Commit 10aa0702 authored by Tails developers's avatar Tails developers

Replace '#index' links by named anchors.

parent da75d221
......@@ -67,6 +67,8 @@ from data recovery after shutdown. Of course, you can still explicitly save
some documents to another USB or external hard-disk and take them aways for
future use.
<a id="cryptography"></a>
State-of-the-art cryptographic tools
====================================
......
......@@ -37,7 +37,7 @@ Paradise.](http://www.wired.com/politics/security/news/2007/09/embassy_hacks).
**Tails includes many tools to help you using strong encryption** while
browsing, sending email or chatting, as presented on our [[about
page|about#index3h1]].
page|about#cryptography]].
Tails makes it clear that you are using Tor and probably Tails
==============================================================
......@@ -55,6 +55,8 @@ the Tor Project.
The anonymity provided by Tor and Tails works by trying to make all of their
users look the same so it's not possible to identify who is who amongst them.
<a id="man-in-the-middle"></a>
Man-in-the-middle attacks
=========================
......@@ -240,5 +242,5 @@ Tails is a work in progress
Tails, as well as all the software it includes, are on continuous development
and might contain programming errors or security holes. [[Stay
tuned|download#index5h1]] to Tails development. Do not rely on it for strong
tuned|download#stay_tuned]] to Tails development. Do not rely on it for strong
anonymity.
......@@ -2,6 +2,8 @@
[[!toc levels=2]]
<a id="why"></a>
Why use secure deletion?
========================
......@@ -28,6 +30,8 @@ the device and directly accessing/reading from its components.
<p class="quoted-from">Quoted from [[!wikipedia Secure_file_deletion
desc="Wikipedia: %s"]].</p>
<a id="usb_and_ssd"></a>
Warning about USB sticks and solid-state drives
===============================================
......@@ -81,6 +85,8 @@ Once the deletion will be done you should be prompted with a message saying:
[[!img wipe_successful.png link=no alt="Wipe successful."]]
<a id="clean_disk_space"></a>
Securely clean available disk space
===================================
......@@ -90,7 +96,7 @@ the free space on the disk.
This is the recommended method, in most cases, for securely deleting data from a
USB stick or from a solid-state drive, where securely deleting individual files [[do
not work as expected|secure_deletion#index2h1]].
not work as expected|secure_deletion#usb_and_ssd]].
The disk or the folder may or may not contain other files. Those files will not
be deleted during the operation.
......
......@@ -13,6 +13,8 @@ package. You can do:
apt-get install syslinux
<a id="step_2"></a>
<h2 class="bullet-number-two">Find out the device name of the USB stick</h2>
**Warning!** If you are not sure about the device name it is recommended to stop
......@@ -48,12 +50,14 @@ stick, its brand, its size, etc. on the right side of the screen.
On this screenshot, the USB stick is a Kingston DataTraveler of 2.0
GB and its device name is `/dev/sdc`. Yours could be different.
<a id="step_3"></a>
<h2 class="bullet-number-three">Do the copy from the terminal</h2>
Open a terminal from the menu *Applications* → *Accessories* → *Terminal* and
issue the following command, replacing `[tails.iso]` by the path to the ISO
image that you want to copy and `[device]` by the device name found in [[step
1|manual_usb_installation#index1h2]].
2|linux#step_2]].
isohybrid [tails.iso] --entry 4 --type 0x1c
cat [tails.iso] > [device] && sync
......@@ -80,7 +84,7 @@ Troubleshooting
### cat: /dev/sdx: No such file or directory
Then double-check the name of the device you found in [[step
2|manual_usb_installation#index2h2]].
2|linux#step_2]].
### cat: /dev/sdx: Permission denied
......@@ -96,4 +100,4 @@ commands in the terminal. That could be:
### cat: tails.iso: No such file or directory
Then you surely have committed a mistake on the path to the ISO image in [[step
3|manual_usb_installation#index3h2]].
3|linux#step_3]].
......@@ -16,7 +16,7 @@ the same USB stick without having to reinstall Tails.
<div class="caution">
<strong>This technique may not prevent an attacker to recover the files of the
old persistent volume using [[data
recovery techniques|encryption_and_privacy/secure_deletion#index1h1]].</strong>
recovery techniques|encryption_and_privacy/secure_deletion#why]].</strong>
For more security, start Tails from another media, and do the following
operations on the USB stick that you want to delete securely:
......@@ -25,7 +25,7 @@ operations on the USB stick that you want to delete securely:
on the whole USB stick. This step erases both Tails and the persistent volume
from the USB stick.</li>
<li>[[Securely clean all the available disk
space|encryption_and_privacy/secure_deletion#index4h1]] on this new encrypted
space|encryption_and_privacy/secure_deletion#clean_disk_space]] on this new encrypted
partition.</li>
<li>[[Reinstall Tails|usb_installer]] on the USB stick.</li>
<li>Start Tails from the USB stick and [[create a new persistent
......
......@@ -9,7 +9,7 @@ Enable the Persistent Volume
1. When starting Tails, in the
<span class="guilabel">Use persistence?</span> dialog of [[Tails
Greeter|startup_options#index2h1]], choose <span class="guilabel">Yes</span> to
Greeter|startup_options#tails_greeter]], choose <span class="guilabel">Yes</span> to
enable the persistent volume for the current working session.
2. Enter the passphrase of the persistent volume in the
......
......@@ -10,7 +10,7 @@ stick can know that there is a persistent volume on it. Take into consideration
that you can be forced or tricked to give out its passphrase.
Note also that **secure deletion does not work as expected on USB sticks.**<br/>
[[See the corresponding documentation.|encryption_and_privacy/secure_deletion#index2h1]]
[[See the corresponding documentation.|encryption_and_privacy/secure_deletion#usb_and_ssd]]
Read also how to [[delete the persistent volume|delete]].
Overwriting Configurations
......
......@@ -27,7 +27,7 @@ Use WhisperBack
**WhisperBack is an application written specifically to report bugs anonymously
from inside Tails. If you are not able to use WhisperBack, see the [[special
cases|report_a_bug#index4h1]].**
cases|report_a_bug#special_cases]].**
WhisperBack will help you fill-up a bug report, including relevant technical
details and send it to us encrypted and through Tor.
......@@ -93,6 +93,8 @@ Once your email has been sent correctly you will get the following notification.
[[!img your_message_has_been_sent.png link=no alt="Your message has been sent"]]
<a id="special_cases"></a>
Special cases
=============
......
......@@ -4,5 +4,5 @@ reset it.
**The content of the USB stick will be lost in the operation,** but an attacker
might still be able to tell that Tails was installed on the USB stick using
[[data recovery techniques|encryption_and_privacy/secure_deletion]] unless you
[[securely clean all the available disk space|encryption_and_privacy/secure_deletion#index4h1]]
[[securely clean all the available disk space|encryption_and_privacy/secure_deletion#usb_and_ssd]]
afterwards.
......@@ -4,6 +4,8 @@
[[!toc levels=1]]
<a id="disk_utility"></a>
Using <span class="application">GNOME Disk Utility</span>
=========================================================
......@@ -55,11 +57,11 @@ directly from that USB stick running Tails.
1. When starting Tails, add the <span class="command">toram</span> boot
option in the <span class="application">boot menu</span>. For detailed
instructions, see the documentation on [[using the <span
class="application">boot menu</span>|startup_options#index1h1]].
class="application">boot menu</span>|startup_options#boot_menu]].
2. If Tails starts as usual, follow the instructions for [[resetting a USB stick
using <span class="application">Disk
Utility</span>|resetting_a_usb_stick#index2h1]].
Utility</span>|linux#disk_utility]].
**If the system fails to start**, that means that the computer does not have
enough memory for this operation mode. Try with another computer, or find
......
[[!meta title="Start Tails"]]
**FIXME**: content of [[download#index6h1]] would have its place here
**FIXME**: content of [[download#start]] would have its place here
rather than in the dowload page.
It is also possible to [[start Tails as a guest in a virtualization
......
......@@ -5,6 +5,8 @@ functionning. The two ways of specifying startup options are the following:
[[!toc levels=1]]
<a id="boot_menu"></a>
Using the <span class="application">boot menu</span>
====================================================
......@@ -33,6 +35,8 @@ menu</span>:
- <span class="command">winxp</span>, to activate the [[Windows
Camouflage|windows_camouflage]]
<a id="tails_greeter"></a>
Using <span class="application">Tails Greeter</span>
====================================================
......
......@@ -15,7 +15,7 @@ knowledge.
In order to perform administration tasks, you need to setup an administration
password when starting Tails, using [[<span class="application">Tails
greeter</span>|startup_options#index2h1]].
greeter</span>|startup_options#tails_greeter]].
1. When <span class="application">Tails greeter</span> appears, in the
<span class="guilabel">Welcome to Tails</span> window, click on the
......
......@@ -13,4 +13,4 @@ this and have them available (e.g. written down on a piece of paper).
To activate the Tor bridge mode, add the <span class="command">bridge</span>
boot option in the <span class="application">boot menu</span>. For detailed
instructions, see the documentation on [[using the <span
class="application">boot menu</span>|startup_options#index1h1]].
class="application">boot menu</span>|startup_options#boot_menu]].
......@@ -7,7 +7,7 @@ resembles Microsoft Windows XP.
To activate the Windows camouflage, add the <span class="command">winxp</span>
boot option in the <span class="application">boot menu</span>. For detailed
instructions, see the documentation on [[using the <span
class="application">boot menu</span>|startup_options#index1h1]].
class="application">boot menu</span>|startup_options#boot_menu]].
This is how your Tails desktop will look like:
......
......@@ -10,7 +10,7 @@ In order to use <span class="application">Tails USB installer</span>, you need
to start Tails from another media, and clone it onto the USB stick that you want
to install. You can either:
- **[[Burn a Tails DVD|download#index4h1]]** (recommended).
- **[[Burn a Tails DVD|download#support]]** (recommended).
- **Use another Tails USB stick**, version 0.11 or later, for example from a friend.
- **[[Manually install Tails onto another USB
stick|manual_usb_installation]]**, if you can't use a DVD.
......
- [[First time user?|download#index1h1]]
- [[Download the ISO image|download#index2h1]]
- [[Verify the ISO image|download#index3h1]]
- [[First time user?|download#first_time]]
- [[Download the ISO image|download#download_iso]]
- [[Verify the ISO image|download#verify]]
- [[Using Gnome: Ubuntu, Debian, Tails, etc.|get/verify_the_iso_image_using_gnome]]
- [[Using Linux with the command line|get/verify_the_iso_image_using_the_command_line]]
- [[Using other operating systems|get/verify_the_iso_image_using_other_operating_systems]]
- [[Burn a DVD or install onto a USB stick|download#index4h1]]
- [[Stay tuned|download#index5h1]]
- [[Starting Tails!|download#index6h1]]
- [[Burn a DVD or install onto a USB stick|download#media]]
- [[Stay tuned|download#stay_tuned]]
- [[Start Tails!|download#start]]
......@@ -48,7 +48,7 @@ on a website is defined by certificate authorities: a hierarchical and closed
set of companies and governmental institutions approved by web browser vendors.
This model of trust has long been criticized and proved several times to be
vulnerable to attacks [[as explained on our warning
page|about/warning#index3h1]].
page|about/warning#man-in-the-middle]].
We believe instead that users should be given the final say when trusting a
website, and that designation of trust should be done on the basis of human
......
......@@ -7,7 +7,7 @@ share it without restriction.</strong>
[[!toc levels=1]]
<div id="first_time_user">
<div id="first_time">
<h1 class="bullet-number-one">First time user?</h1>
......@@ -25,7 +25,7 @@ share it without restriction.</strong>
</div>
<div id="download_the_image" class="container">
<div id="download_iso" class="container">
<h1 class="bullet-number-two">Download the ISO image</h1>
......@@ -50,7 +50,7 @@ share it without restriction.</strong>
[[!inline pages="lib/download_stable_i386_iso_sig" raw="yes"]]
<p>If you're not sure what the cryptographic signature is, please go on
and read the part on [[verifying the ISO image|download#index3h1]].</p>
and read the part on [[verifying the ISO image|download#verify]].</p>
<h3>Set up a web mirror</h3>
......@@ -105,7 +105,8 @@ share it without restriction.</strong>
<p>Those techniques rely on standard HTTPS and <span
class="definition">[[!wikipedia Certificate_authority desc="certificate
authorities"]]</span> to make you trust the content of this website.
But, [[as explained on our warning page|doc/about/warning#index3h1]], you
But, [[as explained on our warning
page|doc/about/warning#man-in-the-middle]], you
could still be victim of a man-in-the-middle attack while using HTTPS.
On this website as much as on any other of the Internet.</p>
......@@ -169,7 +170,7 @@ share it without restriction.</strong>
<p>But the Tails signing key that you downloaded from this website could
be a fake one if you were victim of a [[man-in-the-middle
attack|doc/about/warning#index3h1]].</p>
attack|doc/about/warning#man-in-the-middle]].</p>
<p>Finding a way of trusting better Tails signing key would allow you to
authenticate better the ISO image you downloaded. The following page
......@@ -184,7 +185,7 @@ share it without restriction.</strong>
</div> <!-- #verify -->
<div id="support">
<div id="media">
<h1 class="bullet-number-four">Burn a DVD or install onto a USB stick</h1>
......@@ -275,7 +276,7 @@ share it without restriction.</strong>
</div> <!-- #stay_tuned-->
<div id="boot">
<div id="start">
<h1 class="bullet-number-six">Start Tails!</h1>
......
......@@ -12,7 +12,7 @@ against**, how you can screw up your anonymity or leave traces.
installing it|download]].
4. Throughout your use of Tails, it's very important to [[stay up to
date|download#index4h1]] with security issues and new versions.
date|download#stay_tuned]] with security issues and new versions.
Learning more about Tails…
--------------------------
......
......@@ -14,7 +14,7 @@ Using HTTPS instead of plain HTTP to connect to a website allows you to encrypt
your communication with the server. But encryption alone does not guarantee
that you are talking with the right server, and not
someone impersonating it, for example in case of a [[man-in-the-middle
attack|doc/about/warning#index3h1]].
attack|doc/about/warning#man-in-the-middle]].
SSL certificates try to solve this problem. A SSL certificate is usually issued by
a certificate authority to certify the identity of a server. When you reach a
......@@ -48,7 +48,7 @@ Why get a commercial certificate then?
Still we decided to get a commercial certificate for the following reasons:
- It makes it harder to setup a simplistic [[man-in-the-middle
attacks|doc/about/warning#index3h1]] against the people who didn't use HTTPS so
attacks|doc/about/warning#man-in-the-middle]] against the people who didn't use HTTPS so
far to visit our website.
- Our website now is only available with HTTPS enabled. This may be
important to provide some confidentiality while posting on the forum
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment