-<html><head><title>Privoxy Man page</title><link rel="stylesheet" type="text/css" href="../p_web.css"></head><body><H2>NAME</H2>
-<PRE>
-<!-- Manpage converted by man2html 3.0.1 -->
- <B>privoxy</B> - Privacy enhancing Proxy
-
-
-</PRE>
-<H2>SYNOPSIS</H2><PRE>
- <B>privoxy</B> [--help] [--version] [--no-daemon] [--pidfile <I>pid</I>
- <I>file</I>] [--user <I>user</I>[.<I>group</I>]] <I>[configfile]</I> (Unix)
-
- <B>privoxy.exe</B> <I>[configfile]</I> (Windows)
-
-
-
-</PRE>
-<H2>OPTIONS</H2><PRE>
- <B>Privoxy</B> may be invoked with the following command-line
- options:
-
- <B>--version</B> (unix only)
- Print version info and exit.
-
- <B>--help</B> (unix only)
- Print a short usage info and exit.
-
- <B>--no-daemon</B> (unix only)
- Don't become a daemon, i.e. don't fork and become
- process group leader, don't detach from controlling
- tty, and do all logging there.
-
- <B>--pidfile</B> <I>pidfile</I> (unix only)
- On startup, write the process ID to <I>pidfile</I>. Delete
- the <I>pidfile</I> on exit. Failiure to create or delete
- the <I>pidfile</I> is non-fatal. If no <B>--pidfile</B> option is
- given, no PID file will be used.
-
- <B>--user</B> <I>user</I>[.<I>group</I>] (unix only)
- After (optionally) writing the PID file, assume the
- user ID of <I>user</I> and the GID of <I>group</I>, or, if the
- optional <I>group</I> was not given, the default group of
- <I>user</I>. Exit if the privileges are not sufficient to
- do so.
-
-
- If the <I>configfile</I> is not specified on the command line,
- <B>Privoxy</B> will look for a file named <B>config</B> in the current
- directory (except on Win32 where it will try <B>config.txt</B>).
-
-
-
-
-</PRE>
-<H2>DESCRIPTION</H2><PRE>
- <B>Privoxy</B> is a web proxy with advanced filtering capabili
- ties for protecting privacy, filtering web page content,
- managing cookies, controlling access, and removing ads,
- banners, pop-ups and other obnoxious Internet junk.
- <B>Privoxy</B> has a very flexible configuration and can be cus
- tomized to suit individual needs and tastes. <B>Privoxy</B> has
- application for both stand-alone systems and multi-user
- <B>Junkbuster</B> was originally written by JunkBusters Corpora
- tion, and was released as free open-source software under
- the GNU GPL. Stefan Waldherr made many improvements, and
- started the SourceForge project to continue development.
-
-
-
-</PRE>
-<H2>INSTALLATION AND USE</H2><PRE>
- Browsers must be individually configured to use <B>Privoxy</B> as
- a HTTP proxy. The default setting is for localhost, on
- port 8118 (configurable in the main config file). To set
- the HTTP proxy in Netscape and Mozilla, go through: <B>Edit</B>;
- <B>Preferences</B>; <B>Advanced</B>; <B>Proxies</B>; <B>Manual</B> <B>Proxy</B> <B>Configura</B>
- <B>tion</B>; <B>View</B>.
-
- For Internet Explorer, go through: <B>Tools</B>; <B>Internet</B> <B>Proper</B>
- <B>ties</B>; <B>Connections</B>; <B>LAN</B> <B>Settings</B>.
-
- The Secure (SSL) Proxy should also be set to the same val
- ues, otherwise <B>https:</B> URLs will not be proxied.
-
- For other browsers, check the documentation.
-
-
-
-</PRE>
-<H2>CONFIGURATION</H2><PRE>
- <B>Privoxy</B> can be configured with the various configuration
- files. The default configuration files are: <I>config</I>,
- <I>default.action</I>, and <I>default.filter</I>. These are well com
- mented. On Unix and Unix-like systems, these are located
- in <I>/etc/privoxy/</I> by default. On Windows, OS/2 and AmigaOS,
- these files are in the same directory as the <B>Privoxy</B> exe
- cutable.
-
- The name and number of configuration files has changed
- from previous versions, and is subject to change as devel
- opment progresses. In fact, the configuration itself is
- changed and much more sophisticated. See the user-manual
- for a brief explanation of all configuration options.
-
- The actions list (ad blocks, etc) can also be configured
- with your web browser at <I>http://www.privoxy.org/config</I>.
- <B>Privoxy's</B> configuration parameters can also be viewed at
- the same page. In addition, <B>Privoxy</B> can be toggled on/off.
- This is an internal page.
-
-
-
-</PRE>
-<H2>SAMPLE CONFIGURATION</H2><PRE>
- A brief example of what a <I>default.action</I> configuration
- might look like:
-
-
- # Define a few useful custom aliases for later use
- {{alias}}
- +no-cookies = +no-cookies-set +no-cookies-read
-
- # Do accept cookies
- -no-cookies = -no-cookies-set -no-cookies-read
-
- # Treat these blocked URLs as images.
- +imageblock = +block +image
-
- # Define page filters we want to use.
- myfilters = +filter{html-annoyances} +filter{js-annoyances}\
- +filter{no-popups} +filter{webbugs}
-
- ## Default Policies (actions) ############################
- { \
- -block \
- -downgrade \
- +fast-redirects \
- myfilters \
- +no-compression \
- +hide-forwarded \
- +hide-from{block} \
- +hide-referer{forge} \
- -hide-user-agent \
- -image \
- +image-blocker{blank} \
- +no-cookies-keep \
- -no-cookies-read \
- -no-cookies-set \
- +no-popups \
- -vanilla-wafer \
- -wafer \
- }
- /
-
- # Now set exceptions to the above defined policies #######
-
- # Sites where we want persistant cookies
- {-no-cookies -no-cookies-keep}
- .redhat.com
- .sun.com
- .yahoo.com
- .msdn.microsoft.com
-
- # This site requires cookies AND 'fast-redirects' on
- {-no-cookies -no-cookies-keep -fast-redirects}
- .nytimes.com
-
- # Add custom headers, and turn off filtering of page source
- {+add-header{X-Privacy: Yes please} #-add-header{*} \
- +add-header{X-User-Tracking: No thanks!} -filter}
- privacy.net
-
- .adforce.imgis.com
- .ad.preferences.com/image.*
- .ads.web.aol.com
- .ad-adex3.flycast.com
- .ad.doubleclick.net
- .ln.doubleclick.net
- .ad.de.doubleclick.net
- /.*/count\.cgi\?.*df=
- 194.221.183.22[1-7]
- a196.g.akamai.net/7/196/2670/000[12]/images.gmx.net/i4/images/.*/
-
- # Block any URLs that match these patterns
- {+block}
- /.*/(.*[-_.])?ads?[0-9]?(/|[-_.].*|\.(gif|jpe?g))
- /.*/(plain|live|rotate)[-_.]?ads?/
- /.*/(sponsor)s?[0-9]?/
- /.*/ad(server|stream|juggler)\.(cgi|pl|dll|exe)
- /.*/adbanners/
- /.*/adv((er)?ts?|ertis(ing|ements?))?/
- /.*/banners?/
- /.*/popupads/
- /.*/advert[0-9]+\.jpg
- /ad_images/
- /.*/ads/
- /images/.*/.*_anim\.gif
- /rotations/
- /.*(ms)?backoff(ice)?.*\.(gif|jpe?g)
- 195.63.104.*/(inbox|log|meld|folderlu|folderru|log(in|out)[lmr]u|)
- .images.nytimes.com
- .images.yahoo.com/adv/
- /.*cnnstore\.gif
-
-
-
- See the comments in the configuration files themselves, or
- the user-manual for explanations of the above syntax, and
- other <B>Privoxy</B> configuration options.
-
-
-
-</PRE>
-<H2>FILES</H2><PRE>
- <I>/usr/sbin/privoxy</I>
- <I>/etc/privoxy/config</I>
- <I>/etc/privoxy/default.action</I>
- <I>/etc/privoxy/advanced.action</I>
- <I>/etc/privoxy/basic.action</I>
- <I>/etc/privoxy/intermediate.action</I>
- <I>/etc/privoxy/default.filter</I>
- <I>/etc/privoxy/trust</I>
- <I>/etc/privoxy/templates/*</I>
- <I>/var/log/privoxy/logfile</I>
-
-
- mentation should be included in the local documentation
- directory, though is not complete at this time.
-
-
-
-</PRE>
-<H2>SIGNALS</H2><PRE>
- <B>Privoxy</B> terminates on the <B>SIGINT</B>, <B>SIGTERM</B> and <B>SIGABRT</B> sig
- nals. Log rotation scripts may cause a re-opening of the
- logfile by sending a <B>SIGHUP</B> to <B>Privoxy</B>. Note that unlike
- other daemons, <B>Privoxy</B> does not need to be made aware of
- config file changes by <B>SIGHUP</B> -- it will detect them auto
- matically.
-
-
-
-</PRE>
-<H2>NOTES</H2><PRE>
- This is a <B>BETA</B> version of <B>Privoxy</B>. Not all features are
- well tested.
-
- Please see the user-maual on how to contact the developers
- for feature requests, reporting problems, and other ques
- tions.
-
-
-
-</PRE>
-<H2>BUGS</H2><PRE>
- Probably. Please see the user-manual for how and where to
- report bugs.
-
-
-
-</PRE>
-<H2>SEE ALSO</H2><PRE>
- http://www.privoxy.org/
- http://config.privoxy.org/
- http://www.privoxy.org/faq/
- http://www.privoxy.org/user-manual/
- http://www.privoxy.org/developer-manual/
- http://sourceforge.net/projects/ijbswa (Privoxy Project
- Page)
- http://www.waldherr.org/junkbuster/
- http://www.junkbusters.com/ht/en/cookies.html
- http://privacy.net/analyze/
- http://www.squid-cache.org/
- http://linuxalpha.ch/steudten/software/
-
-
-
-</PRE>
-<H2>DEVELOPMENT TEAM</H2><PRE>
- Stefan Waldherr
- Andreas Oesterhelt
- Jon Foster
- Markus Breitenbach
- Thomas Steudten
- David Schmidt
- Haroon Rafique
- Joerg Strohmayer
- Shamim Mohamed
- John Venvertloh
- Hal Burgiss
- Rodrigo Barbosa
- Gábor Lipták
-
-
-
-</PRE>
-<H2>COPYRIGHT AND LICENSE</H2><PRE>
- This program is free software; you can redistribute it
- and/or modify it under the terms of the GNU General Public
- License as published by the Free Software Foundation;
- either version 2 of the License, or (at your option) any
- later version.
-
- This program is distributed in the hope that it will be
- useful, but WITHOUT ANY WARRANTY; without even the implied
- warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
- PURPOSE. See the GNU General Public License for more
- details.
-
- You should have received a copy of the GNU General Public
- License along with this program; if not, write to the Free
- Software Foundation, Inc., 59 Temple Place, Suite 330,
- Boston, MA 02111-1307 USA
-
- Internet Junkbuster Proxy is a trademark of Junkbusters
- Corporation.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-</PRE>
-</body></html>
+<!-- Creator : groff version 1.19.2 -->
+<!-- CreationDate: Mon Nov 30 11:11:41 2020 -->
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
+"http://www.w3.org/TR/html4/loose.dtd">
+<html>
+<head>
+ <meta name="generator" content="groff -Thtml, see www.gnu.org">
+ <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
+ <meta name="Content-Style" content="text/css">
+ <style type="text/css">
+ p { margin-top: 0; margin-bottom: 0; }
+ pre { margin-top: 0; margin-bottom: 0; }
+ table { margin-top: 0; margin-bottom: 0; }
+ </style>
+ <title>PRIVOXY</title>
+ <link rel="STYLESHEET" type="text/css" href="../p_doc.css">
+</head>
+<body>
+ <h1 align="center">PRIVOXY</h1><a href="#NAME">NAME</a><br>
+ <a href="#SYNOPSIS">SYNOPSIS</a><br>
+ <a href="#OPTIONS">OPTIONS</a><br>
+ <a href="#DESCRIPTION">DESCRIPTION</a><br>
+ <a href="#INSTALLATION%20AND%20USAGE">INSTALLATION AND USAGE</a><br>
+ <a href="#CONFIGURATION">CONFIGURATION</a><br>
+ <a href="#FILES">FILES</a><br>
+ <a href="#SIGNALS">SIGNALS</a><br>
+ <a href="#NOTES">NOTES</a><br>
+ <a href="#SEE%20ALSO">SEE ALSO</a><br>
+ <a href="#DEVELOPMENT%20TEAM">DEVELOPMENT TEAM</a><br>
+ <a href="#COPYRIGHT%20AND%20LICENSE">COPYRIGHT AND LICENSE</a><br>
+ <hr>
+ <a name="NAME"></a>
+ <h2>NAME</h2>
+ <p style="margin-left:11%; margin-top: 1em">privoxy − Privacy Enhancing Proxy</p><a name="SYNOPSIS"></a>
+ <h2>SYNOPSIS</h2>
+ <p style="margin-left:11%; margin-top: 1em"><b>privoxy</b> [<b>−−chroot</b> ]
+ [<b>−−config-test</b> ] [<b>−−help</b> ] [<b>−−no-daemon</b> ]
+ [<b>−−pidfile</b> <i>pidfile</i> ] [<b>−−pre-chroot-nslookup</b> <i>hostname</i> ]
+ [<b>−−user</b> <i>user[.group]</i> ] [<b>−−version</b> ] [<i>configfile</i> ]</p><a name=
+ "OPTIONS"></a>
+ <h2>OPTIONS</h2>
+ <p style="margin-left:11%; margin-top: 1em"><b>Privoxy</b> may be invoked with the following command line options:
+ <b><br>
+ −−chroot</b></p>
+ <p style="margin-left:22%;">Before changing to the user ID given in the −−user option, chroot to that
+ user’s home directory, i.e. make the kernel pretend to the <b>Privoxy</b> process that the directory tree
+ starts there. If set up carefully, this can limit the impact of possible vulnerabilities in <b>Privoxy</b> to the
+ files contained in that hierarchy.</p>
+ <p style="margin-left:11%;"><b>−−config-test</b></p>
+ <p style="margin-left:22%;">Exit after loading the configuration files before binding to the listen address. The exit
+ code signals whether or not the configuration files have been successfully loaded.</p>
+ <p style="margin-left:22%; margin-top: 1em">If the exit code is 1, at least one of the configuration files is
+ invalid, if it is 0, all the configuration files have been successfully loaded (but may still contain errors that can
+ currently only be detected at run time).</p>
+ <p style="margin-left:22%; margin-top: 1em">This option doesn’t affect the log setting, combination with
+ "--no-daemon" is recommended if a configured log file shouldn’t be used.</p>
+ <table width="100%" border="0" rules="none" frame="void" cellspacing="0" cellpadding="0">
+ <tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="9%">
+ <p style="margin-top: 1em" valign="top"><b>−−help</b></p>
+ </td>
+ <td width="2%"></td>
+ <td width="49%">
+ <p style="margin-top: 1em" valign="top">Print brief usage info and exit.</p>
+ </td>
+ <td width="29%"></td>
+ </tr>
+ </table>
+ <p style="margin-left:11%;"><b>−−no-daemon</b></p>
+ <p style="margin-left:22%;">Don’t become a daemon, i.e. don’t fork and become process group leader,
+ don’t detach from controlling tty, and do all logging there.</p>
+ <p style="margin-left:11%;"><b>−−pidfile</b> <i>pidfile</i></p>
+ <p style="margin-left:22%;">On startup, write the process ID to <i>pidfile</i>. Delete the <i>pidfile</i> on exit.
+ Failure to create or delete the <i>pidfile</i> is non-fatal. If no <b>−−pidfile</b> option is given, no
+ PID file will be used.</p>
+ <p style="margin-left:11%;"><b>−−pre-chroot-nslookup</b> <i>hostname</i></p>
+ <p style="margin-left:22%;">Initialize the resolver library using <i>hostname</i> before chroot’ing. On some
+ systems this reduces the number of files that must be copied into the chroot tree.</p>
+ <p style="margin-left:11%;"><b>−−user</b> <i>user[.group]</i></p>
+ <p style="margin-left:22%;">After (optionally) writing the PID file, assume the user ID of <i>user</i> and the GID of
+ <i>group</i>, or, if the optional <i>group</i> was not given, the default group of <i>user</i>. Exit if the
+ privileges are not sufficient to do so.</p>
+ <p style="margin-left:11%;"><b>−−version</b></p>
+ <p style="margin-left:22%;">Print version info and exit.</p>
+ <p style="margin-left:11%; margin-top: 1em">If the <i>configfile</i> is not specified on the command line,
+ <b>Privoxy</b> will look for a file named <i>config</i> in the current directory. If no <i>configfile</i> is found,
+ <b>Privoxy</b> will fail to start.</p><a name="DESCRIPTION"></a>
+ <h2>DESCRIPTION</h2>
+ <p style="margin-left:11%; margin-top: 1em">Privoxy is a non-caching web proxy with advanced filtering capabilities
+ for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other
+ obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and
+ tastes. It has application for both stand-alone systems and multi-user networks.</p>
+ <p style="margin-left:11%; margin-top: 1em">Privoxy is Free Software and licensed under the GNU GPLv2 or later.</p>
+ <p style="margin-left:11%; margin-top: 1em">Privoxy is an associated project of Software in the Public Interest
+ (SPI).</p>
+ <p style="margin-left:11%; margin-top: 1em">Helping hands and donations are welcome:</p>
+ <table width="100%" border="0" rules="none" frame="void" cellspacing="0" cellpadding="0">
+ <tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="1%">
+ <p style="margin-top: 1em" valign="top">•</p>
+ </td>
+ <td width="2%"></td>
+ <td width="80%">
+ <p style="margin-top: 1em" valign="top">https://www.privoxy.org/faq/general.html#PARTICIPATE</p>
+ </td>
+ <td width="6%"></td>
+ </tr>
+ <tr valign="top" align="left">
+ <td width="11%"></td>
+ <td width="1%">
+ <p style="margin-top: 1em" valign="top">•</p>
+ </td>
+ <td width="2%"></td>
+ <td width="80%">
+ <p style="margin-top: 1em" valign="top">https://www.privoxy.org/faq/general.html#DONATE</p>
+ </td>
+ <td width="6%"></td>
+ </tr>
+ </table><a name="INSTALLATION AND USAGE"></a>
+ <h2>INSTALLATION AND USAGE</h2>
+ <p style="margin-left:11%; margin-top: 1em">Browsers can either be individually configured to use <b>Privoxy</b> as a
+ HTTP proxy (recommended), or <b>Privoxy</b> can be combined with a packet filter to build an intercepting proxy (see
+ <i>config</i>). The default setting is for localhost, on port 8118 (configurable in the main config file). To set the
+ HTTP proxy in Firefox, go through: <b>Tools</b>; <b>Options</b>; <b>General</b>; <b>Connection Settings</b>;
+ <b>Manual Proxy Configuration</b>.</p>
+ <p style="margin-left:11%; margin-top: 1em">For Internet Explorer, go through: <b>Tools</b>; <b>Internet
+ Properties</b>; <b>Connections</b>; <b>LAN Settings</b>.</p>
+ <p style="margin-left:11%; margin-top: 1em">The Secure (SSL) Proxy should also be set to the same values, otherwise
+ https: URLs will not be proxied. Note: <b>Privoxy</b> can only proxy HTTP and HTTPS traffic. Do not try it with FTP
+ or other protocols. HTTPS presents some limitations, and not all features will work with HTTPS connections.</p>
+ <p style="margin-left:11%; margin-top: 1em">For other browsers, check the documentation.</p><a name=
+ "CONFIGURATION"></a>
+ <h2>CONFIGURATION</h2>
+ <p style="margin-left:11%; margin-top: 1em"><b>Privoxy</b> can be configured with the various configuration files.
+ The default configuration files are: <i>config</i>, <i>default.filter</i>, <i>default.action</i> and
+ <i>default.action</i>. <i>user.action</i> should be used for locally defined exceptions to the default rules in
+ <i>match-all.action</i> and <i>default.action</i>, and <i>user.filter</i> for locally defined filters. These are well
+ commented. On Unix and Unix-like systems, these are located in <i>/etc/privoxy/</i> by default.</p>
+ <p style="margin-left:11%; margin-top: 1em"><b>Privoxy</b> uses the concept of <b>actions</b> in order to manipulate
+ the data stream between the browser and remote sites. There are various actions available with specific functions for
+ such things as blocking web sites, managing cookies, etc. These actions can be invoked individually or combined, and
+ used against individual URLs, or groups of URLs that can be defined using wildcards and regular expressions. The
+ result is that the user has greatly enhanced control and freedom.</p>
+ <p style="margin-left:11%; margin-top: 1em">The actions list (ad blocks, etc) can also be configured with your web
+ browser at http://config.privoxy.org/ (assuming the configuration allows it). <b>Privoxy’s</b> configuration
+ parameters can also be viewed at the same page. In addition, <b>Privoxy</b> can be toggled on/off. This is an
+ internal page, and does not require Internet access.</p>
+ <p style="margin-left:11%; margin-top: 1em">See the <i>User Manual</i> for a detailed explanation of installation,
+ general usage, all configuration options, new features and notes on upgrading.</p><a name="FILES"></a>
+ <h2>FILES</h2>
+ <p style="margin-left:11%; margin-top: 1em"><i>/usr/sbin/privoxy<br>
+ /etc/privoxy/config<br>
+ /etc/privoxy/match-all.action<br>
+ /etc/privoxy/default.action<br>
+ /etc/privoxy/user.action<br>
+ /etc/privoxy/default.filter<br>
+ /etc/privoxy/user.filter<br>
+ /etc/privoxy/trust<br>
+ /etc/privoxy/templates/*<br>
+ /var/log/privoxy/logfile</i></p>
+ <p style="margin-left:11%; margin-top: 1em">Various other files should be included, but may vary depending on
+ platform and build configuration. Additional documentation should be included in the local documentation
+ directory.</p><a name="SIGNALS"></a>
+ <h2>SIGNALS</h2>
+ <p style="margin-left:11%; margin-top: 1em"><b>Privoxy</b> terminates on the <b>SIGINT</b> and <b>SIGTERM</b>
+ signals. Log rotation scripts may cause a re-opening of the logfile by sending a <b>SIGHUP</b> to <b>Privoxy</b>.
+ Note that unlike other daemons, <b>Privoxy</b> does not need to be made aware of config file changes by <b>SIGHUP</b>
+ -- it will detect them automatically. Signals other than the ones listed above aren’t explicitly handled and
+ result in the default action defined by the operating system.</p><a name="NOTES"></a>
+ <h2>NOTES</h2>
+ <p style="margin-left:11%; margin-top: 1em">Please see the <i>User Manual</i> on how to contact the developers, for
+ feature requests, reporting problems, and other questions.</p><a name="SEE ALSO"></a>
+ <h2>SEE ALSO</h2>
+ <p style="margin-left:11%; margin-top: 1em">Other references and sites of interest to <b>Privoxy</b> users:</p>
+ <p style="margin-left:11%; margin-top: 1em">https://www.privoxy.org/, the <b>Privoxy</b> Home page.</p>
+ <p style="margin-left:11%; margin-top: 1em">https://www.privoxy.org/faq/, the <b>Privoxy</b> FAQ.</p>
+ <p style="margin-left:11%; margin-top: 1em">https://www.privoxy.org/developer-manual/, the <b>Privoxy</b> developer
+ manual.</p>
+ <p style="margin-left:11%; margin-top: 1em">https://sourceforge.net/projects/ijbswa/, the Project Page for
+ <b>Privoxy</b> on SourceForge.</p>
+ <p style="margin-left:11%; margin-top: 1em">http://config.privoxy.org/, the web-based user interface. <b>Privoxy</b>
+ must be running for this to work. Shortcut: http://p.p/</p>
+ <p style="margin-left:11%; margin-top: 1em">https://sourceforge.net/tracker/?group_id=11118&atid=460288, to
+ submit ‘‘misses’’ and other configuration related suggestions to the developers.</p><a name=
+ "DEVELOPMENT TEAM"></a>
+ <h2>DEVELOPMENT TEAM</h2>
+ <p style="margin-left:11%; margin-top: 1em">Fabian Keil, lead developer<br>
+ David Schmidt<br>
+ Lee Rian<br>
+ Roland Rosenfeld<br>
+ Ian Silvester</p><a name="COPYRIGHT AND LICENSE"></a>
+ <h2>COPYRIGHT AND LICENSE</h2>
+ <p style="margin-left:11%; margin-top: 1em"><b>COPYRIGHT</b><br>
+ Copyright (C) 2001-2020 by Privoxy Developers <privoxy-devel@lists.privoxy.org></p>
+ <p style="margin-left:11%; margin-top: 1em">Some source code is based on code Copyright (C) 1997 by Anonymous Coders
+ and Junkbusters, Inc. and licensed under the <i>GNU General Public License</i>.</p>
+ <p style="margin-left:11%; margin-top: 1em"><b>LICENSE<br>
+ Privoxy</b> is free software; you can redistribute and/or modify its source code under the terms of the <i>GNU
+ General Public License</i> as published by the Free Software Foundation, either version 2 of the license, or (at your
+ option) any later version.</p>
+ <p style="margin-left:11%; margin-top: 1em">The same is true for <b>Privoxy</b> binaries unless they are linked with
+ a mbed TLS version that is licensed under the Apache 2.0 license in which case you can redistribute and/or modify the
+ <b>Privoxy</b> binaries under the terms of the <i>GNU General Public License</i> as published by the Free Software
+ Foundation, either version 3 of the license, or (at your option) any later version.</p>
+ <p style="margin-left:11%; margin-top: 1em"><b>Privoxy</b> is distributed in the hope that it will be useful, but
+ WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
+ the <i>license</i> for details.</p>
+ <hr>
+</body>
+</html>