Don't display a file:/// URL to user without administration password
During the user testing of the Additional Software beta, P1 failed to interpret the file:/// as something she could open in a browser. She said it looked like a path to a file.
The downside of pointing to https:// is that they won’t work when offline.
I think we should:
- Assume that people can get online either using Tails or with other means.
- Treat more carefully the display of such links in case we can’t assume that people can get online (eg. after disabling the network when doing an upgrade).
Also, these links can’t be opened anymore anyway since #14962 (closed).
Feature Branch: feature/15582-avoid-file-urls
Parent Task: #15567 (closed)