Author: asn
Date: 2013-08-07 15:37:50 +0000 (Wed, 07 Aug 2013)
New Revision: 26289

Modified:
   website/trunk/download/en/download-easy.wml
   website/trunk/download/en/download.wml
   website/trunk/en/index.wml
   website/trunk/projects/en/projects.wml
   website/trunk/projects/torbrowser/design/index.html.en
Log:
Fix TAILS links to use HTTPS (patch from intrigeri).

Modified: website/trunk/download/en/download-easy.wml
===================================================================
--- website/trunk/download/en/download-easy.wml 2013-08-07 12:46:27 UTC (rev 
26288)
+++ website/trunk/download/en/download-easy.wml 2013-08-07 15:37:50 UTC (rev 
26289)
@@ -198,7 +198,7 @@
 recommend either using a disconnected computer, downloading the free <a
 href="https://www.virtualbox.org/";>VirtualBox</a> and using it with a <a
 href="http://virtualboxes.org/";>virtual machine image</a> with networking
-disabled, or using <a href="http://tails.boum.org/";>Tails</a>.
+disabled, or using <a href="https://tails.boum.org/";>Tails</a>.
 Under no circumstances is it safe to use <a
 
href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea";>BitTorrent
 and Tor</a> together, however.</p>

Modified: website/trunk/download/en/download.wml
===================================================================
--- website/trunk/download/en/download.wml      2013-08-07 12:46:27 UTC (rev 
26288)
+++ website/trunk/download/en/download.wml      2013-08-07 15:37:50 UTC (rev 
26289)
@@ -328,7 +328,7 @@
 strongly recommend either using a disconnected computer,
 downloading the free <a href="https://www.virtualbox.org/";>VirtualBox</a> and
 using it with a <a href="http://virtualboxes.org/";>virtual machine image</a>
-with networking disabled, or using <a href="http://tails.boum.org/";>Tails</a>.
+with networking disabled, or using <a href="https://tails.boum.org/";>Tails</a>.
 Under no circumstances is it safe to use
 <a 
href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea";>BitTorrent
 and Tor</a> together, however.

Modified: website/trunk/en/index.wml
===================================================================
--- website/trunk/en/index.wml  2013-08-07 12:46:27 UTC (rev 26288)
+++ website/trunk/en/index.wml  2013-08-07 15:37:50 UTC (rev 26289)
@@ -58,9 +58,9 @@
               -->
               <td>
                 <div class="project">
-                <a href="http://tails.boum.org/";><img
+                <a href="https://tails.boum.org/";><img
                 src="$(IMGROOT)/icon-Tails.jpg" alt="Tails Icon"></a>
-                <h3><a href="http://tails.boum.org/";>Tails</a></h3>
+                <h3><a href="https://tails.boum.org/";>Tails</a></h3>
                 <p>Live CD/USB distribution preconfigured to use Tor 
safely.</p>
                 </div>
               </td>

Modified: website/trunk/projects/en/projects.wml
===================================================================
--- website/trunk/projects/en/projects.wml      2013-08-07 12:46:27 UTC (rev 
26288)
+++ website/trunk/projects/en/projects.wml      2013-08-07 15:37:50 UTC (rev 
26289)
@@ -109,7 +109,7 @@
 </div></div>
 
 <div class="projectbox">
-<a href="http://tails.boum.org/";><img class="icon"
+<a href="https://tails.boum.org/";><img class="icon"
 src="$(IMGROOT)/icon-Tails.jpg" alt="Tails Icon" width="75"
 height="75"></a>
 <div class="projectdesc"><div class="name"><a

Modified: website/trunk/projects/torbrowser/design/index.html.en
===================================================================
--- website/trunk/projects/torbrowser/design/index.html.en      2013-08-07 
12:46:27 UTC (rev 26288)
+++ website/trunk/projects/torbrowser/design/index.html.en      2013-08-07 
15:37:50 UTC (rev 26289)
@@ -510,7 +510,7 @@
 
 An adversary with arbitrary code execution typically has more power, though.
 It can be quite hard to really significantly limit the capabilities of such an
-adversary. <a class="ulink" href="http://tails.boum.org/contribute/design/"; 
target="_top">The Tails system</a> can
+adversary. <a class="ulink" href="https://tails.boum.org/contribute/design/"; 
target="_top">The Tails system</a> can
 provide some defense against this adversary through the use of readonly media
 and frequent reboots, but even this can be circumvented on machines without
 Secure Boot through the use of BIOS rootkits.

_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to