|
To, hopefully, ease translations, this SVG embeds the font used in the labels "Tor hides ...":
|
|
|
Convert the TTF file SourceSansPro-Semibold.ttf to Base64 using:
|
|
|
Copy it to a <style> tag in the <defs> tag of the SVG.
|
|
|
You cannot access the Internet from Tails until you are connected to Tor. For example, *Tor Browser* displays the error message <span class="code">Proxy server refusing connections</span> until you are connected to Tor.
|
|
|
Using a public Tor relay as your first Tor relay makes it clear to your local network that you are connecting to Tor, while still keeping your online activity secure and anonymous.
|
|
|
Tor bridges are secret Tor relays that keep your connection to the Tor network hidden.
|
|
|
Use a bridge as your first Tor relay if connecting to Tor is blocked or if using Tor could look suspicious to someone who monitors your Internet connection.
|
|
|
The technology used by Tor bridges is designed to circumvent censorship where connections to Tor are blocked, for example in some countries with heavy censorship, by some public networks, or by some parental controls.
|
|
|
It does so by camouflaging your connection so it cannot be recognized as a connection to Tor. As a consequence, the same technology can be used to hide that you are using Tor if it could look suspicious to someone who monitors your Internet connection.
|
|
|
First, Tails synchronizes the clock of the computer automatically, because a correct time is needed to be able to connect to the Tor network.
|
|
|
Tails learns the current time by connecting to the captive portal detection service of [Fedora](https://getfedora.org/), which is used by most Linux distributions. This connection does not go through the Tor network and is an exception to our policy of only making Internet connections through the Tor network.
|
|
|
<p>You can learn more about our security assessment of this time synchronization in our [[design documentation about non-Tor traffic|contribute/design/Tor_enforcement#non-tor-traffic]].</p>
|
|
|
If you choose instead to [[hide that you are connecting to Tor|tor#hiding]], you might have to fix the computer clock manually.
|
|
|
If Tails fails to synchronize the clock because you have to sign in to the network using a captive portal, an error screen is displayed that helps you do so.
|
|
|
For detailed instructions, see how to [[sign in to the network using a captive portal|unsafe_browser]].
|
|
|
Then, Tails tries different ways of connecting to Tor until it succeeds:
|
Cuando eliges esta opción, Tails intenta diferentes formas de conectarse a Tor hasta que tiene éxito:
|
|
Tails tries to connect to Tor directly using **public relays**, without using a bridge.
|
|
|
Tails tries to connect to Tor using one of the **default bridges**, already included in Tails, if connecting using public relays fails.
|
|
|
If public relays and default bridges don't work, Tails asks you to configure a **custom bridge**, if connecting using the default bridges fails.
|
|
|
You might need to go unnoticed if using Tor could look suspicious to someone who monitors your Internet connection.
|
|