checking my connection I noticed that tor browser showed some flaws, the message is the following: “Your browser records referers [?] and sends them. The next site was able to track from which previous site you came from. You may want to disable referer recording.”
how can I prevent this from happening by changing the parameters with about: config?
DNSSEC AND DANE
This website is protected against spoofing by DNSSEC and DANE. You may like to use a validator add-on for your webbrowser, to verify the connections integrity.
REMARK(S) ABOUT GEOLOCATION SERVICES
To reference your current IP-address to its probable geographic location, two services are used, MaxMind and WIPmania. From MaxMind the "GeoLite Country" offline database file is used and from WIPmania we use their API (?)
If those providers offer different opinions, we do our own whois based lookup to support one opinion or give a third one.
REMARK(S) ABOUT USING CONFIDENTIAL DATA ON (INSECURE) NON-HTTPS/SSL-CONNECTIONS
If you're planning to visit password protected sites on non-encrypted connections, keep in mind that some exit-nodes record the passwords and possibly use them for abuse! Also all other transferred data is possibly recorded and misused!
Known issue on this, linked [here].
REMARK(S) ABOUT ACCESSING ELECTRONIC BANKING AND OTHER SENSITIVE SITES VIA TOR
Most banks and similar institutions (paypal for example) are using extended fraud countermeasures, like IP-origin plausibility checks and anonymous server blacklistings. Therefore you risk to get your bank account locked for securitiy reasons by using the Tor-network.
REMARK(S) ABOUT (SECURE) HTTPS/SSL-CONNECTIONS TO FRAUD CRITICAL SITES
If you're planning to visit fraud critical HTTPS/SSL-secured sites (Banks for example) and that specific site is querying you unexpectively about accepting a new SSL-Certificate, be highly alertet! Check the Certificate data or better try another EXIT-node first! There are some rumors around, that some EXIT-nodes are trying to fake/highjack such HTTPS/SSL-connections!
REMARK(S) ABOUT THIS TOR USAGE CONCLUSION
This conclusion is valid only for your current webbrowser connections and not general for all other applications, because they each depend on an individual configuration which cannot be checked here!
Are you running a Tor server node (by pressing 'act as server' on Vidalia, f.e.) AND is this your Home-IP? Then you're most probably NOT using Tor to reach the web! In this case I cannot make a clear decision for you. You are at you own, to compare your ISPs given IP and the above shown IP by yourself (if they are different, you are using Tor).