summaryrefslogtreecommitdiffstats
path: root/wiki/src/contribute/design/Tor_enforcement/Network_filter.mdwn
diff options
context:
space:
mode:
Diffstat (limited to 'wiki/src/contribute/design/Tor_enforcement/Network_filter.mdwn')
-rw-r--r--wiki/src/contribute/design/Tor_enforcement/Network_filter.mdwn2
1 files changed, 1 insertions, 1 deletions
diff --git a/wiki/src/contribute/design/Tor_enforcement/Network_filter.mdwn b/wiki/src/contribute/design/Tor_enforcement/Network_filter.mdwn
index 33c4226..3c067ad 100644
--- a/wiki/src/contribute/design/Tor_enforcement/Network_filter.mdwn
+++ b/wiki/src/contribute/design/Tor_enforcement/Network_filter.mdwn
@@ -1,6 +1,6 @@
One serious security issue is that we don't know what software will
attempt to contact the network and whether their proxy settings are
-set up to use the Tor SOCKS proxy or polipo HTTP(s) proxy correctly.
+set up to use the Tor SOCKS proxy correctly.
This is solved by blocking all outbound Internet traffic except Tor
(and I2P when enabled), and explicitly configure all applications to use either of
these.