Replace First Look Media references

Update several references to First Look Media in the code, to better
reflect the current status, where Freedom of the Press Foundation has
taken over the stewardship of the project.

Fixes #343
This commit is contained in:
Alex Pyrgiotis 2023-02-16 23:45:30 +02:00
parent 330766665d
commit a33dcfbb51
No known key found for this signature in database
GPG key ID: B6C15EBA0357C9AA
11 changed files with 17 additions and 13 deletions

View file

@ -1,5 +1,6 @@
MIT License MIT License
Copyright (c) 2022-2023 Freedom of the Press Foundation
Copyright (c) 2020-2021 First Look Media Copyright (c) 2020-2021 First Look Media
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy

View file

@ -8,7 +8,7 @@ Take potentially dangerous PDFs, office documents, or images and convert them to
Dangerzone works like this: You give it a document that you don't know if you can trust (for example, an email attachment). Inside of a sandbox, Dangerzone converts the document to a PDF (if it isn't already one), and then converts the PDF into raw pixel data: a huge list of RGB color values for each page. Then, in a separate sandbox, Dangerzone takes this pixel data and converts it back into a PDF. Dangerzone works like this: You give it a document that you don't know if you can trust (for example, an email attachment). Inside of a sandbox, Dangerzone converts the document to a PDF (if it isn't already one), and then converts the PDF into raw pixel data: a huge list of RGB color values for each page. Then, in a separate sandbox, Dangerzone takes this pixel data and converts it back into a PDF.
_Read more about Dangerzone in the blog post [Dangerzone: Working With Suspicious Documents Without Getting Hacked](https://tech.firstlook.media/dangerzone-working-with-suspicious-documents-without-getting-hacked)._ _Read more about Dangerzone in the [official site](https://dangerzone.rocks/about.html)._
## Getting started ## Getting started

View file

@ -5,6 +5,6 @@ Comment=Take potentially dangerous PDFs, office documents, or images and convert
Exec=dangerzone %u Exec=dangerzone %u
Terminal=false Terminal=false
Type=Application Type=Application
Icon=media.firstlook.dangerzone Icon=press.freedom.dangerzone
Categories=Office;Utility;OCR;Security Categories=Office;Utility;OCR;Security
MimeType=application/pdf;application/vnd.openxmlformats-officedocument.wordprocessingml.document;application/msword;application/vnd.ms-word.document.macroEnabled.12;application/vnd.openxmlformats-officedocument.spreadsheetml.sheet;application/vnd.ms-excel;application/vnd.openxmlformats-officedocument.presentationml.presentation;application/vnd.ms-powerpoint;application/vnd.oasis.opendocument.text;application/vnd.oasis.opendocument.graphics;application/vnd.oasis.opendocument.presentation;application/vnd.oasis.opendocument.spreadsheet;image/jpeg;image/gif;image/png;image/tiff;image/x-tiff MimeType=application/pdf;application/vnd.openxmlformats-officedocument.wordprocessingml.document;application/msword;application/vnd.ms-word.document.macroEnabled.12;application/vnd.openxmlformats-officedocument.spreadsheetml.sheet;application/vnd.ms-excel;application/vnd.openxmlformats-officedocument.presentationml.presentation;application/vnd.ms-powerpoint;application/vnd.oasis.opendocument.text;application/vnd.oasis.opendocument.graphics;application/vnd.oasis.opendocument.presentation;application/vnd.oasis.opendocument.spreadsheet;image/jpeg;image/gif;image/png;image/tiff;image/x-tiff

View file

Before

Width:  |  Height:  |  Size: 2.8 KiB

After

Width:  |  Height:  |  Size: 2.8 KiB

View file

@ -74,7 +74,9 @@ def main():
if args.with_codesign: if args.with_codesign:
print("○ Code signing app bundle") print("○ Code signing app bundle")
identity_name_application = ( identity_name_application = (
"Developer ID Application: FIRST LOOK PRODUCTIONS, INC. (P24U45L8P5)" # FIXME: Update this line with the proper developer ID, once we know what
# that is.
"Developer ID Application: FREEDOM OF THE PRESS FOUNDATION, 501(c)(3)"
) )
entitlements_plist_path = os.path.join(root, "install/macos/entitlements.plist") entitlements_plist_path = os.path.join(root, "install/macos/entitlements.plist")

View file

@ -64,7 +64,7 @@ if p == "Darwin":
coll, coll,
name="Dangerzone.app", name="Dangerzone.app",
icon="../macos/dangerzone.icns", icon="../macos/dangerzone.icns",
bundle_identifier="media.firstlook.dangerzone", bundle_identifier="press.freedom.dangerzone",
info_plist={ info_plist={
"NSHighResolutionCapable": True, "NSHighResolutionCapable": True,
"CFBundleShortVersionString": version, "CFBundleShortVersionString": version,

View file

@ -82,7 +82,7 @@ def build_dir_xml(root, data):
component_el, component_el,
"RegistryValue", "RegistryValue",
Root="HKCU", Root="HKCU",
Key="Software\First Look Media\Dangerzone", Key="Software\Freedom of the Press Foundation\Dangerzone",
Name="installed", Name="installed",
Type="integer", Type="integer",
Value="1", Value="1",
@ -161,7 +161,7 @@ def main():
root_el, root_el,
"Product", "Product",
Name="Dangerzone", Name="Dangerzone",
Manufacturer="First Look Media", Manufacturer="Freedom of the Press Foundation",
Id="*", Id="*",
UpgradeCode="$(var.ProductUpgradeCode)", UpgradeCode="$(var.ProductUpgradeCode)",
Language="1033", Language="1033",
@ -174,7 +174,7 @@ def main():
Id="*", Id="*",
Keywords="Installer", Keywords="Installer",
Description="Dangerzone $(var.ProductVersion) Installer", Description="Dangerzone $(var.ProductVersion) Installer",
Manufacturer="First Look Media", Manufacturer="Freedom of the Press Foundation",
InstallerVersion="100", InstallerVersion="100",
Languages="1033", Languages="1033",
Compressed="yes", Compressed="yes",
@ -195,7 +195,7 @@ def main():
product_el, product_el,
"Property", "Property",
Id="ARPURLINFOABOUT", Id="ARPURLINFOABOUT",
Value="https://tech.firstlook.media", Value="https://freedom.press",
) )
ET.SubElement(product_el, "UIRef", Id="WixUI_Minimal") ET.SubElement(product_el, "UIRef", Id="WixUI_Minimal")
ET.SubElement(product_el, "UIRef", Id="WixUI_ErrorProgressText") ET.SubElement(product_el, "UIRef", Id="WixUI_ErrorProgressText")

Binary file not shown.

View file

@ -2,7 +2,7 @@
name = "dangerzone" name = "dangerzone"
version = "0.4.0" version = "0.4.0"
description = "Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs" description = "Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs"
authors = ["Micah Lee <micah.lee@theintercept.com>"] authors = ["Freedom of the Press Foundation <info@freedom.press>", "Micah Lee <micah.lee@theintercept.com>"]
license = "MIT" license = "MIT"
[tool.poetry.dependencies] [tool.poetry.dependencies]

View file

@ -19,8 +19,8 @@ def file_list(path):
setuptools.setup( setuptools.setup(
name="dangerzone", name="dangerzone",
version=version, version=version,
author="Micah Lee", author="Freedom of the Press Foundation",
author_email="micah.lee@theintercept.com", author_email="info@freedom.press",
license="MIT", license="MIT",
description="Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs", description="Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs",
long_description="""\ long_description="""\
@ -33,11 +33,11 @@ It uses container technology to convert the documents within a secure sandbox.\
data_files=[ data_files=[
( (
"share/applications", "share/applications",
["install/linux/media.firstlook.dangerzone.desktop"], ["install/linux/press.freedom.dangerzone.desktop"],
), ),
( (
"share/icons/hicolor/64x64/apps", "share/icons/hicolor/64x64/apps",
["install/linux/media.firstlook.dangerzone.png"], ["install/linux/press.freedom.dangerzone.png"],
), ),
("share/dangerzone", file_list("share")), ("share/dangerzone", file_list("share")),
], ],

View file

@ -8,3 +8,4 @@ X-Python3-Version: >= 3.6
# has tested the package already. For more info, see: # has tested the package already. For more info, see:
# https://github.com/freedomofpress/dangerzone/issues/292#issuecomment-1349967888 # https://github.com/freedomofpress/dangerzone/issues/292#issuecomment-1349967888
Setup-Env-Vars: DEB_BUILD_OPTIONS=nocheck Setup-Env-Vars: DEB_BUILD_OPTIONS=nocheck
Maintainer: Freedom of the Press Foundation <info@freedom.press>