From 5a9f754eaee9235c6afb8c98d8c0b31ccd75b308 Mon Sep 17 00:00:00 2001 From: Jaromil Date: Wed, 26 Jan 2011 16:01:53 +0100 Subject: [PATCH] refinements to the website --- doc/web/views/index.muse | 63 +++++++++++++++++++++++----------------- 1 file changed, 37 insertions(+), 26 deletions(-) diff --git a/doc/web/views/index.muse b/doc/web/views/index.muse index faa2427..a486d8d 100644 --- a/doc/web/views/index.muse +++ b/doc/web/views/index.muse @@ -3,25 +3,29 @@ -* Tomb - RIP +* Tomb - Crypto Undertaker + + +[[images/tomb_n_bats.png]] + - ..... .. - .H8888888h. ~-. . uW8" - 888888888888x `> u. .. . : `t888 -X~ `?888888hx~ ...ue888b .888: x888 x888. 8888 . -' x8.^"*88*" 888R Y888r ~`8888~'888X`?888f` 9888.z88N - `-:- X8888x 888R I888> X888 888X '888> 9888 888E - 488888> 888R I888> X888 888X '888> 9888 888E - .. `"88* 888R I888> X888 888X '888> 9888 888E - x88888nX" . u8888cJ888 X888 888X '888> 9888 888E - !"*8888888n.. : "*888*P" "*88%""*88" '888!` .8888 888" -' "*88888888* 'Y" `~ " `"` `%888*%" - ^"***"` "` + ..... .. + .H8888888h. ~-. . uW8" + 888888888888x `> u. .. . : `t888 + X~ `?888888hx~ ...ue888b .888: x888 x888. 8888 . + ' x8.^"*88*" 888R Y888r ~`8888~'888X`?888f` 9888.z88N + `-:- X8888x 888R I888> X888 888X '888> 9888 888E + 488888> 888R I888> X888 888X '888> 9888 888E + .. `"88* 888R I888> X888 888X '888> 9888 888E + x88888nX" . u8888cJ888 X888 888X '888> 9888 888E + !"*8888888n.. : "*888*P" "*88%""*88" '888!` .8888 888" + ' "*88888888* 'Y" `~ " `"` `%888*%" + ^"***"` "` - a simple commandline tool to manage encrypted storage v.0.9 - http://tomb.dyne.org by Jaromil @ dyne.org + a simple commandline tool to manage encrypted storage v.0.9 + by Jaromil @ dyne.org ** Introduction @@ -51,34 +55,41 @@ We've felt the urgency of publishing Tomb for other operating systems than dyne:bolic since the current situation with [[http://en.wikipedia.org/wiki/TrueCrypt][TrueCrypt]] is far from optimal. TrueCrypt makes use of statically linked libraries, its code is not hosted on CVS and is [[http://lists.freedesktop.org/archives/distributions/2008-October/000276.html][not considered free]] by GNU/Linux -distributions because of liability reasons, see [[http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034][Debian]], [[https://bugs.edge.launchpad.net/ubuntu/+bug/109701][Ubuntu]][4], -Suse[5], Gentoo[6] and Fedora[7]. +distributions because of liability reasons, see [[http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034][Debian]], [[https://bugs.edge.launchpad.net/ubuntu/+bug/109701][Ubuntu]], +[[http://lists.opensuse.org/opensuse-buildservice/2008-10/msg00055.html][Suse]], [[http://bugs.gentoo.org/show_bug.cgi?id=241650][Gentoo]] and [[https://fedoraproject.org/wiki/ForbiddenItems#TrueCrypt][Fedora]]. Seen from this perspective, Tomb is intended as a rewrite of most -functionalities offered by TrueCrypt in a new application, confident -it won't take much relying on previous experience and aiming at: +functionality offered by TrueCrypt in a new application, confident it +won't take much relying on previous experience and aiming at: - short and readable code, linking shared libs and common components - easy graphical interface, simple for ad-hoc (DIY-deniable) - transparent and distributed development hosted using GIT - GNU General Public License v3 -[1] http://en.wikipedia.org/wiki/TrueCrypt -[2] http://lists.freedesktop.org/archives/distributions/2008-October/000276.html -[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034 -[4] https://bugs.edge.launchpad.net/ubuntu/+bug/109701 -[5] http://lists.opensuse.org/opensuse-buildservice/2008-10/msg00055.html -[6] http://bugs.gentoo.org/show\_bug.cgi?id=241650 -[7] https://fedoraproject.org/wiki/ForbiddenItems#TrueCrypt *** How does it works + +Tombs are operated from a normal file browser or from the commandline. + +To open a tomb is sufficient to click on it, or use the command **tomb-open** + +[[images/monmort.png]] + +When a tomb is open your panel will have a little icon in the tray +reminding you that a tomb is open, offering to explore it or close it. + Tomb generates 'key files' and protects them with a password choosen by the user; the key files are then used to encrypt loop-back mounted partitions, like single files containing a filesystem inside: this way keys can be separated from data for safer transports when required. +For more information on how to operate Tomb from the commandline, the +backend tool **tomb** comes complete with a brief --help and a +[[manual][manual page]]. + ** Downloads For licensing information see the [[http://www.gnu.org/copyleft/gpl.html][GNU General Public License]]