Author: arma Date: 2010-10-27 10:22:45 +0000 (Wed, 27 Oct 2010) New Revision: 23686
Modified: website/trunk/download/en/download.wml Log: replay 23239, also lost in transition Modified: website/trunk/download/en/download.wml =================================================================== --- website/trunk/download/en/download.wml 2010-10-27 10:19:37 UTC (rev 23685) +++ website/trunk/download/en/download.wml 2010-10-27 10:22:45 UTC (rev 23686) @@ -273,6 +273,18 @@ opening documents or applications you download through Tor, unless you've verified their integrity. </li> + +<li> +Tor tries to prevent attackers from learning what destinations you connect +to. It doesn't prevent somebody watching your traffic from learning that +you're using Tor. You can mitigate (but not fully resolve) the risk +by using a <a href="<page docs/bridges>">Tor bridge relay</a> rather than +connecting directly to the public Tor network, but ultimately the best +protection here is a social approach: the more Tor users there are near +you and the more <a href="<page about/torusers>">diverse</a> their interests, +the less dangerous it will be that you are one of them. +</li> + </ol> <br>
