This page describes some of the security measures built into Tails to protect from such attacks and explains how to access some types of resources on the local network.
This page describes some of the security measures built into Tails to protect from such attacks and explains how to access some types of resources on the local network.
To hear screen elements spoken to you, turn on the **Screen Reader** fromChoose **Accessibility Settings** in the accessibility menu (in the top bar, the[[!img lib/accessibility.png alt="" class="symbolic" link="no"]]). icon that looks like a person.
Choose **Accessibility Settings** in the accessibility menu in the top bar, the [[!img lib/accessibility.png alt="" class="symbolic" link="no"]] icon that looks like a person.
12
Such encrypted volumes are not hidden.<p>An attacker in possession of the device can know that there is an encrypted
volume on it. Take into consideration that you can be forced or tricked to give
out its passphrase.</p>
<p>An attacker in possession of the device can know that there is an encrypted volume on it. Take into consideration that you can be forced or tricked to give out its passphrase.</p>
In the **Authentication Required** dialog, enter your administration password.
14
When startopening *Thunderbird* for the first time, an assistant appears to guide you through the process of configuring *Thunderbird* to access your email account.
When opening *Thunderbird* for the first time, an assistant appears to guide you through the process of configuring *Thunderbird* to access your email account.