HREF="trouble.html"><LINK
REL="STYLESHEET"
TYPE="text/css"
-HREF="../p_doc.css"></HEAD
+HREF="../p_doc.css"><META
+HTTP-EQUIV="Content-Type"
+CONTENT="text/html;
+charset=ISO-8859-1"></HEAD
><BODY
CLASS="SECT1"
BGCOLOR="#EEEEEE"
><H3
CLASS="SECT2"
><A
-NAME="AEN707"
->4.1. How much does Privoxy slow my browsing down? This
+NAME="SLOWSME"
+>4.1. How much does Privoxy slow my browsing down? This
has to add extra time to browsing.</A
></H3
><P
> How much of an impact depends on many things, including the CPU of the host
- system, how aggressive the configuration is, which specific actions are being triggered,
+ system, how aggressive the configuration is, which specific actions are being triggered,
the size of the page, the bandwidth of the connection, etc.</P
><P
-> Overall, it should not slow you down any in real terms, and may actually help
+> Overall, it should not slow you down any in real terms, and may actually help
speed things up since ads, banners and other junk are not typically being
retrieved and displayed. The actual processing time required by
<SPAN
></TT
>
actions may cause a perceived slowdown, since the entire document
- needs to be buffered before displaying. And on very large documents, filtering may have
- some measurable impact. How much depends on the page size, the actual
- definition of the filter(s), etc. See below. Most other actions have little
- to no impact on speed.</P
+ needs to be buffered before displaying. And on very large documents,
+ filtering may have some measurable impact. How much depends on the page size,
+ the actual definition of the filter(s), etc. See below. Most other actions
+ have little to no impact on speed.</P
><P
> Also, when filtering is enabled but zlib support isn't available, compression
is often disabled (see <A
TARGET="_top"
>prevent-compression</A
>).
- This can have an impact on speed as well. Again, the page size, etc. will
- determine how much of an impact.</P
+ This can have an impact on speed as well, although it's probably smaller than
+ you might think. Again, the page size, etc. will determine how much of an impact.</P
></DIV
><DIV
CLASS="SECT2"
>deanimate-gifs</A
></TT
>
- action, the entire document must be loaded into memory in order for the filtering
+ action, the entire document must be loaded into memory in order for the filtering
mechanism to work, and nothing is sent to the browser during this time.</P
><P
> The loading time typically does not really change much in real numbers, but
anti-virus software).
</P
><P
-> Filtering is automatically disabled for inappropriate MIME types. But note
+> Filtering is automatically disabled for inappropriate MIME types. But note
that if the web server mis-reports the MIME type, then content that should
not be filtered, could be. <SPAN
CLASS="APPLICATION"
address of <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
->'s built-in user interface, and
+>'s built-in user interface, and
<A
HREF="http://p.p/"
TARGET="_top"
> Since <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> sits between your web browser and the Internet,
+> sits between your web browser and the Internet,
it can simply intercept requests for these addresses and answer them with its built-in
<SPAN
CLASS="QUOTE"
></SPAN
>
web site at config.privoxy.org.</P
+><P
+> Note that config.privoxy.org resolves to a public IP address.
+ If you use config.privoxy.org as ping or traceroute target you will
+ reach the system on the Internet (Privoxy can't intercept ICMP requests).
+ If you want to ping the system Privoxy runs on,
+ you should use its IP address or local DNS name (if it has got one).</P
></DIV
><DIV
CLASS="SECT2"
CLASS="SECT2"
><A
NAME="NEWADS2"
->4.5. If I do submit missed ads, will
+>4.5. If I do submit missed ads, will
they be included in future updates?</A
></H3
><P
<TT
CLASS="FILENAME"
>default.action</TT
-> configuration file depends on how
- significant the issue is. We of course want to address any potential
+> configuration file depends on how
+ significant the issue is. We of course want to address any potential
problem with major, high-profile sites such as <I
CLASS="CITETITLE"
>Google</I
->,
+>,
<I
CLASS="CITETITLE"
>Yahoo</I
->, etc. Any site with global or regional reach,
+>, etc. Any site with global or regional reach,
has a good chance of being a candidate. But at the other end of the spectrum
are any number of smaller, low-profile sites such as for local clubs or
schools. Since their reach and impact are much less, they are best handled by
CLASS="FILENAME"
>user.action</TT
>, and thus would be
- unlikely to be included. </P
+ unlikely to be included.</P
></DIV
><DIV
CLASS="SECT2"
CLASS="SECT2"
><A
NAME="NOONECARES"
->4.6. Why doesn't anyone answer my support
+>4.6. Why doesn't anyone answer my support
request?</A
></H3
><P
>Privoxy</SPAN
> or ultimately any other
software alone. The server needs to know your IP address so that it knows
- where to send the responses back. </P
+ where to send the responses back.</P
><P
> There are many publicly usable "anonymous" proxies out there, which
provide a further level of indirection between you and the web server.</P
you can't even rule out that some of them only exist to *collect* information
on (those suspicious) people with a more than average preference for privacy.</P
><P
-> Your best bet is to chain <SPAN
+> If you want to hide your IP address from most adversaries,
+ you should consider chaining <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
>
with <A
-HREF="http://tor.eff.org/"
+HREF="https://www.torproject.org/"
TARGET="_top"
>Tor</A
->,
- an <A
-HREF="http://www.eff.org/"
-TARGET="_top"
->EFF</A
-> supported onion routing system.
+>.
The configuration details can be found in
<A
HREF="#TOR"
><H3
CLASS="SECT2"
><A
-NAME="AEN773"
+NAME="ANONFORSURE"
>4.8. Can Privoxy guarantee I am anonymous?</A
></H3
><P
-> No. Your chances of remaining anonymous are greatly improved, but unless you
+> No. Your chances of remaining anonymous are improved, but unless you
<A
HREF="#TOR"
TARGET="_top"
>Tor</SPAN
></A
>
- or a similar system and know what you're doing when it comes to configuring
- the rest of your system, it would be safest to assume that everything you do
+ or a similar proxy and know what you're doing when it comes to configuring
+ the rest of your system, you should assume that everything you do
on the Web can be traced back to you.</P
><P
> <SPAN
CLASS="EMPHASIS"
>you</I
></SPAN
-> more freedom to decide which sites
- you can trust, and what details you want to reveal. But it neither
+> more freedom to decide which sites
+ you can trust, and what details you want to reveal. But it neither
hides your IP address, nor can it guarantee that the rest of the system
behaves correctly. There are several possibilities how a web sites can find
out who you are, even if you are using a strict <SPAN
><H3
CLASS="SECT2"
><A
-NAME="AEN791"
+NAME="PROXYTEST"
>4.9. A test site says I am not using a Proxy.</A
></H3
><P
>Privoxy</SPAN
> itself is setup correctly.</P
><P
->
- If it is, refer to <A
+> If it is, refer to <A
HREF="https://www.torproject.org/documentation.html"
TARGET="_top"
>Tor's
CLASS="APPLICATION"
>Tor</SPAN
> is just another proxy that can be reached
- by socks4 or socks4a. Most likely you are interested in <SPAN
+ by socks4, socks4a and socks5. Most likely you are interested in <SPAN
CLASS="APPLICATION"
>Tor</SPAN
>
- to increase your anonymity level, therefore you should use socks4a, to make sure DNS requests are
- done through <SPAN
+ to increase your anonymity level, therefore you should use socks5, to make sure DNS
+ requests are done through <SPAN
CLASS="APPLICATION"
>Tor</SPAN
-> and thus invisible to your local network.</P
+> and thus invisible to your
+ local network. Using socks4a would work too, but with socks5 you get more precise error
+ messages.</P
><P
-> Since <SPAN
+> <SPAN
CLASS="APPLICATION"
->Privoxy</SPAN
-> 3.0.5, its
+>Privoxy's</SPAN
+>
<A
HREF="../user-manual/config.html"
TARGET="_top"
>forwarding section</A
>
and uncomment the line:</P
-><P
-> <TABLE
+><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TD
><PRE
CLASS="SCREEN"
-># forward-socks4a / 127.0.0.1:9050 .
+># forward-socks5t / 127.0.0.1:9050 .
</PRE
></TD
></TR
></TABLE
-></P
+><P
+> Note that if you got Tor through one of the bundles, you may
+ have to change the port from 9050 to 9150 (or even another one).
+ For details, please check the documentation on the
+ <A
+HREF="https://torproject.org/"
+TARGET="_top"
+>Tor website</A
+>.</P
><P
> This is enough to reach the Internet, but additionally you might want to
uncomment the following forward rules, to make sure your local network is still
reachable through Privoxy:</P
-><P
-> <TABLE
+><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
></TD
></TR
></TABLE
-></P
><P
> Unencrypted connections to systems in these address ranges will
be as (un)secure as the local network is, but the alternative is
> If you want your browser to be able to reach servers in your local
network by using their names, you will need additional exceptions
that look like this:</P
-><P
-> <TABLE
+><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
></TD
></TR
></TABLE
-></P
><P
> Save the modified configuration file and open
<A
HREF="http://config.privoxy.org/show-status"
TARGET="_top"
->http://config.privoxy.org/show-status/</A
+>http://config.privoxy.org/show-status</A
>
in your browser, confirm that <SPAN
CLASS="APPLICATION"
and that there are no other forward lines, unless you know that you need them. If everything looks good,
refer to
<A
-HREF="https://wiki.torproject.org/wiki/TheOnionRouter/TorFAQ#head-0e1cc2ac330ede8c6ad1ac0d0db0ac163b0e6143"
+HREF="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate"
TARGET="_top"
>Tor
Faq 4.2</A
CLASS="APPLICATION"
>Tor</SPAN
> does, why it is no replacement for
- application level security, and why you shouldn't use it for unencrypted logins.</P
+ application level security, and why you probably don't want to
+ use it for unencrypted logins.</P
></DIV
><DIV
CLASS="SECT2"
><H3
CLASS="SECT2"
><A
-NAME="AEN847"
+NAME="SITEBREAK"
>4.11. Might some things break because header information or
content is being altered?</A
></H3
><P
-> Definitely. It is common for sites to use browser type, browser version,
+> Definitely. It is common for sites to use browser type, browser version,
HTTP header content, and various other techniques in order to dynamically
decide what to display and how to display it. What you see, and what I see,
might be very different. There are many, many ways that this can be handled,
> is sometimes used in this way to identify
the browser, and adjust content accordingly.</P
><P
-> Also, different browsers use different encodings of Russian and Czech
+> Also, different browsers use different encodings of non-English
characters, certain web servers convert pages on-the-fly according to the
User Agent header. Giving a <SPAN
CLASS="QUOTE"
>"Referer"</SPAN
> or cookie is provided, is another example. (But you
can forge both headers without giving information away). There are
- many other ways things that can go wrong when trying to fool a web server. The
+ many other ways things can go wrong when trying to fool a web server. The
results of which could inadvertently cause pages to load incorrectly,
partially, or even not at all. And there may be no obvious clues as to just
- what went wrong, or why. Nowhere will there be a message that says
+ what went wrong, or why. Nowhere will there be a message that says
<SPAN
CLASS="QUOTE"
>"<SPAN
>fast-redirects</TT
> or else!</I
></SPAN
->
+>
"</SPAN
></P
><P
> Similar thoughts apply to modifying JavaScript, and, to a lesser degree,
HTML elements.</P
><P
-> If you have problems with a site, you will have to adjust your configuration
- accordingly. Cookies are probably the most likely adjustment that may
+> If you have problems with a site, you will have to adjust your configuration
+ accordingly. Cookies are probably the most likely adjustment that may
be required, but by no means the only one.</P
></DIV
><DIV
><H3
CLASS="SECT2"
><A
-NAME="AEN861"
+NAME="CACHING"
>4.12. Can Privoxy act as a <SPAN
CLASS="QUOTE"
>"caching"</SPAN
-> proxy to
+> proxy to
speed up web browsing?</A
></H3
><P
-> No, it does not have this ability at all. You want something like
+> No, it does not have this ability at all. You want something like
<A
HREF="http://www.squid-cache.org/"
TARGET="_top"
And, yes, before you ask, <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> can co-exist
+> can co-exist
with other kinds of proxies like <SPAN
CLASS="APPLICATION"
>Squid</SPAN
><H3
CLASS="SECT2"
><A
-NAME="AEN871"
+NAME="FIREWALL"
>4.13. What about as a firewall? Can Privoxy protect me?</A
></H3
><P
-> Not in the way you mean, or in the way some firewall vendors claim they can.
+> Not in the way you mean, or in the way some firewall vendors claim they can.
<SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
><H3
CLASS="SECT2"
><A
-NAME="AEN876"
+NAME="WASTED"
>4.14. I have large empty spaces / a checkerboard pattern now where
ads used to be. Why?</A
></H3
><P
> It is technically possible to eliminate banners and ads in a way that frees
- their allocated page space. This could easily be done by blocking with
+ their allocated page space. This could easily be done by blocking with
<SPAN
CLASS="APPLICATION"
>Privoxy's</SPAN
>entire</I
></SPAN
> image references from the
- HTML page source. </P
+ HTML page source.</P
><P
> But, this would consume considerably more CPU resources (IOW, slow things
down), would likely destroy the layout of some web pages which rely on the
><H3
CLASS="SECT2"
><A
-NAME="AEN884"
+NAME="SSL"
>4.15. How can Privoxy filter Secure (HTTPS) URLs?</A
></H3
><P
> As far as ad blocking is concerned, this is less of a restriction than it may
seem, since ad sources are often identifiable by the host name, and often
the banners to be placed in an encrypted page come unencrypted nonetheless
- for efficiency reasons, which exposes them to the full power of
+ for efficiency reasons, which exposes them to the full power of
<SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
TARGET="_top"
>filter{content-cookies}</A
></TT
->),
- in an SSL transaction will be impossible to block under these conditions.
- Fortunately, this does not seem to be a very common scenario since most
+>),
+ in an SSL transaction will be impossible to block under these conditions.
+ Fortunately, this does not seem to be a very common scenario since most
cookies come by traditional means.</P
></DIV
><DIV
><H3
CLASS="SECT2"
><A
-NAME="AEN898"
->4.16. Privoxy runs as a <SPAN
+NAME="HTTP2"
+>4.16. Does Privoxy support HTTP/2?</A
+></H3
+><P
+> Privoxy currently doesn't parse HTTP/2 but applications
+ can tunnel HTTP/2 through Privoxy if Privoxy is configured
+ to allow CONNECT requests (default) which are also used
+ for HTTPS.</P
+><P
+> Adding HTTP/2 support is on the TODO list but currently
+ nobody is known to work on it.</P
+></DIV
+><DIV
+CLASS="SECT2"
+><H3
+CLASS="SECT2"
+><A
+NAME="SECURE"
+>4.17. Privoxy runs as a <SPAN
CLASS="QUOTE"
>"server"</SPAN
->. How
+>. How
secure is it? Do I need to take any special precautions?</A
></H3
><P
> On Unix-like systems, <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> can run as a non-privileged
+> can run as a non-privileged
user, which is how we recommend it be run. Also, by default
<SPAN
CLASS="APPLICATION"
> The server aspect of <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> is not itself directly
+> is not itself directly
exposed to the Internet in this configuration. If you want to have
<SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
> serve as a LAN proxy, this will have to
be opened up to allow for LAN requests. In this case, we'd recommend
- you specify only the LAN gateway address, e.g. 192.168.1.1, in the main
+ you specify only the LAN gateway address, e.g. 192.168.1.1, in the main
<SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
CLASS="SECT2"
><A
NAME="TURNOFF"
->4.17. How can I temporarily disable Privoxy?</A
+>4.18. Can I temporarily disable Privoxy?</A
></H3
><P
-> The easiest way is to access <SPAN
+> <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> with your
- browser by using the remote toggle URL: <A
+> doesn't have a transparent proxy mode,
+ but you can toggle off blocking and content filtering.</P
+><P
+> The easiest way to do that is to point your browser
+ to the remote toggle URL: <A
HREF="http://config.privoxy.org/toggle"
TARGET="_top"
>http://config.privoxy.org/toggle</A
->.
- See the <A
+>.</P
+><P
+> See the <A
HREF="../user-manual/appendix.html#BOOKMARKLETS"
TARGET="_top"
>Bookmarklets section</A
->
+>
of the <I
CLASS="CITETITLE"
>User Manual</I
-> for an easy way to access this
- feature. Note that this is a feature that may need to be enabled in the main
+> for an easy way to access this
+ feature. Note that this is a feature that may need to be enabled in the main
<TT
CLASS="FILENAME"
>config</TT
CLASS="SECT2"
><A
NAME="REALLYOFF"
->4.18. When <SPAN
+>4.19. When <SPAN
CLASS="QUOTE"
>"disabled"</SPAN
-> is Privoxy totally
+> is Privoxy totally
out of the picture?</A
></H3
><P
<SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> is still acting as a proxy, but just not
- doing any of the things that <SPAN
+> is still acting as a proxy, but just
+ doing less of the things that <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
> would
normally be expected to do. It is still a <SPAN
CLASS="QUOTE"
>"middle-man"</SPAN
-> in
- the interaction between your browser and web sites. See below to bypass
+> in
+ the interaction between your browser and web sites. See below to bypass
the proxy.</P
></DIV
><DIV
CLASS="SECT2"
><A
NAME="TURNOFF2"
->4.19. How can I tell Privoxy to totally ignore certain sites?</A
+>4.20. How can I tell Privoxy to totally ignore certain sites?</A
></H3
><P
> Bypassing a proxy, or proxying based on arbitrary criteria, is purely a browser
CLASS="SECT2"
><A
NAME="CRUNCH"
->4.20. My logs show Privoxy <SPAN
+>4.21. My logs show Privoxy <SPAN
CLASS="QUOTE"
>"crunches"</SPAN
->
+>
ads, but also its own internal CGI pages. What is a <SPAN
CLASS="QUOTE"
>"crunch"</SPAN
> A <SPAN
CLASS="QUOTE"
>"crunch"</SPAN
-> simply means <SPAN
+> means <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> intercepted
+> intercepted
<SPAN
CLASS="emphasis"
><I
CLASS="SECT2"
><A
NAME="DOWNLOADS"
->4.21. Can Privoxy effect files that I download
+>4.22. Can Privoxy affect files that I download
from a webserver? FTP server?</A
></H3
><P
>block</A
></TT
> pattern,
- it will still be blocked, and of course this is obvious.
+ it will still be blocked, and of course this is obvious.
</P
><P
> Filtering is potentially more of a concern since the results are not always
that is intended to be saved to disk, then any content that might have been
altered by filtering, will be saved too, for these (probably rare) cases.</P
><P
-> Note that versions later than 3.0.2 do NOT filter document types reported as
+> Note that versions later than 3.0.2 do NOT filter document types reported as
<SPAN
CLASS="QUOTE"
>"text/plain"</SPAN
> <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> does not do FTP at all, only HTTP
- and HTTPS (SSL) protocols, so please don't try.</P
+> does not do FTP at all, only HTTP
+ and HTTPS (SSL) protocols.</P
></DIV
><DIV
CLASS="SECT2"
CLASS="SECT2"
><A
NAME="DOWNLOADS2"
->4.22. I just downloaded a Perl script, and Privoxy
+>4.23. I just downloaded a Perl script, and Privoxy
altered it! Yikes, what is wrong!</A
></H3
><P
CLASS="SECT2"
><A
NAME="HOSTSFILE"
->4.23. Should I continue to use a <SPAN
+>4.24. Should I continue to use a <SPAN
CLASS="QUOTE"
>"HOSTS"</SPAN
> file for ad-blocking?</A
></H3
><P
> One time-tested technique to defeat common ads is to trick the local DNS
- system by giving a phony IP address for the ad generator in the local
+ system by giving a phony IP address for the ad generator in the local
<TT
CLASS="FILENAME"
>HOSTS</TT
> file, typically using <TT
CLASS="LITERAL"
>127.0.0.1</TT
->, aka
+>, aka
<TT
CLASS="LITERAL"
>localhost</TT
>. This effectively blocks the ad.</P
><P
-> There is no reason to use this technique in conjunction with
+> There is no reason to use this technique in conjunction with
<SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
>
- does essentially the same thing, much more elegantly and with much more
+ does essentially the same thing, much more elegantly and with much more
flexibility. A large <TT
CLASS="FILENAME"
>HOSTS</TT
It is recommended to remove such entries from your <TT
CLASS="FILENAME"
>HOSTS</TT
-> file. If you think
+> file. If you think
your hosts list is neglected by <SPAN
CLASS="APPLICATION"
>Privoxy's </SPAN
->
+>
configuration, consider adding your list to your <TT
CLASS="FILENAME"
>user.action</TT
> file:</P
-><P
-> <TABLE
+><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
></TD
></TR
></TABLE
-></P
></DIV
><DIV
CLASS="SECT2"
CLASS="SECT2"
><A
NAME="SEEALSO"
->4.24. Where can I find more information about Privoxy
+>4.25. Where can I find more information about Privoxy
and related issues?</A
></H3
><P
>
users:</P
><P
-> <P
></P
><TABLE
BORDER="0"
><TR
><TD
> <A
-HREF="http://www.privoxy.org/"
+HREF="https://www.privoxy.org/"
TARGET="_top"
->http://www.privoxy.org/</A
->,
+>https://www.privoxy.org/</A
+>,
the <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> Home page.
+> Home page.
</TD
></TR
></TBODY
></TABLE
><P
></P
->
- <P
+><P
></P
><TABLE
BORDER="0"
><TR
><TD
> <A
-HREF="http://www.privoxy.org/faq/"
+HREF="https://www.privoxy.org/faq/"
TARGET="_top"
->http://www.privoxy.org/faq/</A
->,
+>https://www.privoxy.org/faq/</A
+>,
the <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> FAQ.
+> FAQ.
</TD
></TR
></TBODY
></TABLE
><P
></P
->
- <P
+><P
+></P
+><TABLE
+BORDER="0"
+><TBODY
+><TR
+><TD
+> <A
+HREF="https://www.privoxy.org/developer-manual/"
+TARGET="_top"
+>https://www.privoxy.org/developer-manual/</A
+>,
+ the <SPAN
+CLASS="APPLICATION"
+>Privoxy</SPAN
+> developer manual.
+ </TD
+></TR
+></TBODY
+></TABLE
+><P
+></P
+><P
></P
><TABLE
BORDER="0"
><TR
><TD
> <A
-HREF="http://sourceforge.net/projects/ijbswa/"
+HREF="https://sourceforge.net/projects/ijbswa/"
TARGET="_top"
->http://sourceforge.net/projects/ijbswa/</A
->,
+>https://sourceforge.net/projects/ijbswa/</A
+>,
the Project Page for <SPAN
CLASS="APPLICATION"
>Privoxy</SPAN
-> on
+> on
<A
HREF="http://sourceforge.net"
TARGET="_top"
></TABLE
><P
></P
->
- <P
+><P
></P
><TABLE
BORDER="0"
></TABLE
><P
></P
->
- <P
+><P
></P
><TABLE
BORDER="0"
><TR
><TD
> <A
-HREF="http://sourceforge.net/tracker/?group_id=11118&atid=460288"
+HREF="https://sourceforge.net/tracker/?group_id=11118&atid=460288"
TARGET="_top"
->http://sourceforge.net/tracker/?group_id=11118&atid=460288</A
+>https://sourceforge.net/tracker/?group_id=11118&atid=460288</A
>, to submit <SPAN
CLASS="QUOTE"
>"misses"</SPAN
> and other
- configuration related suggestions to the developers.
+ configuration related suggestions to the developers.
</TD
></TR
></TBODY
></TABLE
><P
></P
->
-
- <P
-></P
-><TABLE
-BORDER="0"
-><TBODY
-><TR
-><TD
-> <A
-HREF="http://www.junkbusters.com/ht/en/cookies.html"
-TARGET="_top"
->http://www.junkbusters.com/ht/en/cookies.html</A
->,
- an explanation how cookies are used to track web users.
- </TD
-></TR
-></TBODY
-></TABLE
-><P
-></P
->
- <P
-></P
-><TABLE
-BORDER="0"
-><TBODY
-><TR
-><TD
-> <A
-HREF="http://www.junkbusters.com/ijb.html"
-TARGET="_top"
->http://www.junkbusters.com/ijb.html</A
->,
- the original Internet Junkbuster.
- </TD
-></TR
-></TBODY
-></TABLE
><P
></P
->
- <P
-></P
-><TABLE
-BORDER="0"
-><TBODY
-><TR
-><TD
-> <A
-HREF="http://privacy.net/"
-TARGET="_top"
->http://privacy.net/</A
->, a useful site
- to check what information about you is leaked while you browse the web.
- </TD
-></TR
-></TBODY
-></TABLE
-><P
-></P
->
- <P
-></P
><TABLE
BORDER="0"
><TBODY
></TABLE
><P
></P
->
- <P
+><P
></P
><TABLE
BORDER="0"
><TR
><TD
> <A
-HREF="http://www.pps.jussieu.fr/~jch/software/polipo/"
+HREF="http://www.pps.univ-paris-diderot.fr/~jch/software/polipo/"
TARGET="_top"
->http://www.pps.jussieu.fr/~jch/software/polipo/</A
+>http://www.pps.univ-paris-diderot.fr/~jch/software/polipo/</A
>,
<SPAN
CLASS="APPLICATION"
></TABLE
><P
></P
->
- <P
+><P
></P
><TABLE
BORDER="0"
><TR
><TD
> <A
-HREF="http://tor.eff.org/"
+HREF="https://www.torproject.org/"
TARGET="_top"
->http://tor.eff.org/</A
->,
+>https://www.torproject.org/</A
+>,
<SPAN
CLASS="APPLICATION"
>Tor</SPAN
-> can help anonymize web browsing,
+> can help anonymize web browsing,
web publishing, instant messaging, IRC, SSH, and other applications.
</TD
></TR
></TABLE
><P
></P
->
- <P
-></P
-><TABLE
-BORDER="0"
-><TBODY
-><TR
-><TD
-> <A
-HREF="http://www.privoxy.org/developer-manual/"
-TARGET="_top"
->http://www.privoxy.org/developer-manual/</A
->,
- the <SPAN
-CLASS="APPLICATION"
->Privoxy</SPAN
-> developer manual.
- </TD
-></TR
-></TBODY
-></TABLE
-><P
-></P
-></P
></DIV
><DIV
CLASS="SECT2"
CLASS="SECT2"
><A
NAME="MICROSUCK"
->4.25. I've noticed that Privoxy changes <SPAN
+>4.26. I've noticed that Privoxy changes <SPAN
CLASS="QUOTE"
>"Microsoft"</SPAN
-> to
+> to
<SPAN
CLASS="QUOTE"
>"MicroSuck"</SPAN
>"Text replacements for subversive browsing
fun!"</SPAN
> or you are using an older Privoxy version and have implicitly
- activated it by choosing the <SPAN
+ activated it by choosing the <SPAN
CLASS="QUOTE"
->"Adventuresome"</SPAN
+>"Advanced"</SPAN
> profile in the
- web-based editor. Please upgrade!</P
+ web-based editor. Please upgrade.</P
></DIV
><DIV
CLASS="SECT2"
CLASS="SECT2"
><A
NAME="VALID"
->4.26. Does Privoxy produce <SPAN
+>4.27. Does Privoxy produce <SPAN
CLASS="QUOTE"
>"valid"</SPAN
> HTML (or XHTML)?</A
>Privoxy</SPAN
> filter. While this
should always conform to the HTML 4.01 specifications, it has not been
- validated against this or any other standard. </P
+ validated against this or any other standard.</P
+></DIV
+><DIV
+CLASS="SECT2"
+><H3
+CLASS="SECT2"
+><A
+NAME="SURPRISE-PRIVOXY"
+>4.28. How did you manage to get Privoxy on my computer without my consent?</A
+></H3
+><P
+> We didn't. We make Privoxy available for download, but we don't go
+ around installing it on other people's systems behind their back.
+ If you discover Privoxy running on your system and are sure you didn't
+ install it yourself, somebody else did. You may not even be running
+ the real Privoxy, but maybe something else that only pretends to be
+ Privoxy, or maybe something that is based on the real Privoxy,
+ but has been modified.</P
+><P
+> Lately there have been reports of problems with some kind of
+ "parental control" software based on Privoxy that came preinstalled on
+ certain <A
+HREF="https://sourceforge.net/p/ijbswa/bugs/813/"
+TARGET="_top"
+>ASUS Netbooks</A
+>.
+ The problems described are inconsistent with the behaviour of official
+ Privoxy versions, which suggests that the preinstalled software may
+ contain vendor modifications that we don't know about and thus can't debug.</P
+><P
+> Privoxy's <A
+HREF="copyright.html"
+>license</A
+> allows vendor
+ modifications, but the vendor has to comply with the license,
+ which involves informing the user about the changes and to make
+ the changes available under the same license as Privoxy itself.</P
+><P
+> If you are having trouble with a modified Privoxy version,
+ please try to talk to whoever made the modifications before
+ reporting the problem to us. Please also try to convince
+ whoever made the modifications to talk to us. If you think
+ somebody gave you a modified Privoxy version without complying
+ to the license, please let us know.</P
></DIV
></DIV
><DIV