summaryrefslogtreecommitdiffstats
path: root/wiki/src/doc/about/warning.mdwn
diff options
context:
space:
mode:
authorBitingBird <bitingbird@riseup.net>2015-07-04 16:10:04 (GMT)
committerBitingBird <bitingbird@riseup.net>2015-07-04 16:10:04 (GMT)
commitac94817118be25473b0bddbccd972883e237e883 (patch)
treeaa50bce40fce329d0a33496e7d737924a6d44952 /wiki/src/doc/about/warning.mdwn
parent981713ade6c7249bf272a6063f4734bb3e5a6a6c (diff)
saparate BIOS/firmware attacks (#7076)
Diffstat (limited to 'wiki/src/doc/about/warning.mdwn')
-rw-r--r--wiki/src/doc/about/warning.mdwn17
1 files changed, 11 insertions, 6 deletions
diff --git a/wiki/src/doc/about/warning.mdwn b/wiki/src/doc/about/warning.mdwn
index 83fcbdc..391faca 100644
--- a/wiki/src/doc/about/warning.mdwn
+++ b/wiki/src/doc/about/warning.mdwn
@@ -10,17 +10,13 @@ make a good use of it.
<a id="compromized_hardware"></a>
-Tails does not protect against compromized hardware, BIOS or firmware attacks
-=============================================================================
+Tails does not protect against compromized hardware
+===================================================
If the computer has been compromised by someone having physical access
to it and who installed untrusted pieces of hardware (like a
keylogger), then it might not be safe to use Tails.
-Tails can also not protect against BIOS or firmware attacks. Those are
-not managed by the operating system, and in practice they function
-like hardware.
-
<a id="untrusted_system"></a>
Tails can be compromized if installed or plugged in untrusted systems
@@ -37,6 +33,15 @@ Tails can be compromized if installed or plugged in untrusted systems
Tails can not be compromized by a virus in your usual operating
system. See the [[corresponding FAQ|support/FAQ#compromised_system]].
+<a id="BIOS_firmware"></a>
+
+Tails does not protect against BIOS or firmware attacks
+=======================================================
+
+Tails can also not protect against BIOS or firmware attacks. Those are
+not managed by the operating system, and in practice they function
+like hardware.
+
<a id="exit_node"></a>
Tor exit nodes can eavesdrop on communications