|
@@ -1,7 +1,7 @@
|
|
|
Tor protects your privacy on the internet by hiding the connection
|
|
|
-between your Internet address and the services you use. We believe
|
|
|
-Tor is reasonably secure, but please ensure you read the
|
|
|
-instructions and configure it properly.
|
|
|
+between your Internet address and the services you use. We believe Tor
|
|
|
+is reasonably secure, but please ensure you read the instructions and
|
|
|
+configure it properly.
|
|
|
|
|
|
To build Tor from source:
|
|
|
./configure; make; make install
|
|
@@ -16,7 +16,8 @@ Documentation, including links to installation and setup instructions:
|
|
|
https://www.torproject.org/documentation.html
|
|
|
|
|
|
Making applications work with Tor:
|
|
|
- http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO
|
|
|
+ https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO
|
|
|
|
|
|
Frequently Asked Questions:
|
|
|
- http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ
|
|
|
+ https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ
|
|
|
+
|