Difference between revisions of "Introduction to TAILS"
From Hackerspace.gr
(img) |
|||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
− | |logo= | + | |logo=TAILS_logo_images.png |
|what=Introduction to TAILS | |what=Introduction to TAILS | ||
− | |tagline=The Amnesico Incognito Live System | + | |tagline=''The Amnesico Incognito Live System'' |
+ | It aims at preserving your privacy and anonymity, and helps you to: | ||
+ | * use the Internet anonymously and circumvent censorship; | ||
+ | * all connections to the Internet are forced to go through the Tor network; | ||
+ | * leave no trace on the computer you are using unless you ask it explicitly; | ||
+ | * use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. | ||
+ | |||
+ | Let's go to see how it works, how join the community of developers and the workflow of documentation translation. | ||
|eventowner=User:Sotiri | |eventowner=User:Sotiri | ||
|who=ignifugo | |who=ignifugo |
Latest revision as of 12:58, 11 November 2017
external link |
Starts | Organizer |
---|---|---|
Thu 16 Nov 2017 19:00 | ignifugo | |
Ends | Event Owner | |
Thu 16 Nov 2017 20:00 | User:Sotiri |
The Amnesico Incognito Live System It aims at preserving your privacy and anonymity, and helps you to:
- use the Internet anonymously and circumvent censorship;
- all connections to the Internet are forced to go through the Tor network;
- leave no trace on the computer you are using unless you ask it explicitly;
- use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
Let's go to see how it works, how join the community of developers and the workflow of documentation translation.