mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-04-28 18:02:38 +02:00
Update readme
This commit is contained in:
parent
99dcaf7deb
commit
68c1110d9c
1 changed files with 4 additions and 0 deletions
|
@ -6,6 +6,8 @@ Take potentially dangerous PDFs, office documents, or images and convert them to
|
|||
|
||||
Dangerzone works like this: You give it a document that you don't know if you can trust (for example, an email attachment). Inside of a sandbox, dangerzone converts the document to a PDF (if it isn't already one), and then converts the PDF into raw pixel data: a huge list of of RGB color values for each page. Then, in a separate sandbox, dangerzone takes this pixel data and converts it back into a PDF.
|
||||
|
||||
_Read more about dangerzone in the blog post [Dangerzone: Working With Suspicious Documents Without Getting Hacked](https://tech.firstlook.media/dangerzone-working-with-suspicious-documents-without-getting-hacked)._
|
||||
|
||||
## Getting started
|
||||
|
||||
- Download [dangerzone 0.1 for Mac](https://github.com/firstlookmedia/dangerzone/releases/download/v0.1/Dangerzone.0.1.dmg)
|
||||
|
@ -37,3 +39,5 @@ Dangerzone can convert these types of document into safe PDFs:
|
|||
Dangerzone was inspired by [Qubes trusted PDF](https://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html), but it works in non-Qubes operating systems. It uses containers as sandboxes instead of virtual machines (using Docker for macOS, Windows, and Debian/Ubuntu, and [podman](https://podman.io/) for Fedora).
|
||||
|
||||
Set up a development environment by following [these instructions](/BUILD.md).
|
||||
|
||||
The git repository for the container is called [dangerzone-converter](https://github.com/firstlookmedia/dangerzone-converter).
|
Loading…
Reference in a new issue