The Activities button [[!img lib/activities.png class="symbolic" link="no" alt=""]]
11
To hear screen elements spoken to you, turn on the **Screen Reader** fromChoose **Accessibility Settings** in the accessibility menu (in the top bar, the[[!img lib/accessibility.png alt="" class="symbolic" link="no"]]). icon that looks like a person.
Choose **Accessibility Settings** in the accessibility menu in the top bar, the [[!img lib/accessibility.png alt="" class="symbolic" link="no"]] icon that looks like a person.
12
Such encrypted volumes are not hidden.<p>An attacker in possession of the device can know that there is an encrypted
volume on it. Take into consideration that you can be forced or tricked to give
out its passphrase.</p>
<p>An attacker in possession of the device can know that there is an encrypted volume on it. Take into consideration that you can be forced or tricked to give out its passphrase.</p>
14
IOpen the BIOS or UEFI settings, try to apply the following changes:of the computer.
1.Choose <span class="menuchoice"> **Applications** ▸ ****Apps ▸System Tools** ▸ **Root Terminal** </span> to open a terminal with administration rights. Console**.
Choose **Apps ▸ System Tools ▸ Console**.
44
You can also explore the content of the Persistent Storage on your broken Tails from the *Files* browser. To do so, execute the following command from the *Root Terminal*:Console*.
You can also explore the content of the Persistent Storage on your broken Tails from the *Files* browser. To do so, execute the following command from the *Console*.
You can change the security level of *Tor Browser* to disable browser features as a trade-off between security and usability.For example, you can set the security level to *Safest* to disable JavaScript completely.