Browse code

Fix TAILS links to use HTTPS (patch from intrigeri).

George Kadianakis authored on07/08/2013 17:37:50
Showing5 changed files
... ...
@@ -198,7 +198,7 @@ IP address. If you must work with DOC and/or PDF files, we strongly
198 198
 recommend either using a disconnected computer, downloading the free <a
199 199
 href="https://www.virtualbox.org/">VirtualBox</a> and using it with a <a
200 200
 href="http://virtualboxes.org/">virtual machine image</a> with networking
201
-disabled, or using <a href="http://tails.boum.org/">Tails</a>.
201
+disabled, or using <a href="https://tails.boum.org/">Tails</a>.
202 202
 Under no circumstances is it safe to use <a
203 203
 href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
204 204
 and Tor</a> together, however.</p>
... ...
@@ -328,7 +328,7 @@ your non-Tor IP address. If you must work with DOC and/or PDF files, we
328 328
 strongly recommend either using a disconnected computer,
329 329
 downloading the free <a href="https://www.virtualbox.org/">VirtualBox</a> and
330 330
 using it with a <a href="http://virtualboxes.org/">virtual machine image</a>
331
-with networking disabled, or using <a href="http://tails.boum.org/">Tails</a>.
331
+with networking disabled, or using <a href="https://tails.boum.org/">Tails</a>.
332 332
 Under no circumstances is it safe to use
333 333
 <a href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea">BitTorrent
334 334
 and Tor</a> together, however.
... ...
@@ -58,9 +58,9 @@
58 58
               -->
59 59
               <td>
60 60
                 <div class="project">
61
-                <a href="http://tails.boum.org/"><img
61
+                <a href="https://tails.boum.org/"><img
62 62
                 src="$(IMGROOT)/icon-Tails.jpg" alt="Tails Icon"></a>
63
-                <h3><a href="http://tails.boum.org/">Tails</a></h3>
63
+                <h3><a href="https://tails.boum.org/">Tails</a></h3>
64 64
                 <p>Live CD/USB distribution preconfigured to use Tor safely.</p>
65 65
                 </div>
66 66
               </td>
... ...
@@ -109,7 +109,7 @@ href="https://stem.torproject.org/">Stem</a></div>
109 109
 </div></div>
110 110
 
111 111
 <div class="projectbox">
112
-<a href="http://tails.boum.org/"><img class="icon"
112
+<a href="https://tails.boum.org/"><img class="icon"
113 113
 src="$(IMGROOT)/icon-Tails.jpg" alt="Tails Icon" width="75"
114 114
 height="75"></a>
115 115
 <div class="projectdesc"><div class="name"><a
... ...
@@ -510,7 +510,7 @@ has taken place. This adversary motivates our
510 510
 
511 511
 An adversary with arbitrary code execution typically has more power, though.
512 512
 It can be quite hard to really significantly limit the capabilities of such an
513
-adversary. <a class="ulink" href="http://tails.boum.org/contribute/design/" target="_top">The Tails system</a> can
513
+adversary. <a class="ulink" href="https://tails.boum.org/contribute/design/" target="_top">The Tails system</a> can
514 514
 provide some defense against this adversary through the use of readonly media
515 515
 and frequent reboots, but even this can be circumvented on machines without
516 516
 Secure Boot through the use of BIOS rootkits.