commit 5a9f754eaee9235c6afb8c98d8c0b31ccd75b308
parent 2b9a24802b303e7dbe7afd997abc9f87814861e6
Author: Jaromil <jaromil@dyne.org>
Date: Wed, 26 Jan 2011 16:01:53 +0100
refinements to the website
Diffstat:
1 file changed, 38 insertions(+), 27 deletions(-)
diff --git a/doc/web/views/index.muse b/doc/web/views/index.muse
@@ -3,25 +3,29 @@
<contents>
-* Tomb - RIP
+* Tomb - Crypto Undertaker
+
+<class name="logo">
+[[images/tomb_n_bats.png]]
+</class>
<example>
- ..... ..
- .H8888888h. ~-. . uW8"
- 888888888888x `> u. .. . : `t888
-X~ `?888888hx~ ...ue888b .888: x888 x888. 8888 .
-' x8.^"*88*" 888R Y888r ~`8888~'888X`?888f` 9888.z88N
- `-:- X8888x 888R I888> X888 888X '888> 9888 888E
- 488888> 888R I888> X888 888X '888> 9888 888E
- .. `"88* 888R I888> X888 888X '888> 9888 888E
- x88888nX" . u8888cJ888 X888 888X '888> 9888 888E
- !"*8888888n.. : "*888*P" "*88%""*88" '888!` .8888 888"
-' "*88888888* 'Y" `~ " `"` `%888*%"
- ^"***"` "`
-
- a simple commandline tool to manage encrypted storage v.0.9
- http://tomb.dyne.org by Jaromil @ dyne.org
+ ..... ..
+ .H8888888h. ~-. . uW8"
+ 888888888888x `> u. .. . : `t888
+ X~ `?888888hx~ ...ue888b .888: x888 x888. 8888 .
+ ' x8.^"*88*" 888R Y888r ~`8888~'888X`?888f` 9888.z88N
+ `-:- X8888x 888R I888> X888 888X '888> 9888 888E
+ 488888> 888R I888> X888 888X '888> 9888 888E
+ .. `"88* 888R I888> X888 888X '888> 9888 888E
+ x88888nX" . u8888cJ888 X888 888X '888> 9888 888E
+ !"*8888888n.. : "*888*P" "*88%""*88" '888!` .8888 888"
+ ' "*88888888* 'Y" `~ " `"` `%888*%"
+ ^"***"` "`
+
+ a simple commandline tool to manage encrypted storage v.0.9
+ by Jaromil @ dyne.org
</example>
** Introduction
@@ -51,34 +55,41 @@ We've felt the urgency of publishing Tomb for other operating systems
than dyne:bolic since the current situation with [[http://en.wikipedia.org/wiki/TrueCrypt][TrueCrypt]] is far from
optimal. TrueCrypt makes use of statically linked libraries, its code
is not hosted on CVS and is [[http://lists.freedesktop.org/archives/distributions/2008-October/000276.html][not considered free]] by GNU/Linux
-distributions because of liability reasons, see [[http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034][Debian]], [[https://bugs.edge.launchpad.net/ubuntu/+bug/109701][Ubuntu]][4],
-Suse[5], Gentoo[6] and Fedora[7].
+distributions because of liability reasons, see [[http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034][Debian]], [[https://bugs.edge.launchpad.net/ubuntu/+bug/109701][Ubuntu]],
+[[http://lists.opensuse.org/opensuse-buildservice/2008-10/msg00055.html][Suse]], [[http://bugs.gentoo.org/show_bug.cgi?id=241650][Gentoo]] and [[https://fedoraproject.org/wiki/ForbiddenItems#TrueCrypt][Fedora]].
Seen from this perspective, Tomb is intended as a rewrite of most
-functionalities offered by TrueCrypt in a new application, confident
-it won't take much relying on previous experience and aiming at:
+functionality offered by TrueCrypt in a new application, confident it
+won't take much relying on previous experience and aiming at:
- short and readable code, linking shared libs and common components
- easy graphical interface, simple for ad-hoc (DIY-deniable)
- transparent and distributed development hosted using GIT
- GNU General Public License v3
-[1] http://en.wikipedia.org/wiki/TrueCrypt
-[2] http://lists.freedesktop.org/archives/distributions/2008-October/000276.html
-[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=364034
-[4] https://bugs.edge.launchpad.net/ubuntu/+bug/109701
-[5] http://lists.opensuse.org/opensuse-buildservice/2008-10/msg00055.html
-[6] http://bugs.gentoo.org/show\_bug.cgi?id=241650
-[7] https://fedoraproject.org/wiki/ForbiddenItems#TrueCrypt
*** How does it works
+
+Tombs are operated from a normal file browser or from the commandline.
+
+To open a tomb is sufficient to click on it, or use the command **tomb-open**
+
+[[images/monmort.png]]
+
+When a tomb is open your panel will have a little icon in the tray
+reminding you that a tomb is open, offering to explore it or close it.
+
Tomb generates 'key files' and protects them with a password choosen
by the user; the key files are then used to encrypt loop-back mounted
partitions, like single files containing a filesystem inside: this way
keys can be separated from data for safer transports when
required.
+For more information on how to operate Tomb from the commandline, the
+backend tool **tomb** comes complete with a brief --help and a
+[[manual][manual page]].
+
** Downloads
For licensing information see the [[http://www.gnu.org/copyleft/gpl.html][GNU General Public License]]