Difference between revisions of "Introduction to TAILS"

From Hackerspace.gr
Jump to: navigation, search
(tails event add)
 
(img)
Line 1: Line 1:
 
{{Event
 
{{Event
|logo=https://www.hackerspace.gr/wiki/File:TAILS_logo_images.png
+
|logo=File:TAILS_logo_images.png
 
|what=Introduction to TAILS
 
|what=Introduction to TAILS
 
|tagline=The Amnesico Incognito Live System: it aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Let's go to see how it works, how join the community of developers and the workflow of documentation translation.
 
|tagline=The Amnesico Incognito Live System: it aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Let's go to see how it works, how join the community of developers and the workflow of documentation translation.
 
 
|eventowner=User:Sotiri
 
|eventowner=User:Sotiri
 
|who=ignifugo
 
|who=ignifugo
 
|url=https://tails.boum.org/index.en.html
 
|url=https://tails.boum.org/index.en.html
|from=2017/11/16 19:00:00  
+
|from=2017/11/16 07:00:00 PM
|till=2017/11/16 20:00:00  
+
|till=2017/11/16 08:00:00 PM
 
|location=38.01694322164, 23.731269990513
 
|location=38.01694322164, 23.731269990513
 
}}
 
}}

Revision as of 12:56, 11 November 2017


external link
Starts Organizer
Thu 16 Nov 2017 19:00 ignifugo
Ends Event Owner
Thu 16 Nov 2017 20:00 User:Sotiri

The Amnesico Incognito Live System: it aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Let's go to see how it works, how join the community of developers and the workflow of documentation translation.