This is very nice! Well done.
What do you think of HulaHoop’s SecBrowser name? Looks pretty catchy.
It routes all traffic through the Tor network to conceal a users and usage from anyone conducting network surveillance or traffic analysis.
Reword “users and usage” section to clarify.
Missing quotation on first paragraph, last line.
Selfrando is being deprecated. I footnoted that on the Hardening List page or Tor Browser page somewhere (the Tor bug referencing it). Also the devs opine that they don’t believe it offers much more protection, hence why it will be gone shortly.
So, I’d remove that or footnote it for posterity.
You might footnote somewhere that users could manually attempt to make a ton of about:config changes, install specific add-ons etc to try and approach Tor Browser sec level, but a) waste of time & b) unlikely to get the refined benefit of devs who know what they are doing
Security Slider bullet point
attack you security -> attack your security
Then tb-updater can be downloaded and verify in the TemplateVM. ->
Then tb-updater can be downloaded and verified in the TemplateVM.
Steps 1 to 9, there are a bunch of periods missing at the end of sentences.
keys -> key’s
If you prefer to disable this feature open tb_without_tor_settings.js in an editor as previously shown.
I would repeat the one line step to protect against user error here.
Whonix developers focus their efforts on an ->
Whonix developers focus their efforts on
- FAQs -> FAQ
(more conventional IMO)
Can is use the --clearnet switch ->
Can I use the --clearnet switch
Yes, but this could degrade security and privacy. See; Normalizing Tor Browser behavior. ->
Yes, but this could degrade security and privacy, see: Normalizing Tor Browser behavior.