To hear screen elements spoken to you, turn on the **Screen Reader** fromChoose **Accessibility Settings** in the accessibility menu (in the top bar, the[[!img lib/accessibility.png alt="" class="symbolic" link="no"]]). icon that looks like a person.
Choose **Accessibility Settings** in the accessibility menu in the top bar, the [[!img lib/accessibility.png alt="" class="symbolic" link="no"]] icon that looks like a person.
12
Such encrypted volumes are not hidden.<p>An attacker in possession of the device can know that there is an encrypted
volume on it. Take into consideration that you can be forced or tricked to give
out its passphrase.</p>
<p>An attacker in possession of the device can know that there is an encrypted volume on it. Take into consideration that you can be forced or tricked to give out its passphrase.</p>
37
Execute the following command. Replace <span class="command-placeholder">file.ext</span> with a path to the file that you want to clean.
Execute the following command. Replace <span class="command-placeholder">file.ext</span> with a path to the file that you want to clean.
63
Click on the padlockSelect the [[!img tor-circuit.png alt="Tor Circuit" class="symbolic"
link="no"]] button in the address bar to show the relays in theTor circuit
that is used to connect to the website in the current tab, its 3 relays, their countries, and IP addresses.
Select the [[!img tor-circuit.png alt="Tor Circuit" class="symbolic" link="no"]] button in the address bar to show the relays in the Tor circuit that is used to connect to the website in the current tab.
81
For example, having the following files inThe absolute path of the *Dotfiles* folder is */live/persistence/TailsData_unlocked/dotfiles*:.