<p>Reporting errors is a great way of helping us improve Tails.Even if we are not able to reply to every report, we analyze all reportsto improve Tails.</p> .
<p>If you are not connected to the Tor network yet, your cannot send us your report from Tails.</p>
11
To hear screen elements spoken to you, turn on the **Screen Reader** fromChoose **Accessibility Settings** in the accessibility menu (in the top bar, the[[!img lib/accessibility.png alt="" class="symbolic" link="no"]]). icon that looks like a person.
Choose **Accessibility Settings** in the accessibility menu in the top bar, the [[!img lib/accessibility.png alt="" class="symbolic" link="no"]] icon that looks like a person.
12
Such encrypted volumes are not hidden.<p>An attacker in possession of the device can know that there is an encrypted
volume on it. Take into consideration that you can be forced or tricked to give
out its passphrase.</p>
<p>An attacker in possession of the device can know that there is an encrypted volume on it. Take into consideration that you can be forced or tricked to give out its passphrase.</p>
12
You can vVisiting <https://bridges.torproject.org/options>.
Execute the following command. Replace <span class="command-placeholder">file.ext</span> with a path to the file that you want to clean.
38
1.Choose <span class="menuchoice"> **Applications** ▸ ****Apps ▸System Tools** ▸ **Root Terminal** </span> to open a terminal with administration rights. Console**.
To change the security level, click onSelect the [[!img security-level.png link="no"class="symbolic"link="no"]] icon on the right of the address bar and choose **Settings…**. .