The Activities button [[!img lib/activities.png class="symbolic" link="no" alt=""]]
8
The Tor relays are run by volunteers in a decentralized way. So all relays are not of the same quality. Some are big and fast, while some others are smaller and slower. As a whole, the network could be faster if it had more capacity. To improve the capacity of the Tor network, you can either run a Tor relay yourself or [help existing relays](https://www.torservers.net/partners.htmlmembers/).
The Tor relays are run by volunteers in a decentralized way. So all relays are not of the same quality. Some are big and fast, while some others are smaller and slower. As a whole, the network could be faster if it had more capacity. To improve the capacity of the Tor network, you can either run a Tor relay yourself or [help existing relays](https://torservers.net/members/).
When startopening *Thunderbird* for the first time, an assistant appears to guide you through the process of configuring *Thunderbird* to access your email account.
When opening *Thunderbird* for the first time, an assistant appears to guide you through the process of configuring *Thunderbird* to access your email account.
To learn about all keyboard shortcuts in GNOME visit [GNOME Help: Useful keyboard shortcuts](https://help.gnome.org/users/gnome-help/stable/shell-keyboard-shortcuts.html.en)or use the *Settings* utility in Tails:
To learn about all keyboard shortcuts in GNOME visit [GNOME Help: Useful keyboard shortcuts](https://help.gnome.org/gnome-help/shell-keyboard-shortcuts.html)or use the *Settings* utility in Tails:
17
<p>If your usual operating system is in hibernation, accessing it might corrupt your file system. Only access your disk if your system was shut down properentirely.</p>
<p>If your usual operating system is in hibernation, accessing it might corrupt your file system. Only access your disk if your system was shut down entirely.</p>
The **Apps** menu provides launchers for the [[included software|about/features]] and GNOMEutilities.
18
Ubuntu adds features in ways that we find dangerous for privacy. For anexampleUbuntu One ([partly discontinued](http://blog.canonical.com/2014/04/02/shutting-down-ubuntu-one-file-services/))and the [, see [EFF: Privacy in Ubuntu 12.10,Amazon aAds and dData lLeaks](https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks).
Ubuntu adds features in ways that we find dangerous for privacy. For an example, see [EFF: Privacy in Ubuntu 12.10, Amazon Ads and Data Leaks](https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks).
18
To learn more about what information is available to someone observing the different parts of a Tor circuit, see the interactive graphics at <a href="https://support.torproject.org/https/https-1/">Tor FAQ: Can exit nodes eavesdrop on communications?</a>[[Tor Support: How HTTPS encryption and Tor works in Tor Browser to enhance your privacy and anonymity|https://support.torproject.org/about-tor/security/https-encryption-and-tor/]].
To learn more about what information is available to someone observing the different parts of a Tor circuit, see the interactive graphics at [[Tor Support: How HTTPS encryption and Tor works in Tor Browser to enhance your privacy and anonymity|https://support.torproject.org/about-tor/security/https-encryption-and-tor/]].
We have no plans to add I2P back in Tails because I2P hasn't yet become popular and usable enough to matter toke a real difference for our [[target audience|contribute/personas]].
We have no plans to add I2P back in Tails because I2P hasn't yet become popular and usable enough to make a real difference for our [[target audience|contribute/personas]].