Commit 5cba8e58 authored by Tails developers's avatar Tails developers

Remove some mentions of FireGPG.

parent 6d056526
......@@ -83,7 +83,7 @@ encryption:
- Encrypt and sign your emails and documents, using the *de facto* standard
<span class="definition">[[!wikipedia OpenPGP]]</span> either from Tails
browser with FireGPG, or Tails email client or file browser.
email client or file browser.
- Protect your instant messaging conversations using <span
class="definition">[[!wikipedia Off-the-Record_Messaging
......
......@@ -967,9 +967,7 @@ extension provides more
fine-grained cookie control for users who need it. This prevents the
known leak of browsing informations cookies can lead to. The [Adblock
plus](https://addons.mozilla.org/fr/firefox/addon/1865/) extension
protects against many tracking possibilities by removing most ads. The
[FireGPG](http://getfiregpg.org/) plugin allows users to use GnuPG
inside websites such as webmails.
protects against many tracking possibilities by removing most ads.
Tails ships the [HTTPS
Everywhere](https://www.eff.org/https-everywhere) extension that
......@@ -1036,14 +1034,14 @@ name when answering to CTCP requests.
### 3.6.16 GnuPG
All GnuPG tools (namely: GPG itself, Seahorse and FireGPG) are
All GnuPG tools (namely: GPG itself and Seahorse) are
configured to use the keys.indymedia.org hidden-service keyserver (`hkp://2eghzlv2wwcq7u7y.onion`) since:
- it is run by privacy-friendly people who go as far as providing a
Tor hidden service;
- it is well-synchronized with the HKP keyservers pool.
GPG itself and FireGPG are configured to connect to this keyserver
GPG is configured to connect to this keyserver
over a TLS encrypted tunnel (`hkps://`). On the other hand Seahorse
[[does not support hkps|bugs/seahorse_does_not_support_hkps]] so it is
using cleartext `hkp://` instead.
......
......@@ -36,7 +36,6 @@ Check the output for:
- <http://monip.org/>
* does the exposed User-Agent match the generic Torbutton's one?
(connect to a website you can check the access logs for)
* firegpg: test symmetric encryption/decryption, same for asymmetric
* Entering `about:plugins` in the location bar should say no plugin is
installed in every one of the following cases:
1. Torbutton add-on enabled in *Tor enabled* status
......@@ -111,8 +110,8 @@ Check the output for:
# GnuPG
Those tests shall be run using GnuPG on the command-line, the
Seahorse GUI and FireGPG:
Those tests shall be run using GnuPG on the command-line and the
Seahorse GUI:
* key search/receive: torified? going to the configured keyserver?
- `gpg --search` tells what server it is connecting to
......
......@@ -18,7 +18,6 @@ Networking
* [Firefox](http://getfirefox.com) preconfigured with:
- [Torbutton](https://www.torproject.org/torbutton) for anonymity
and protection against evil JavaScript
- [FireGPG](http://getfiregpg.org) for e-mail encryption
- all cookies are treated as session cookies by default;
the [CS Lite](https://addons.mozilla.org/fr/firefox/addon/5207/)
extension provides more fine-grained cookie control for those who
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment