-Then install dependencies, build a package, and install:
-
-### Debian, Ubuntu, Linux Mint, etc.
-
- sudo apt-get install build-essential python-all python-stdeb python-gtk2 python-psutil python-twisted python-pygame python-lzma wmctrl gnupg fakeroot
- ./build_deb.sh
- sudo dpkg -i deb_dist/torbrowser-launcher_*.deb
-
-### Red Hat, Fedora, CentOS, etc.
-
- sudo yum install python-psutil python-twisted pygame wmctrl gnupg fakeroot
- ./build_rpm.sh
- sudo yum install dist/torbrowser-launcher-*.rpm
-
-### Run without installing
-
-Install the dependencies: sadly, not all of them are available in virtualenv,
-so you will need to install (some of) them system-wide.
-Then, you can run TBL_SHARE=share ./torbrowser-launcher
-
-## Installing in Ubuntu
-
-I've created a PPA where I'm maintaining torbrowser-launcher binaries. You can install in an Ubuntu-based distribution like this:
-
- sudo add-apt-repository ppa:micahflee/ppa
- sudo apt-get update
- sudo apt-get install torbrowser-launcher
-
-## Enabling AppArmor Profiles
-
-AppArmor is a Linux kernel hardening technology that lets you confine specific programs to only use specific resources. For example, if you visit a website that exploits a bug in the Tor Browser to get arbitrary code execution, the attacker won't be able to access files in ~/.gnupg. Here's how you turn on the AppArmor profiles for Tor Browser Launcher and for the programs bundled in the TBB.
-
- sudo apt-get install apparmor-utils
- sudo aa-enforce /etc/apparmor.d/usr.bin.torbrowser-launcher
- sudo aa-enforce /etc/apparmor.d/torbrowser.start-tor-browser
- sudo aa-enforce /etc/apparmor.d/torbrowser.Browser.firefox
- sudo aa-enforce /etc/apparmor.d/torbrowser.Tor.tor