/anonymous_internet/Tor_Browser]]), a web
browser based on [Mozilla Firefox](http://getfirefox.com) and modified to protect your anonymity with:
- [Torbutton](https://www.torproject.org/docs/torbutton/) for anonymity
- [Torbutton](https://2019.www.torproject.org/docs/torbutton/) for anonymity
and protection against evil JavaScript
- all cookies are treated as session cookies by default;
- [HTTPS Everywhere](https://www.eff.org/https-everywhere)
......
......@@ -62,7 +62,7 @@ For your ISP or local network administrator
- Tails **does not use the entry guards mechanism of Tor**. With the
[entry guard
mechanism](https://www.torproject.org/docs/faq#EntryGuards), a Tor
mechanism](https://2019.www.torproject.org/docs/faq#EntryGuards), a Tor
user always uses the same few relays as first hops. As Tails does not
store any Tor information between separate working sessions, it does
not store the entry guards information either. This behaviour could
......
......@@ -67,7 +67,7 @@ establishes the actual connection to the destination server. As Tor does not,
and by design cannot, encrypt the traffic between an exit node and the
destination server, **any exit node is in a position to capture any traffic
passing through it**. See [Tor FAQ: Can exit nodes eavesdrop on
communications?](https://www.torproject.org/docs/faq.html.en#CanExitNodesEavesdrop).
communications?](https://2019.www.torproject.org/docs/faq.html.en#CanExitNodesEavesdrop).
For example, in 2007, a security researcher intercepted thousands of private
email messages sent by foreign embassies and human rights groups around the
......@@ -95,7 +95,7 @@ that you are using Tor.
**The destination server that you are contacting through Tor** can know whether your
communication comes from a Tor exit node by consulting the publicly
available list of exit nodes that might contact it. For example using the [Tor
Bulk Exit List tool](https://check.torproject.org/cgi-bin/TorBulkExitList.py) from
Bulk Exit List tool](https://check.torproject.org/torbulkexitlist) from
the Tor Project.
**So using Tails doesn't make you look like any random Internet user.**
......
......@@ -2,7 +2,7 @@
[[!toc levels=2]]
<span class="application">[Tor Browser](https://www.torproject.org/projects/torbrowser.html.en)</span> is a web
<span class="application">[Tor Browser](https://www.torproject.org/download/)</span> is a web
browser based on [Mozilla Firefox](http://getfirefox.com) but configured
to protect your privacy.
......@@ -141,7 +141,7 @@ security and usability.
<p>To understand better the behavior of <span class="application">Tor
Browser</span>, for example, regarding JavaScript and cookies, you can
refer to the <a href="https://www.torproject.org/projects/torbrowser/design/">
refer to the <a href="https://2019.www.torproject.org/projects/torbrowser/design/">
<span class="application">Tor Browser</span> design document</a>.</p>
</div>
......@@ -221,7 +221,7 @@ in the context of Tails, as the connections outside of
</div>
For more details, see the [design and implementation of the Tor Browser](https://www.torproject.org/projects/torbrowser/design/#new-identity).
For more details, see the [design and implementation of the Tor Browser](https://2019.www.torproject.org/projects/torbrowser/design/#new-identity).
<a id="noscript"></a>
......
......@@ -29,7 +29,7 @@ to know that you are using Tor.
If you are in one of the situations described above
you might want to use Tor bridges in Tails. Please also read
The Tor Project's [dedicated page about
bridges](https://www.torproject.org/docs/bridges) to get a general
bridges](https://2019.www.torproject.org/docs/bridges) to get a general
idea about what bridges are.
In order to use Tor through bridges, you must know the address of at
......@@ -76,7 +76,7 @@ If using Tor is dangerous in your country
=========================================
The Tor Project's [documentation on
bridges](https://www.torproject.org/docs/bridges) mainly focuses on
bridges](https://2019.www.torproject.org/docs/bridges) mainly focuses on
censorship circumvention: when using Tor is blocked by
censorship. If using Tor is dangerous or considered suspicious in your
country, then there are some extra rules that you should follow in order
......@@ -93,7 +93,7 @@ an adversary could do to identify Tor users.
1. Always start Tails in *bridge mode*.
2. Only use [*obfuscated
bridges*](https://www.torproject.org/docs/bridges#PluggableTransports)
bridges*](https://2019.www.torproject.org/docs/bridges#PluggableTransports)
since they are harder to identify than other bridges.
3. The less publicly known the bridges are, the better.
......
......@@ -205,7 +205,7 @@ were solved, and known issues that have already been identified.</p>
<ul>
<li>Firefox <span id="min-version-firefox">$MINVER-FIREFOX</span> and later (<a href="https://www.mozilla.org/firefox/new/">Download</a>)</li>
<li>Chrome<span id="min-version-chrome">$MINVER-CHROME</span> and later (<a href="https://www.google.com/chrome/">Download</a>)</li>
<li>Tor Browser <span id="min-version-tor-browser">$MINVER-TOR-BROWSER</span> and later (<a href="https://www.torproject.org/download/download-easy.html">Download</a>)</li>
<li>Tor Browser <span id="min-version-tor-browser">$MINVER-TOR-BROWSER</span> and later (<a href="https://www.torproject.org/download/">Download</a>)</li>
</ul>
</div>
<div class="outdated-browser">
......
......@@ -77,7 +77,7 @@ forbidden|todo/forbid_lan_dns_queries]].
Writing our [[design document|contribute/design]] made us think more
thoroughly various parts of the Tails configuration and enhance many
parts of it. Moreover, we compared it with the [Tor Browser
Bundle](https://www.torproject.org/projects/torbrowser.html.en)
Bundle](https://www.torproject.org/download/)
configuration, picked many nice ideas from there, and generally made
Tails configuration more similar to the TBB's one, which shall ease
peer review and enlarge the anonymity set Tails users are part of. A
......@@ -94,15 +94,15 @@ against a class of attacks that was recently put under the spotlights.
Tails was added to a couple spots on the Tor website:
- https://www.torproject.org/projects/projects.html.en
- https://www.torproject.org/getinvolved/volunteer.html.en#Projects
- https://2019.www.torproject.org/projects/projects.html.en
- https://2019.www.torproject.org/getinvolved/volunteer.html.en#Projects
We discussed various funding and sponsoring opportunities; we have
[prepared three
projects](https://www.torproject.org/getinvolved/volunteer.html#project-tails)
projects](https://2019.www.torproject.org/getinvolved/volunteer.html#project-tails)
that shall be submitted under the Tor Project umbrella for the Google
Summer of Code and other summer intership programs. [One of
those](https://www.torproject.org/getinvolved/volunteer.html#tailsDebianLive).
those](https://2019.www.torproject.org/getinvolved/volunteer.html#tailsDebianLive).
We have participated in the Debian Derivatives Census initiative
([[!debwiki Derivatives/Census]]): Tails now has a dedicated page
......
......@@ -26,7 +26,7 @@ release announces for details:
# Google Summer of Code
We announced two months ago we [prepared three
projects](https://www.torproject.org/getinvolved/volunteer.html#project-tails)
projects](https://2019.www.torproject.org/getinvolved/volunteer.html#project-tails)
to be submitted under the Tor Project umbrella for the Google Summer
of Code. This was a great success for our first participation into the
GSoC program, as a total of five students sent applications for our
......
......@@ -30,7 +30,7 @@ Quick links to better understand Tails
======================================
* [[About Tails|about]] for a quick overview
* [Tor overview](https://www.torproject.org/about/overview.html.en)
* [Tor overview](https://2019.www.torproject.org/about/overview.html.en)
* More details about the [[features and software|doc/about/features]] included in Tails
* Our [[design document|contribute/design]] about Tails specification, threat model and implementation
* Our [[documentation|doc]] explaining in details how to use Tails
......
......@@ -244,7 +244,7 @@ considered safe to use in this context.
<!--
XXX: Push that information to the browser documentation?
XXX: Check https://www.torproject.org/torbutton/torbutton-faq.html.en#recommendedextensions
XXX: Check https://2019.www.torproject.org/docs/torbutton/torbutton-faq.html.en#recommendedextensions
-->
<a id="add-ons_update"></a>
......@@ -421,7 +421,7 @@ administration rights but you should not do so as it might break your
anonymity.
For example, as mentioned in the <span class="application">Tor Browser</span>
[FAQ](https://www.torproject.org/docs/faq.html.en#ChooseEntryExit),
[FAQ](https://2019.www.torproject.org/docs/torbutton/torbutton-faq.html.en#recommendedextensions),
using `ExcludeExitNodes` is not recommended because "overriding the
exit nodes can mess up your anonymity in ways we don't
understand".
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment