Merge pull request #159 from TwoSixtyThreeFiftyFour/Adding-the-side-channel-warning-link-into-routes

Adding link to the side-channel attack in each route
This commit is contained in:
Alex Anderson 2022-07-22 01:23:41 +00:00 committed by GitHub
commit 31fbce62c9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -2266,6 +2266,8 @@ When using Tor Browser, you should click the little shield Icon (upper right, ne
We would recommend the "Safer" level for most cases. The Safest level should be enabled if you think you are accessing suspicious or dangerous websites or if you are extra paranoid. The Safest mode will also most likely break many websites that rely actively on JavaScript.
**Temporary Important Warning: Please see [Microarchitectural Side-channel Deanonymization Attacks][Microarchitectural Side-channel Deanonymization Attacks:].**
If you are extra paranoid, use the "Safest" level by default and consider downgrading to Safer is the website is unusable because of Javascript blocking.
Lastly, while using Tor Browser on Tails on the "Safer" level, please consider [Appendix A5: Additional browser precautions with JavaScript enabled]
@ -11006,6 +11008,8 @@ If you are to resort to this, you should never do so from a monitored/known netw
**Refer to the Tails route to achieve this. See [The Tails route][The Tor Browser route:] and [Appendix P: Accessing the internet as safely as possible when Tor and VPNs are not an option] sections.**
# Appendix V: What browser to use in your Guest VM/Disposable VM
**Temporary Important Warning: Please see [Microarchitectural Side-channel Deanonymization Attacks:].**
There are 6 possibilities of browser to use on your guest/disposable VM:
@ -11745,6 +11749,8 @@ Hopefully, these bridges should be enough to get you connected even in a hostile
If not, consider [Appendix P: Accessing the internet as safely as possible when Tor and VPNs are not an option]
# Appendix Y: Installing and using desktop Tor Browser
**Temporary Important Warning: Please see [Microarchitectural Side-channel Deanonymization Attacks:].**
## Installation: