|
@@ -1,32 +0,0 @@
|
|
|
-Tor protects your privacy on the internet by hiding the connection
|
|
|
-between your Internet address and the services you use. We believe Tor
|
|
|
-is reasonably secure, but please ensure you read the instructions and
|
|
|
-configure it properly.
|
|
|
-
|
|
|
-To build Tor from source:
|
|
|
- ./configure && make && make install
|
|
|
-
|
|
|
-To build Tor from a just-cloned git repository:
|
|
|
- sh autogen.sh && ./configure && make && make install
|
|
|
-
|
|
|
-Home page:
|
|
|
- https://www.torproject.org/
|
|
|
-
|
|
|
-Download new versions:
|
|
|
- https://www.torproject.org/download/download.html
|
|
|
-
|
|
|
-Documentation, including links to installation and setup instructions:
|
|
|
- https://www.torproject.org/docs/documentation.html
|
|
|
-
|
|
|
-Making applications work with Tor:
|
|
|
- https://wiki.torproject.org/projects/tor/wiki/doc/TorifyHOWTO
|
|
|
-
|
|
|
-Frequently Asked Questions:
|
|
|
- https://www.torproject.org/docs/faq.html
|
|
|
-
|
|
|
-
|
|
|
-To get started working on Tor development:
|
|
|
- See the doc/HACKING directory.
|
|
|
-
|
|
|
-Release timeline:
|
|
|
- https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/CoreTorReleases
|