Difference between revisions of "Introduction to TAILS"
From Hackerspace.gr
(tails event add) |
(img) |
||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
− | |logo= | + | |logo=File:TAILS_logo_images.png |
|what=Introduction to TAILS | |what=Introduction to TAILS | ||
|tagline=The Amnesico Incognito Live System: it aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Let's go to see how it works, how join the community of developers and the workflow of documentation translation. | |tagline=The Amnesico Incognito Live System: it aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Let's go to see how it works, how join the community of developers and the workflow of documentation translation. | ||
− | |||
|eventowner=User:Sotiri | |eventowner=User:Sotiri | ||
|who=ignifugo | |who=ignifugo | ||
|url=https://tails.boum.org/index.en.html | |url=https://tails.boum.org/index.en.html | ||
− | |from=2017/11/16 | + | |from=2017/11/16 07:00:00 PM |
− | |till=2017/11/16 | + | |till=2017/11/16 08:00:00 PM |
|location=38.01694322164, 23.731269990513 | |location=38.01694322164, 23.731269990513 | ||
}} | }} |
Revision as of 12:56, 11 November 2017
external link |
Starts | Organizer |
---|---|---|
Thu 16 Nov 2017 19:00 | ignifugo | |
Ends | Event Owner | |
Thu 16 Nov 2017 20:00 | User:Sotiri |
The Amnesico Incognito Live System: it aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Let's go to see how it works, how join the community of developers and the workflow of documentation translation.