From 6baab998e372b63951f9fd36c4955489b31ff37d Mon Sep 17 00:00:00 2001 From: BurungHantu1605 Date: Sun, 31 Mar 2019 16:18:55 +0800 Subject: [PATCH] #695 --- _includes/sections/file-sharing.html | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/_includes/sections/file-sharing.html b/_includes/sections/file-sharing.html index bc28bfb6..f776dd38 100644 --- a/_includes/sections/file-sharing.html +++ b/_includes/sections/file-sharing.html @@ -11,10 +11,18 @@ %} {% include card.html color="primary" + title="Firefox Send" + image="assets/img/tools/Firefox.png" + url="https://send.firefox.com/" + footer='OS: Browser and Android' + description="Send uses end-to-end encryption to keep your data secure from the moment you share to the moment your file is opened. It also offers security controls that you can set. You can choose when your file link expires, the number of downloads, and whether to add an optional password for an extra layer of security." + %} + + {% include card.html color="warning" title="Magic Wormhole" image="assets/img/tools/Magic-Wormhole.png" url="https://github.com/warner/magic-wormhole" footer='OS: cross-platform (python)' - description='Get things from one computer to another, safely. This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized.' + description="Get things from one computer to another, safely. This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine." %}