Update fundraiser for extension
[enc-live.git] / en / index.html
CommitLineData
bdf319c4 1<!DOCTYPE html>
19bce4d7 2<html lang="en">
116f80c3 3<head>
19bce4d7
TG
4<meta http-equiv="content-type" content="text/html; charset=utf-8" />
5<title>Email Self-Defense - a guide to fighting surveillance with GnuPG
6encryption</title>
7<meta name="keywords" content="GnuPG, GPG, openpgp, surveillance, privacy,
77aea16c 8email, security, GnuPG2, encryption" />
19bce4d7
TG
9<meta name="description" content="Email surveillance violates our fundamental
10rights and makes free speech risky. This guide will teach you email
11self-defense in 40 minutes with GnuPG." />
12<meta name="viewport" content="width=device-width, initial-scale=1" />
14c5f099 13<link rel="stylesheet" href="../static/css/main.css" />
19bce4d7 14<link rel="shortcut icon"
14c5f099 15href="../static/img/favicon.ico" />
116f80c3 16</head>
701d3bdd 17<body><iframe src="//static.fsf.org/nosvn/banners/202306fundraiser/" scrolling="no" style="width: 100%; height: 150px; display: block; margin: 0; border: 0 none; overflow: hidden;"></iframe>
db4fb2f0 18
e59c77da 19<!--<div style="text-align: center; padding: 2.5px; background-color: #a94442; color:#fcf8e3;"><p>Due to Enigmail's PGP functionality being migrated into Icedove and Thunderbird, steps 2 and 3 of the guide are currently out of date.</p><p> Thank you for your patience while we're working on a new round of updates.</p></div>-->
0e203e6f 20
f12cd56f 21<!-- PLACE FUNDRAISER MODAL WINDOW HERE -->
6b3fb780 22
701d3bdd
MM
23 <!-- Begin fsf-modal-window-elem campaign element -->
24 <link type="text/css" rel="stylesheet" href="https://static.fsf.org/nosvn/fonts/fa/css/font-awesome.min.css">
25 <style>
26#fsf-modal-window-elem-container div {
27 -webkit-box-sizing: border-box;
28 -moz-box-sizing: border-box;
29 box-sizing: border-box;
30}
31
32@media screen and (min-width: 700px) {
33 #fsf-modal-window-elem-outer-v-center {
34 display: table;
35 position: absolute;
36 height: 100%;
37 width: 100%;
38 }
39
40 #fsf-modal-window-elem-inner-v-center {
41 display: table-cell;
42 vertical-align: middle;
43 }
44
45 #fsf-modal-window-elem {
46 width: 687px;
47 margin-left: auto;
48 margin-right: auto;
49 }
50
51 #fsf-modal-window-elem-right-column {
52 float: right;
53 width: 280px;
54 padding-left: 20px;
55 color: #002047;
56 }
57
58 #fsf-modal-window-elem-left-column {
59 width: 100%;
60 float: left;
61 margin-right: -280px;
62 }
63
64 #fsf-modal-window-elem-text {
65 margin-right: 280px;
66 }
67}
68
69@media screen and (max-width: 699px) {
70 #fsf-modal-window-elem {
71 -ms-box-orient: horizontal;
72 display: -webkit-box;
73 display: -moz-box;
74 display: -ms-flexbox;
75 display: -moz-flex;
76 display: -webkit-flex;
77 display: flex;
78 -webkit-flex-flow: row wrap;
79 flex-flow: row wrap;
80 }
81
82 #fsf-modal-window-elem {
83 width: 80vw;
84 margin-left: 10vw;
85 margin-right: 10vw;
86 margin-top: 40px;
87 margin-bottom: 40px;
88 }
89
90 #fsf-modal-window-elem-right-column {
91 width: 100%;
92 order: 1;
93 }
94
95 #fsf-modal-window-elem-left-column {
96 width: 100%;
97 order: 2;
98 }
99
100 #fsf-modal-window-elem-text {
101 margin-top: 20px;
102 }
103}
104
105@media screen and (max-width: 360px) {
106 .long-button-text {
107 font-size: 25px !important;
108 }
109}
110
111#fsf-modal-window-elem-container {
112 position: fixed;
113 z-index: 10000;
114 left: 0;
115 top: 0;
116 width: 100%;
117 height: 100%;
118 overflow: auto;
119 background-color: rgba(0,0,0,0.8);
120 font-weight: normal;
121}
122
123#fsf-modal-window-elem a, a:active, a:focus {
124 outline: none;
125 border-bottom: 0px;
126 color: #003271; /* 202306 */
127}
128
129#fsf-modal-window-elem {
130 overflow: auto;
131 padding: 20px;
132 border-style: solid;
133 border-width: 5px;
134 border-color: #a2c690;
135 border-radius: 20px;
136 box-shadow: 0px 0px 10px #111111;
137 background-color: #a2c690;
138}
139
140#fsf-modal-window-elem-header {
141 width: 100%;
142}
143
144#fsf-modal-window-elem-header h2 {
145 font-family: sans-serif,"Helvetica",Arial;
146 font-weight: bold;
147 font-size: 24px;
148 color: #002047;
149 padding-bottom: 20px;
150 margin-top: 0px;
151 margin-bottom: 0px;
152 border: none;
153}
154
155#fsf-modal-window-elem-close-button {
156 float: right;
157 height: 40px;
158 margin-right: -20px;
159 margin-top: -20px;
160 padding: 11px;
161 color: #888;
162 cursor: pointer;
163}
164
165#fsf-modal-window-elem-close-button:hover {
166 color: #aaf;
167}
168
169#fsf-modal-window-elem-right-column {
170 text-align: center;
171 -webkit-user-select: none;
172 -moz-user-select: none;
173 -ms-user-select: none;
174 user-select: none;
175}
176
177#fsf-modal-window-elem-buttons div {
178 height:53.333px;
179 line-height: 53.333px;
180 margin-left:auto;
181 margin-right:auto;
182 display:block;
183}
184
185#fsf-modal-window-elem-buttons a {
186 width: 100%;
187 display: block;
188 text-align: center;
189 font-size: 35px;
190 color: #002047;
191 text-decoration: none;
192 font-family: sans-serif,"Helvetica",Arial;
193 font-weight: normal;
194}
195
196#fsf-modal-window-elem-maybe-later {
197 margin-top: 5px;
198 margin-bottom: -5px;
199}
200
201#fsf-modal-window-elem-maybe-later a {
202 color: #367c93;
203 line-height: 20px;
204 text-decoration: none;
205 cursor: pointer;
206 font-weight: normal;
207 font-family: sans-serif,"Helvetica",Arial;
208 font-size: 16px;
209}
210
211#fsf-modal-window-elem-text a {
212 color: #002047;
213 font-weight: 700;
214 text-decoration: none;
215}
216
217#fsf-modal-window-elem-text a:hover {
218 color: #fd8e1b;
219}
220
221#fsf-modal-window-elem-text a:focus {
222 color: #fd8e1b;
223}
224
225#fsf-modal-window-elem-text a:active {
226 color: #ffac30;
227}
228
229#fsf-modal-window-elem-text p {
230 font-family: sans-serif,"Helvetica",Arial;
231 font-size: 17px;
232 font-weight: normal;
233 margin: 0px 0px 10px 0px;
234 line-height: 20px;
235 color: #002047;
236}
237 </style>
238 <div id="fsf-modal-window-elem-container" style="display: none;">
239 <div id="fsf-modal-window-elem-outer-v-center">
240 <div id="fsf-modal-window-elem-inner-v-center">
241 <div id="fsf-modal-window-elem">
242 <div id="fsf-modal-window-elem-header">
243 <div id="fsf-modal-window-elem-close-button" onclick="//fsfModalWindowElemDontShowForAWhile();">
244 <i class="fa fa-close">&#8203;</i>
245 </div>
246 <h2>Become a part of the <a href="https://www.fsf.org/working-together/profiles/meet-the-free-software-community">community</a>.</h2>
247 </div>
248 <div id="fsf-modal-window-elem-left-column">
249 <div id="fsf-modal-window-elem-text">
250
251<p>
252
253Let's work together to improve and spread free software. Join the FSF today for $10/month ($5 for students) to foster free software projects, amplify your voice, and show your support for software freedom.
254
255</p>
256
257<p>
258
105f279c 259Help us grow the community by another 25 new associate members before July 28!
701d3bdd
MM
260
261</p>
262
263<p><span id="fsf-modal-window-text-link"><a href="https://www.fsf.org/appeal?mtm_campaign=spring23&mtm_source=modal">Read more</a> | <a href="https://my.fsf.org/join?mtm_campaign=spring23&mtm_source=modal">Join</a></span></p>
264
265 </div>
266 </div>
267 <div id="fsf-modal-window-elem-right-column">
268 <div id="fsf-modal-window-elem-buttons" style="border-radius: 20px;box-shadow: 5px 0 5px -6px #002047, -5px 0 5px -6px #002047;">
269 <div style="background-color:#65b12c; border-top-right-radius: 20px; border-top-left-radius: 20px;">
270 <a style="text-shadow: 0px 0px 4px #ffe6b4;" href="https://my.fsf.org/join?mtm_campaign=spring23&mtm_source=modal" onclick="//fsfModalWindowElemFollowedLink();"><i class="fa fa-check-circle">&nbsp;</i>Join</a>
271 </div>
272
273 <div style="background-color:#a2c690;">
274 <a href="https://my.fsf.org/renew?mtm_campaign=spring23&mtm_source=modal" onclick="//fsfModalWindowElemFollowedLink();"><i class="fa fa-refresh">&nbsp;</i>Renew</a>
275 </div>
276
277 <div style="background-color:#f9cc2b; border-bottom-right-radius: 20px; border-bottom-left-radius: 20px; margin-bottom: 2px">
278 <a style="text-shadow: 0px 0px 4px #ffe6b4;" href="https://my.fsf.org/donate?mtm_campaign=spring23&mtm_source=modal" onclick="//fsfModalWindowElemFollowedLink();"><i class="fa fa-money">&nbsp;</i>Donate</a>
279 </div>
280 </div>
281 </div>
282 </div>
283 </div>
284 </div>
285 <script>
286// @license magnet:?xt=urn:btih:1f739d935676111cfff4b4693e3816e664797050&dn=gpl-3.0.txt GPL-3.0
287
288// Licensed GPLv3-or-later by Andrew Engelbrecht
289
290var startTime, endTime, switchTextTime;
291
292startTime = new Date('2023-05-26T04:00:00Z');
293switchTextTime = new Date('2023-06-22T04:00:00Z');
294// endTime is unused.
295// endTime = new Date('2023-06-29T04:00:00Z');
296
297// Possibly switch the text that is displayed in the modal window, depending
298// upon the current date.
299function fsfModalWindowElemMaybeSwitchText () {
300
301 var now;
302
303 now = new Date();
304 if (now.getTime() < switchTextTime.getTime()) {
305 return; // Do not switch the text
306 }
307
308 // Switch text
309 document.getElementById("fsf-modal-window-elem-text").innerHTML =' \
310\
311<p>Let\'s work together to improve and spread free software. Join the FSF today for \$10\/month \(\$5 for students\) to foster free software projects, amplify your voice, and show your support for software freedom.<\/p> \
312\
105f279c 313<p>Help us grow the community by another 25 new associate members before July 28!<\/p> \
701d3bdd
MM
314\
315<p><span id="fsf-modal-window-text-link"><a href="https://www.fsf.org/appeal?mtm_campaign=spring23&mtm_source=modal">Read more<\/a> | <a href="https://my.fsf.org/join?mtm_campaign=spring23&mtm_source=modal">Join<\/a><\/span><\/p>';
316}
317
318// Show fsf-modal-window-elem if it has not been previously closed by
319// the user, nor recently hit "maybe later",
320// and the campaign is still happening
321function fsfModalWindowElemMaybeShow () {
322
323 var pattern, noShowFsfModalWindowElementP, now;
324
325 // See if cookie says not to show element
326 pattern = /showFsf202211FundraiserModalWindowElementP\s*=\s*false/;
327 noShowFsfModalWindowElementP = pattern.test(document.cookie);
328
329//// Uncomment here to enable modal window hiding
330 if (!noShowFsfModalWindowElementP) {
331 setTimeout(function () {
332 // display the element
333 document.getElementById("fsf-modal-window-elem-container").style.display="block";
334 }, 0);
335 }
336}
337
338// Call this first to set the proper text.
339fsfModalWindowElemMaybeSwitchText();
340// Check if appeal is the url.
341if (window.location.href.indexOf("appeal") == -1) {
342 // Call this right away to avoid flicker.
343 fsfModalWindowElemMaybeShow();
344}
345
346// Get the time `plusDays` in the future.
347// This can be a fraction.
348function daysInFuture (plusDays) {
349 var now, future;
350
351 now = new Date();
352 future = new Date(now.getTime() + Math.floor(1000 * 60 * 60 * 24 * plusDays));
353 return future.toGMTString();
354}
355
356// Hide the fsf-modal-window-elem
357function fsfModalWindowElemHide () {
358 document.getElementById("fsf-modal-window-elem-container").style.display="none";
359}
360
361// Optionally hide elem and set a cookie to keep the fsf-modal-window-elem hidden for the next `forDays`.
362function fsfModalWindowElemDontShowForDays (forDays, hideNow) {
363 if (hideNow === true) {
364 fsfModalWindowElemHide();
365 }
366 //document.cookie = "showFsf202211FundraiserModalWindowElementP=false; path=/; domain=.fsf.org; expires=" + daysInFuture(forDays);
367 document.cookie = "showFsf202211FundraiserModalWindowElementP=false; path=/; SameSite=Strict; Secure; expires=" + daysInFuture(forDays);
368}
369
370// Hide the element from now to two weeks after closing it
371function fsfModalWindowElemDontShowForAWhile () {
372 fsfModalWindowElemDontShowForDays(7, true);
373}
374
375// Keep the element visible for now, but do not show it for a while
376function fsfModalWindowElemFollowedLink () {
377 fsfModalWindowElemDontShowForDays(14, false);
378}
379
380// Check if visiting appeal page.
381if (window.location.href.indexOf("appeal") > -1) {
382 fsfModalWindowElemDontShowForAWhile();
383}
384
385// Close popup if user clicks trasparent part
386document.getElementById("fsf-modal-window-elem-container").addEventListener("click", function(event){
387 fsfModalWindowElemDontShowForAWhile();
388});
389
390// Do not close popup if clicking non-trasparent part (with the text and buttons)
391document.getElementById("fsf-modal-window-elem").addEventListener("click", function(event){
392 event.stopPropagation();
393});
394
395// Close popup if user clicks X icon
396document.getElementById("fsf-modal-window-elem-close-button").addEventListener("click", function(event){
397 fsfModalWindowElemDontShowForAWhile();
398});
399
400// Disable popup if user clicks one of the main buttons
401document.getElementById("fsf-modal-window-elem-buttons").addEventListener("click", function(event){
402 fsfModalWindowElemFollowedLink();
403});
404
405// Disable popup if user clicks one of the "Read more" link
406document.getElementById("fsf-modal-window-text-link").addEventListener("click", function(event){
407 fsfModalWindowElemFollowedLink();
408});
409
410// Close popup if user presses escape key
411window.addEventListener("keydown", function (event) {
412 switch (event.key) {
413 case "Escape":
414 fsfModalWindowElemDontShowForAWhile();
415 break;
416 default:
417 return;
418 }
419}, true);
420// @license-end
421 </script>
422 </div>
423 <!-- End fsf-modal-window-elem campaign element -->
424
19bce4d7
TG
425<!-- ~~~~~~~~~ GnuPG Header and introduction text ~~~~~~~~~ -->
426<header class="row" id="header"><div>
116f80c3 427
e59c77da 428
19bce4d7 429<h1>Email Self-Defense</h1>
116f80c3 430
19bce4d7
TG
431<!-- Language list for browsers that do not have JS enabled -->
432<ul id="languages" class="os">
de17dfbe 433<li><a class="current" href="/en">English - v5.0</a></li>
7c252a78 434<li><a href="/es">español - v5.0</a></li>
de17dfbe
TG
435<li><a href="/fr">français - v5.0</a></li>
436<li><a href="/tr">Türkçe - v5.0</a></li>
7c252a78 437<!--<li><a href="/cs">čeština - v4.0</a></li>
f7d7ddc2 438<li><a href="/de">Deutsch - v4.0</a></li>
7c4f505e 439<li><a href="/el">ελληνικά - v3.0</a></li>
7c4f505e 440<li><a href="/fa">فارسی - v4.0</a></li>
7c4f505e 441<li><a href="/it">italiano - v3.0</a></li>
cd34b0a5
TG
442<li><a href="/ja">日本語 - v4.0</a></li>-->
443<li><a href="/pl">polski - v5.0</a></li>
444<!--<li><a href="/pt-br">português do Brasil - v3.0</a></li>
a78dcf32 445<li><a href="/ro">română - v3.0</a></li>-->
8a64efa9 446<li><a href="/ru">русский - v5.0</a></li>
d8af4dc9
TG
447<li><a href="/sq">Shqip - v5.0</a></li>
448<!--<li><a href="/sv">svenska - v4.0</a></li>-->
9edd68b4 449<li><a href="/zh-hans">简体中文 - v5.0</a></li>
77aea16c
TG
450<li><strong><a href="https://libreplanet.org/wiki/GPG_guide/Translation_Guide">
451Translate!</a></strong></li>
19bce4d7
TG
452</ul>
453
454<ul id="menu" class="os">
37d0bc33 455<li class="spacer"><a href="index.html" class="current">Set up guide</a></li>
456<!--<li><a href="mac.html">Mac OS</a></li>-->
457<!--<li><a href="windows.html">Windows</a></li>-->
f211d856 458<li class="spacer"><a href="workshops.html">Teach your friends</a></li>
f1ff80d1
TG
459<li class="spacer"><a
460href="http://hhldo3tnt5solzj2bwfvh7xm4slk2forpjwjyemhcfrlob5gq75gioid.onion/en"
461target="_blank">This site's tor onion service</a></li>
f211d856 462<li class="spacer"><a
770452f9 463href="https://fsf.org/share?u=https://u.fsf.org/zb&amp;t=Email%20encryption%20for%20everyone%20via%20%40fsf">
f211d856 464Share&nbsp;
14c5f099 465<img src="../static/img/gnu-social.png" class="share-logo"
19bce4d7 466alt="[GNU Social]" />&nbsp;
14c5f099 467<img src="../static/img/mastodon.png" class="share-logo"
d06ce723 468alt="[Mastodon]" />&nbsp;
14c5f099 469<img src="../static/img/reddit-alien.png" class="share-logo"
19bce4d7 470alt="[Reddit]" />&nbsp;
14c5f099 471<img src="../static/img/hacker-news.png" class="share-logo"
f211d856 472alt="[Hacker News]" /></a></li>
19bce4d7
TG
473</ul>
474
475<!-- ~~~~~~~~~ FSF Introduction ~~~~~~~~~ -->
476<div id="fsf-intro">
477
6003a573 478<h3><a href="https://u.fsf.org/ys"><img
19bce4d7 479alt="Free Software Foundation"
14c5f099 480src="../static/img/fsf-logo.png" />
19bce4d7
TG
481</a></h3>
482
483<div class="fsf-emphasis">
484
485<p>We fight for computer users' rights, and promote the development of free (as
486in freedom) software. Resisting bulk surveillance is very important to us.</p>
487
488<p><strong>Please donate to support Email Self-Defense. We need to keep
489improving it, and making more materials, for the benefit of people around
490the world taking the first step towards protecting their privacy.</strong></p>
491
492</div>
493
d1f39676 494<div style="text-align: center;">
33eab950
TG
495<p><a href="https://crm.fsf.org/civicrm/contribute/transact?reset=1&amp;id=14&amp;mtm_campaign=email_self_defense&amp;mtm_kwd=guide_donate"><img alt="Donate" src="../static/img/en/donate.png" /></a></p>
496
d1f39676 497<h5>Sign up</h5>
9162eaf3
TG
498<form action="https://my.fsf.org/civicrm/profile/create?reset=1&amp;gid=31" method="post">
499<p>Enter your email address to receive our monthly newsletter, the<br /><a href="https://www.fsf.org/free-software-supporter/">Free Software Supporter</a></p>
d1f39676 500
501<p><input id="frmEmail" type="text" name="email-Primary" size="18" maxlength="80" /></p>
502<p><input type="submit" name="_qf_Edit_next" value="Subscribe me" /></p>
503<div><input name="postURL" type="hidden" value="" />
504<input type="hidden" name="group[25]" value="1" />
9162eaf3 505<input name="cancelURL" type="hidden" value="https://my.fsf.org/civicrm/profile?reset=1&amp;gid=31" />
d1f39676 506<input name="_qf_default" type="hidden" value="Edit:cancel" />
507</div>
508</form></div>
64a48f78 509
19bce4d7
TG
510</div><!-- End #fsf-intro -->
511
512<!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
513<div class="intro">
514
515<p><a id="infographic" href="infographic.html"><img
14c5f099 516src="../static/img/en/infographic-button.png"
19bce4d7
TG
517alt="View &amp; share our infographic &rarr;" /></a>
518Bulk surveillance violates our fundamental rights and makes free speech
5b97f4df
TG
519risky. This guide will teach you a basic surveillance self-defense skill: email
520encryption. Once you've finished, you'll be able to send and receive emails
521that are scrambled to make sure a surveillance agent or thief intercepting
522your email can't read them. All you need is a computer with an Internet
523connection, an email account, and about forty minutes.</p>
19bce4d7
TG
524
525<p>Even if you have nothing to hide, using encryption helps protect the privacy
526of people you communicate with, and makes life difficult for bulk surveillance
527systems. If you do have something important to hide, you're in good company;
528these are the same tools that whistleblowers use to protect their identities
80b64e11 529while shining light on human rights abuses, corruption, and other crimes.</p>
19bce4d7
TG
530
531<p>In addition to using encryption, standing up
532to surveillance requires fighting politically for a <a
e59c77da 533href="https://gnu.org/philosophy/surveillance-vs-democracy.html">reduction
19bce4d7
TG
534in the amount of data collected on us</a>, but the essential first step is
535to protect yourself and make surveillance of your communication as difficult
536as possible. This guide helps you do that. It is designed for beginners, but
537if you already know the basics of GnuPG or are an experienced free software
538user, you'll enjoy the advanced tips and the <a href="workshops.html">guide
539to teaching your friends</a>.</p>
540
541</div><!-- End .intro -->
542</div></header><!-- End #header -->
543
544<!-- ~~~~~~~~~ Section 1: Get the pieces ~~~~~~~~~ -->
545<section class="row" id="section1"><div>
546
547<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
548<div class="section-intro">
549
550<h2><em>#1</em> Get the pieces</h2>
551
552<p class="notes">This guide relies on software which is <a
553href="https://www.gnu.org/philosophy/free-sw.html">freely licensed</a>;
554it's completely transparent and anyone can copy it or make their
555own version. This makes it safer from surveillance than proprietary
80b64e11 556software (like Windows or macOS). Learn more about free software at <a
19bce4d7
TG
557href="https://u.fsf.org/ys">fsf.org</a>.</p>
558
c174e65c 559<p>Most GNU/Linux operating systems come with GnuPG installed on them, so if you're running one of these systems, you don't have to download it. If you're running macOS or Windows, steps to download GnuPG are below. Before configuring your encryption setup with this guide, though, you'll need a desktop email program installed on your computer. Many GNU/Linux distributions have one installed already, such as Icedove, which may be under the alternate name "Thunderbird." Programs like these are another way to access the same email accounts you can access in a browser (like Gmail), but provide extra features.</p>
19bce4d7 560
19bce4d7
TG
561</div><!-- End .section-intro -->
562
563<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
564<div id="step-1a" class="step">
565<div class="sidebar">
566
69e314de 567<p class="large"><img
14c5f099 568src="../static/img/en/screenshots/step1a-install-wizard.png"
19bce4d7
TG
569alt="Step 1.A: Install Wizard" /></p>
570
571</div><!-- /.sidebar -->
572<div class="main">
573
574<h3><em>Step 1.a</em> Set up your email program with your email account</h3>
575
576<p>Open your email program and follow the wizard (step-by-step walkthrough)
37d0bc33 577that sets it up with your email account. This usually starts from "Account Settings" &rarr; "Add Mail Account". You should get the email server settings from your systems administrator or the help section of your email account.</p>
77aea16c 578
19bce4d7
TG
579
580<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
581<div class="troubleshooting">
582
583<h4>Troubleshooting</h4>
584
585<dl>
586<dt>The wizard doesn't launch</dt>
587<dd>You can launch the wizard yourself, but the menu option for doing so is
588named differently in each email program. The button to launch it will be in
589the program's main menu, under "New" or something similar, titled something
590like "Add account" or "New/Existing email account."</dd>
591
592<dt>The wizard can't find my account or isn't downloading my mail</dt>
593<dd>Before searching the Web, we recommend you start by asking other people
594who use your email system, to figure out the correct settings.</dd>
595
b7f7b4a2 596<dt>I can't find the menu</dt>
19bce4d7
TG
597<dd>In many new email programs, the main menu is represented by an image of
598three stacked horizontal bars.</dd>
599
19bce4d7
TG
600<dt class="feedback">Don't see a solution to your problem?</dt>
601<dd class="feedback">Please let us know on the <a
602href="https://libreplanet.org/wiki/GPG_guide/Public_Review">feedback
603page</a>.</dd>
604</dl>
605
606</div><!-- /.troubleshooting -->
607</div><!-- End .main -->
608</div><!-- End #step1-a .step -->
609
610<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
611<div id="step-1b" class="step">
19bce4d7
TG
612<div class="main">
613
63fe86d5
TG
614<h3><em>Step 1.b</em> Install GnuPG</h3>
615
616<p>If you are using a GNU/Linux machine, you should already have GnuPG installed, and you can skip to <a href="#section2">Section 2</a>.</p>
19bce4d7 617
63fe86d5 618<p>If you are using a macOS or Windows machine, however, you need to first install the GnuPG program. Select your operating system below and follow the instructions. For the rest of this guide, the steps are the same for all operating systems. </p>
19bce4d7 619
37d0bc33 620<!-- ~~~~~~~~~ MACOS ~~~~~~~~~ -->
621<div class="troubleshooting">
19bce4d7 622
77aea16c 623<h4>macOS</h4>
64af8734 624
37d0bc33 625<dl>
626<dt>Use a third-party package manager to install GnuPG</dt>
63fe86d5
TG
627<dd>
628<p>The default macOS package manager makes it difficult to install GnuPG and other pieces of free software (like Emacs, GIMP, or Inkscape). To make things easier, we recommend setting up the third-party package manager "Homebrew" to install GnuPG. For this, we will use a program called "Terminal," which is pre-installed on macOS.</p>
629
630<p># Copy the first command on the home page of <a href="https://brew.sh/">Homebrew</a> by clicking on the clipboard icon, and paste it in Terminal. Click "Enter" and wait for the installation to finalize.</p>
631<p># Then install GnuPG by entering the following code in Terminal:<br/>
632<code>brew install gnupg gnupg2</code></p>
633</dd>
37d0bc33 634</dl>
635
636</div><!-- /.troubleshooting -->
637
638<!-- ~~~~~~~~~ WINDOWS ~~~~~~~~~ -->
19bce4d7
TG
639<div class="troubleshooting">
640
37d0bc33 641<h4>Windows</h4>
19bce4d7
TG
642
643<dl>
37d0bc33 644<dt>Get GnuPG by downloading GPG4Win</dt>
b4a6695d 645<dd><p><a href="https://www.gpg4win.org/">GPG4Win</a> is an email and file encryption software package that includes GnuPG. Download and install the latest version, choosing default options whenever asked. After it's installed, you can close any windows that it creates.</p>
37d0bc33 646</dd>
19bce4d7
TG
647</dl>
648
649</div><!-- /.troubleshooting -->
650</div><!-- End .main -->
37d0bc33 651</div><!-- End #step1-b .step -->
652
80b64e11 653<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
654<div id="terminology" class="step">
655<div class="main">
656
a4eb3926 657<h3>GnuPG, OpenPGP, what?</h3>
80b64e11 658
659<p>In general, the terms GnuPG, GPG, GNU Privacy Guard, OpenPGP and PGP
660are used interchangeably. Technically, OpenPGP (Pretty Good Privacy) is the
661encryption standard, and GNU Privacy Guard (often shortened to GPG or GnuPG)
662is the program that implements the standard. Most email programs provide an interface for GnuPG. There is also a newer version of GnuPG, called GnuPG2.</p>
663
664</div><!-- End .main -->
665</div><!-- End #terminology.step-->
666
19bce4d7
TG
667</div></section><!-- End #section1 -->
668
669<!-- ~~~~~~~~~ Section 2: Make your keys ~~~~~~~~~ -->
7b83f7f9 670<section id="section2" class="row"><div>
19bce4d7
TG
671
672<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
673<div class="section-intro">
674
675<h2><em>#2</em> Make your keys</h2>
69e314de 676<p class="float medium"><img src="../static/img/en/screenshots/step2a-01-make-keypair.png" alt="A robot with a head shaped like a key holding a private and a public key"/></p>
19bce4d7
TG
677
678<p>To use the GnuPG system, you'll need a public key and a private key (known
679together as a keypair). Each is a long string of randomly generated numbers
680and letters that are unique to you. Your public and private keys are linked
681together by a special mathematical function.</p>
682
683<p>Your public key isn't like a physical key, because it's stored in the open
684in an online directory called a keyserver. People download it and use it,
685along with GnuPG, to encrypt emails they send to you. You can think of the
686keyserver as a phonebook; people who want to send you encrypted email can
687look up your public key.</p>
688
689<p>Your private key is more like a physical key, because you keep it to
690yourself (on your computer). You use GnuPG and your private key together to
77aea16c
TG
691descramble encrypted emails other people send to you. <strong>You should never share your private key with anyone, under any
692circumstances.</strong></p>
19bce4d7
TG
693
694<p>In addition to encryption and decryption, you can also use these keys to
695sign messages and check the authenticity of other people's signatures. We'll
696discuss this more in the next section.</p>
697
698</div><!-- End .section-intro -->
699
700<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
701<div id="step-2a" class="step">
702<div class="sidebar">
69e314de 703<p class="large"><img
14c5f099 704src="../static/img/en/screenshots/step2a-02-make-keypair.png"
35f08087 705alt="Step 2.A: Make your Keypair" /></p>
69e314de
TG
706
707<p class="large"><img
14c5f099 708src="../static/img/en/screenshots/step2a-03-make-keypair.png"
7b83f7f9 709alt="Step 2.A: Set your passphrase" /></p>
19bce4d7
TG
710
711</div><!-- /.sidebar -->
712<div class="main">
713
714<h3><em>Step 2.a</em> Make a keypair</h3>
77aea16c
TG
715
716<h4>Make your keypair</h4>
19bce4d7 717
63fe86d5
TG
718<p>We will use the command line in a terminal to create a keypair using the
719GnuPG program.</p>
19bce4d7 720
63fe86d5
TG
721<p class="notes">Whether on GNU/Linux, macOS or Windows, you can launch your
722terminal ("Terminal" in macOS, "PowerShell" in Windows) from the Applications
723menu (some GNU/Linux systems respond to the <kbd>Ctrl + Alt + T</kbd>
724shortcut).</p>
725
726<p># Enter <code>gpg --full-generate-key</code> to start the process.</p>
77aea16c
TG
727<p># To answer what kind of key you would like to create, select the default option: <samp>1&nbsp;RSA&nbsp;and&nbsp;RSA</samp>.</p>
728<p># Enter the following keysize: <code>4096</code> for a strong key.</p>
63fe86d5 729<p># Choose the expiration date; we suggest <code>2y</code> (2 years).</p>
e59c77da 730<p>Follow the prompts to continue setting up with your personal details.</p>
9162eaf3 731<p class="notes"> Depending on your version of GPG, you may need to use
67e74fa7 732<code>--gen-key</code> instead of <code>--full-generate-key</code>&#65279;.</p>
19bce4d7 733
77aea16c 734<h4>Set your passphrase</h4>
5440702c 735<p>On the screen titled "Passphrase," pick a strong passphrase! You can
19bce4d7
TG
736do it manually, or you can use the Diceware method. Doing it manually
737is faster but not as secure. Using Diceware takes longer and requires
5440702c 738dice, but creates a passphrase that is much harder for attackers to figure
19bce4d7 739out. To use it, read the section "Make a secure passphrase with Diceware" in <a
f211d856 740href="https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/">
7b83f7f9 741this article</a> by Micah Lee.</p>
742
19bce4d7 743
7b83f7f9 744<p>If you'd like to pick a passphrase manually, come up with something
19bce4d7
TG
745you can remember which is at least twelve characters long, and includes
746at least one lower case and upper case letter and at least one number or
5440702c 747punctuation symbol. Never pick a passphrase you've used elsewhere. Don't use
19bce4d7
TG
748any recognizable patterns, such as birthdays, telephone numbers, pets' names,
749song lyrics, quotes from books, and so on.</p>
750
19bce4d7
TG
751<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
752<div class="troubleshooting">
753
754<h4>Troubleshooting</h4>
19bce4d7 755<dl>
e59c77da 756<dt>GnuPG is not installed</dt>
7b83f7f9 757<dd>
63fe86d5
TG
758You can check if this is the case with the command <code>gpg --version</code>&#65279;.
759If GnuPG is not installed, it will bring up the following result on most GNU/Linux operating systems, or something like it:
77aea16c
TG
760<samp>Command 'gpg' not found, but can be installed with:
761 sudo apt install gnupg</samp>. Follow that command and install the program.</dd>
7b83f7f9 762
061aad83 763<dt><i>gpg --full-generate-key</i> command not working</dt>
412a3134 764<dd>Some distributions use a different version of GPG. When you receive an error code that is something along the lines of: <samp>gpg: Invalid option "--full-generate-key"</samp>, you can try the following commands: <br />
061aad83 765<code>sudo apt update</code><br />
766<code>sudo apt install gnupg2</code><br />
767<code>gpg2 --full-generate-key</code><br />
a7ba22c6 768If this resolved the issue, you need to continue to use the gpg2 identifier instead of gpg throughout the following steps of the guide.
9162eaf3 769<p class="notes"> Depending on your version of GPG, you may need to use
67e74fa7 770<code>--gen-key</code> instead of <code>--full-generate-key</code>&#65279;.</p>
9162eaf3 771</dd>
061aad83 772
7b83f7f9 773<dt>I took too long to create my passphrase</dt>
b7f7b4a2 774<dd>That's okay. It's important to think about your passphrase. When you're ready, just follow the steps from the beginning again to create your key.</dd>
19bce4d7 775
b7f7b4a2 776<dt>How can I see my key?</dt>
7b83f7f9 777<dd>
63fe86d5
TG
778Use the following command to see all keys: <code>gpg --list-keys</code>&#65279;. Yours should be listed in there, and later, so will Edward's (<a href="#section3">Section 3</a>).<br />
779If you want to see only your key, you can use <code>gpg --list-key [your@email]</code>&#65279;.<br />
77aea16c 780You can also use <code>gpg --list-secret-key</code> to see your own private key.</dd>
19bce4d7 781
19bce4d7 782<dt>More resources</dt>
7b83f7f9 783<dd>For more information about this process, you can also refer to <a
784href="https://www.gnupg.org/gph/en/manual/c14.html#AEN25">The GNU Privacy
785Handbook</a>. Make sure you stick with "RSA and RSA" (the default),
786because it's newer and more secure than the algorithms the documentation
63fe86d5 787recommends. Also make sure your key is at least 4096&nbsp;bits if you
80b64e11 788want to be secure.</dd>
19bce4d7
TG
789
790<dt class="feedback">Don't see a solution to your problem?</dt>
791<dd class="feedback">Please let us know on the <a
792href="https://libreplanet.org/wiki/GPG_guide/Public_Review">feedback
793page</a>.</dd>
794</dl>
795
796</div><!-- /.troubleshooting -->
797
798<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
799<div class="troubleshooting">
800
801<h4>Advanced</h4>
19bce4d7 802<dl>
19bce4d7
TG
803<dt>Advanced key pairs</dt>
804<dd>When GnuPG creates a new keypair, it compartmentalizes
805the encryption function from the signing function through <a
806href="https://wiki.debian.org/Subkeys">subkeys</a>. If you use
7b83f7f9 807subkeys carefully, you can keep your GnuPG identity more
19bce4d7
TG
808secure and recover from a compromised key much more quickly. <a
809href="https://alexcabal.com/creating-the-perfect-gpg-keypair/">Alex Cabal</a>
6003a573 810and <a href="https://keyring.debian.org/creating-key.html">the Debian wiki</a>
19bce4d7 811provide good guides for setting up a secure subkey configuration.</dd>
64f8f564 812</dl>
19bce4d7
TG
813
814</div><!-- /.troubleshooting -->
815</div><!-- End .main -->
816</div><!-- End #step-2a .step -->
817
818<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
819<div id="step-2b" class="step">
7b83f7f9 820<div class="sidebar">
69e314de 821<p class="large"><img
14c5f099 822src="../static/img/en/screenshots/step2b-04-upload-and-certificate.png"
80b64e11 823alt="Step 2.B: Send to server and generate a certificate" /></p>
19bce4d7 824
7b83f7f9 825</div><!-- /.sidebar -->
826<div class="main">
19bce4d7 827
7b83f7f9 828<h3><em>Step 2.b</em> Some important steps following creation</h3>
19bce4d7 829
77aea16c 830<h4>Upload your key to a keyserver</h4>
7b83f7f9 831<p>We will upload your key to a keyserver, so if someone wants to send you an encrypted message, they can download your public key from the Internet. There are multiple keyservers
9c973564 832that you can select from the menu when you upload, but they are mostly all copies
833of each other. Any server will work, but it's good to remember which one you uploaded your key to originally. Also keep in mind, sometimes takes a few hours for them to match each other when a new key is uploaded.</p>
77aea16c
TG
834<p># Copy your keyID: <code>gpg --list-key [your@email]</code> will list your public ("pub") key information, including your keyID, which is a unique list of numbers and letters. Copy this keyID, so you can use it in the following command.</p>
835<p># Upload your key to a server:
836<code>gpg --send-key [keyID]</code></p>
7b83f7f9 837
77aea16c 838<h4>Export your key to a file</h4>
4f41943f 839<p>Use the following command to export your secret key so you can import it into your email client at the next <a href="#section3">step</a>. To avoid getting your key compromised, store this in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Exporting your keys can be done with the following commands:</p>
77aea16c 840<p><code>
8099cef4
TG
841$ gpg --export-secret-keys -a [keyID] > my_secret_key.asc<br/>
842$ gpg --export -a [keyID] > my_public_key.asc
77aea16c 843</code></p>
7b83f7f9 844
77aea16c 845<h4>Generate a revocation certificate</h4>
63fe86d5 846<p>Just in case you lose your key, or it gets compromised, you want to generate a certificate and choose to save it in a safe place on your computer for now (please refer to <a href="#step-6c">Step 6.C</a> for how to best store your revocation cerficate safely). This step is essential for your email self-defense, as you'll learn more about in <a href="#section5">Section 5</a>.</p>
b7f7b4a2 847
77aea16c
TG
848<p># Copy your keyID: <code>gpg --list-key [your@email]</code> will list your public ("pub") key information, including your keyID, which is a unique list of numbers and letters. Copy this keyID, so you can use it in the following command.</p>
849<p># Generate a revocation certificate: <code>gpg --gen-revoke --output revoke.asc [keyID]</code></p>
850<p># It will prompt you to give a reason for revocation, we recommend to use <samp>1&nbsp;=&nbsp;key has been compromised</samp>.</p>
63fe86d5 851<p># You don't have to fill in a reason, but you can; then press "Enter" for an empty line, and confirm your selection.</p>
80b64e11 852
19bce4d7
TG
853
854<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
855<div class="troubleshooting">
856
857<h4>Troubleshooting</h4>
858
859<dl>
563fcf5d 860<dt>Sending my key to the keyserver is not working</dt>
412a3134 861<dd>Instead of using the general command to upload your key to the keyserver, you can use a more specific command and add the keyserver to your command <code>gpg --keyserver keys.openpgp.org --send-key [keyID]</code>&#65279;.</dd>
563fcf5d 862
b7f7b4a2 863<dt>My key doesn't seem to be working or I get a "permission denied."</dt>
e4fa2e82 864<dd><p>Like every other file or folder, gpg keys are subject to permissions. If these are not set correctly, your system may not be accepting your keys. You can follow the next steps to check, and update to the right permissions.</p>
19bce4d7 865
77aea16c 866<p># Check your permissions: <code>ls -l ~/.gnupg/*</code></p>
e4fa2e82 867<p># Set permissions to read, write, execute for only yourself, no others. These are the recommended permissions for your folder. <br/>
5440702c 868You can use the command: <code>chmod 700 ~/.gnupg</code></p>
e4fa2e82 869<p># Set permissions to read and write for yourself only, no others. These are the recommended permissions for the keys inside your folder. <br/>
77aea16c 870You can use the code: <code>chmod 600 ~/.gnupg/*</code></p>
19bce4d7 871
e4fa2e82 872<p class="notes">If you have (for any reason) created your own folders inside ~/.gnupg, you must also additionally apply execute permissions to that folder. Folders require execution privileges to be opened. For more information on permissions, you can check out <a href="https://helpdeskgeek.com/linux-tips/understanding-linux-permissions-chmod-usage/">this detailed information guide</a>.</p>
7b83f7f9 873</dd>
412a3134 874
19bce4d7
TG
875<dt class="feedback">Don't see a solution to your problem?</dt>
876<dd class="feedback">Please let us know on the <a
877href="https://libreplanet.org/wiki/GPG_guide/Public_Review">feedback
878page</a>.</dd>
879</dl>
880
881</div><!-- /.troubleshooting -->
882
883<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
884<div class="troubleshooting">
885
886<h4>Advanced</h4>
887
888<dl>
7b83f7f9 889<dt>More about keyservers</dt>
f1ff80d1 890<dd>You can find some more keyserver information <a
4c633adb 891href="https://www.gnupg.org/gph/en/manual/x457.html">in this manual</a>. You can also <a
19bce4d7
TG
892href="https://www.gnupg.org/gph/en/manual/x56.html#AEN64">directly export
893your key</a> as a file on your computer.</dd>
7b83f7f9 894
895<dt>Transferring your keys</dt>
e4fa2e82
TG
896<dd>
897<p>Use the following commands to transfer your keys. To avoid getting your key compromised, store it in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Importing and exporting a key can be done with the following commands:</p>
7b83f7f9 898
77aea16c 899<p><code>
63fe86d5
TG
900$ gpg --export-secret-keys -a [keyID] > my_private_key.asc<br />
901$ gpg --export -a [keyID] > my_public_key.asc<br />
902$ gpg --import my_private_key.asc<br />
e4fa2e82 903$ gpg --import my_public_key.asc
77aea16c 904</code></p>
7b83f7f9 905
35f08087 906<p>Ensure that the keyID printed is the correct one, and if so, then go ahead and add ultimate trust for it:</p>
e4fa2e82 907
77aea16c 908<p><code>
35f08087 909$ gpg --edit-key [your@email]
77aea16c 910</code></p>
7b83f7f9 911
dbfeba09 912<p>Because this is your key, you should choose <code>ultimate</code>&#65279;. You shouldn't trust anyone else's key ultimately.</p>
80b64e11 913
63fe86d5 914<p class="notes"> Refer to <a href="#step-2b">Troubleshooting in Step 2.B</a> for more information on permissions. When transferring keys, your permissions may get mixed, and errors may be prompted. These are easily avoided when your folders and files have the right permissions</p>
7b83f7f9 915</dd>
19bce4d7
TG
916</dl>
917
918</div><!-- /.troubleshooting -->
919</div><!-- End .main -->
920</div><!-- End #step-2b .step -->
19bce4d7
TG
921</div></section><!-- End #section2 -->
922
7b83f7f9 923<!-- ~~~~~~~~~ Section 3: Set up email encryption ~~~~~~~~~ -->
924<section id="section3" class="row"><div>
19bce4d7
TG
925
926<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
927<div class="section-intro">
928
7b83f7f9 929<h2><em>#3</em> Set up email encryption</h2>
64f8f564 930<p class="notes">The Icedove (or Thunderbird) email program has PGP functionality integrated, which makes it pretty easy to work with. We'll take you through the steps of integrating and using your key in these email clients.</p>
7b83f7f9 931
932</div><!-- End .section-intro -->
19bce4d7
TG
933
934<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 935<div id="step-3a" class="step">
936<div class="sidebar">
937
69e314de 938<p class="large"><img src="../static/img/en/screenshots/step3a-open-key-manager.png"
fedfd572 939alt="Step 3.A: Email Menu" /></p>
69e314de
TG
940
941<p class="large"><img src="../static/img/en/screenshots/step3a-import-from-file.png"
7b83f7f9 942alt="Step 3.A: Import From File" /></p>
69e314de
TG
943
944<p class="large"><img src="../static/img/en/screenshots/step3a-success.png"
7b83f7f9 945alt="Step 3.A: Success" /></p>
69e314de
TG
946
947<p class="large"><img src="../static/img/en/screenshots/step3a-troubleshoot.png"
40833450 948alt="Step 3.A: Troubleshoot" /></p>
7b83f7f9 949</div><!-- /.sidebar -->
19bce4d7
TG
950<div class="main">
951
7b83f7f9 952<h3><em>Step 3.a</em> Set up your email with encryption</h3>
e4fa2e82
TG
953
954<p>Once you have set up your email with encryption, you can start contributing to encrypted traffic on the Internet. First we'll get your email client to import your secret key, and we will also learn how to get other people's public keys from servers so you can send and receive encrypted email.</p>
19bce4d7 955
fb4dff9b 956<p># Open your email client and use "Tools" &rarr; <i>OpenPGP Key Manager</i></p>
77aea16c 957<p># Under "File" &rarr; <i>Import Secret Key(s) From File</i></p>
63fe86d5 958<p># Select the file you saved under the name [my_secret_key.asc] in <a href="#step-2b">Step 2.B</a> when you exported your key</p>
7b83f7f9 959<p># Unlock with your passphrase</p>
960<p># You will receive a "OpenPGP keys successfully imported" window to confirm success</p>
fb4dff9b 961<p># Go to "Account settings" &rarr; "End-To-End Encryption," and make sure your key is imported and select <i>Treat this key as a Personal Key</i>.</p>
19bce4d7
TG
962
963</div><!-- End .main -->
19bce4d7 964
7b83f7f9 965<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
7b83f7f9 966<div class="main">
967<div class="troubleshooting">
968<h4>Troubleshooting</h4>
969<dl>
970<dt>I'm not sure the import worked correctly</dt>
971<dd>
fb4dff9b 972Look for "Account settings" &rarr; "End-To-End Encryption." Here you can see if your personal key associated with this email is found. If it is not, you can try again via the <i>Add key</i> option. Make sure you have the correct, active, secret key file.
7b83f7f9 973</dd>
974
975<dt class="feedback">Don't see a solution to your problem?</dt>
976<dd class="feedback">Please let us know on the <a
977href="https://libreplanet.org/wiki/GPG_guide/Public_Review">feedback
978page</a>.</dd>
979</dl>
980
981</div><!-- /.troubleshooting -->
982</div><!-- End .main -->
983</div><!-- End #step3-a .step -->
984</div></section><!-- End #section3 -->
985
986<!-- ~~~~~~~~~ Section 4: Try it out ~~~~~~~~~ -->
987<section class="row" id="section4"><div>
19bce4d7
TG
988
989<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
990<div class="section-intro">
991
7b83f7f9 992<h2><em>#4</em> Try it out!</h2>
69e314de 993<p class="float small"><img src="../static/img/en/screenshots/section3-try-it-out.png" alt="Illustration of a person in a house with a cat connected to a server"/></p>
a4eb3926 994<p>Now you'll try a test correspondence with an FSF computer program named Edward,
19bce4d7
TG
995who knows how to use encryption. Except where noted, these are the same
996steps you'd follow when corresponding with a real, live person.</p>
997
998<!-- <p>NOTE: Edward is currently having some technical difficulties, so he
999may take a long time to respond, or not respond at all. We're sorry about
1000this and we're working hard to fix it. Your key will still work even without
1001testing with Edward.</p> -->
69e314de
TG
1002
1003<div style="clear: both"></div>
19bce4d7
TG
1004</div><!-- End .section-intro -->
1005
1006<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1007<div id="step-4a" class="step">
19bce4d7
TG
1008<div class="sidebar">
1009
69e314de 1010<p class="large"><img
14c5f099 1011src="../static/img/en/screenshots/step4a-send-key-to-Edward.png"
7b83f7f9 1012alt="Step 4.A Send key to Edward." /></p>
19bce4d7
TG
1013
1014</div><!-- /.sidebar -->
1015<div class="main">
1016
7b83f7f9 1017<h3><em>Step 4.a</em> Send Edward your public key</h3>
19bce4d7
TG
1018
1019<p>This is a special step that you won't have to do when corresponding
7b83f7f9 1020with real people. In your email program's menu, go to "Tools" &rarr; "OpenPGP Key
a4eb3926 1021Manager." You should see your key in the list that pops up. Right click
77aea16c 1022on your key and select <i>Send Public Keys by Email</i>. This will create a new draft message, as if you had just hit the "Write" button, but in the attachment you will find your public keyfile.</p>
19bce4d7
TG
1023
1024<p>Address the message to <a
1025href="mailto:edward-en@fsf.org">edward-en@fsf.org</a>. Put at least one word
1026(whatever you want) in the subject and body of the email. Don't send yet.</p>
1027
77aea16c 1028<p>We want Edward to be able to open the email with your keyfile, so we want this first special message to be unencrypted. Make sure encryption is turned off by using the dropdown menu "Security" and select <i>Do Not Encrypt</i>. Once encryption is off, hit Send.</p>
19bce4d7
TG
1029
1030<p class="notes">It may take two or three minutes for Edward to
1031respond. In the meantime, you might want to skip ahead and check out the <a
b7f7b4a2 1032href="#section6">Use it Well</a> section of this guide. Once you have received a response,
19bce4d7
TG
1033head to the next step. From here on, you'll be doing just the same thing as
1034when corresponding with a real person.</p>
1035
7b83f7f9 1036<p>When you open Edward's reply, GnuPG may prompt you for your passphrase
19bce4d7
TG
1037before using your private key to decrypt it.</p>
1038
1039</div><!-- End .main -->
7b83f7f9 1040</div><!-- End #step-4a .step -->
19bce4d7
TG
1041
1042<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1043<div id="step-4b" class="step">
1044<div class="sidebar">
19bce4d7 1045
69e314de 1046<p class="large"><img
14c5f099 1047src="../static/img/en/screenshots/step4b-option1-verify-key.png"
7b83f7f9 1048alt="Step 4.B Option 1. Verify key" /></p>
69e314de
TG
1049
1050<p class="large"><img
14c5f099 1051src="../static/img/en/screenshots/step4b-option2-import-key.png"
7b83f7f9 1052alt="Step 4.B Option 2. Import key" /></p>
1053</div><!-- /.sidebar -->
19bce4d7 1054
7b83f7f9 1055<div class="main">
19bce4d7 1056
7b83f7f9 1057<h3><em>Step 4.b</em> Send a test encrypted email</h3>
77aea16c
TG
1058
1059<h4>Get Edward's key</h4>
1060
80b64e11 1061<p>To encrypt an email to Edward, you need its public key, so now you'll have
7b83f7f9 1062to download it from a keyserver. You can do this in two different ways:</p>
fb4dff9b 1063<p><strong>Option 1.</strong> In the email answer you received from Edward as a response to your first email, Edward's public key was included. On the right of the email, just above the writing area, you will find an "OpenPGP" button that has a lock and a little wheel next to it. Click that, and select <i>Discover</i> next to the text: "This message was signed with a key that you don't yet have." A popup with Edward's key details will follow.</p>
19bce4d7 1064
fb4dff9b 1065<p><strong>Option 2.</strong> Open your OpenPGP Key manager, and under "Keyserver" choose <i>Discover Keys Online</i>. Here, fill in Edward's email address, and import Edward's key.</p>
19bce4d7 1066
77aea16c 1067<p>The option <i>Accepted (unverified)</i> will add this key to your key manager, and now it can be used to send encrypted emails and to verify digital signatures from Edward.</p>
19bce4d7 1068
b7f7b4a2 1069<p class="notes">In the popup window confirming if you want to import Edward's key, you'll see many different emails that are all associated with its key. This is correct; you can safely import the key.</p>
19bce4d7
TG
1070
1071<p class="notes">Since you encrypted this email with Edward's public key,
1072Edward's private key is required to decrypt it. Edward is the only one with
80b64e11 1073its private key, so no one except Edward can decrypt it.</p>
19bce4d7 1074
77aea16c 1075<h4>Send Edward an encrypted email</h4>
7b83f7f9 1076
a4eb3926 1077<p> Write a new email in your email program, addressed to <a
7b83f7f9 1078href="mailto:edward-en@fsf.org">edward-en@fsf.org</a>. Make the subject
1079"Encryption test" or something similar and write something in the body.</p>
1080
77aea16c 1081<p>This time, make sure encryption is turned on by using the dropdown menu "Security" and select <i>Require Encryption</i>. Once encryption is on, hit Send.</p>
7b83f7f9 1082
19bce4d7
TG
1083
1084<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
1085<div class="troubleshooting">
1086
1087<h4>Troubleshooting</h4>
1088
1089<dl>
7b83f7f9 1090<dt>"Recipients not valid, not trusted or not found"</dt>
412a3134 1091<dd>You could get the above error message, or something along these lines: "Unable to send this message with end-to-end encryption, because there are problems with the keys of the following recipients: ..." In these cases, you may be trying to send an encrypted email to someone when you do not have their public key yet. Make sure you follow the steps above to import the key to your key manager. Open the OpenPGP Key Manager to make sure the recipient is listed there.</dd>
7b83f7f9 1092
1093<dt>Unable to send message</dt>
f1ff80d1 1094<dd>You could get the following message when trying to send your encrypted email: "Unable to send this message with end-to-end encryption, because there are problems with the keys of the following recipients: edward-en@fsf.org." This usually means you imported the key with the "Not accepted (undecided)" option. Go to the "key properties" of this key by right clicking on the key in the OpenPGP Key Manager, and select the option <i>Yes, but I have not verified that this is the correct key</i> in the "Acceptance" option at the bottom of this window. Resend the email.</dd>
7b83f7f9 1095
1096<dt>I can't find Edward's key</dt>
19bce4d7 1097<dd>Close the pop-ups that have appeared since you clicked Send. Make sure
412a3134 1098you are connected to the Internet and try again. If that doesn't work, you can download the key manually from <a href="https://keys.openpgp.org/search?q=edward-en%40fsf.org">the keyserver</a>, and import it by using the <i>Import Public Key(s) from File</i> option in the OpenPGP Key Manager.</dd>
19bce4d7
TG
1099
1100<dt>Unscrambled messages in the Sent folder</dt>
1101<dd>Even though you can't decrypt messages encrypted to someone else's key,
1102your email program will automatically save a copy encrypted to your public key,
1103which you'll be able to view from the Sent folder like a normal email. This
1104is normal, and it doesn't mean that your email was not sent encrypted.</dd>
1105
19bce4d7
TG
1106<dt class="feedback">Don't see a solution to your problem?</dt>
1107<dd class="feedback">Please let us know on the <a
1108href="https://libreplanet.org/wiki/GPG_guide/Public_Review">feedback
1109page</a>.</dd>
1110</dl>
1111
1112</div><!-- /.troubleshooting -->
1113
1114<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
1115<div class="troubleshooting">
1116
1117<h4>Advanced</h4>
1118
1119<dl>
1120<dt>Encrypt messages from the command line</dt>
1121<dd>You can also encrypt and decrypt messages and files from the <a
1122href="https://www.gnupg.org/gph/en/manual/x110.html">command line</a>,
1123if that's your preference. The option --armor makes the encrypted output
1124appear in the regular character set.</dd>
1125</dl>
1126
1127</div><!-- /.troubleshooting -->
1128</div><!-- End .main -->
7b83f7f9 1129</div><!-- End #step-4b .step -->
19bce4d7
TG
1130
1131<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
1132<div id="step-headers_unencrypted" class="step">
1133<div class="main">
1134
1135<h3><em>Important:</em> Security tips</h3>
19e80165 1136
19bce4d7
TG
1137<p>Even if you encrypt your email, the subject line is not encrypted, so
1138don't put private information there. The sending and receiving addresses
1139aren't encrypted either, so a surveillance system can still figure out who
1140you're communicating with. Also, surveillance agents will know that you're
1141using GnuPG, even if they can't figure out what you're saying. When you
7b83f7f9 1142send attachments, you can choose to encrypt them or not,
19bce4d7 1143independent of the actual email.</p>
bdf319c4 1144
e72398d7
MB
1145<p>For greater security against potential attacks, you can turn off
1146HTML. Instead, you can render the message body as plain text. In order
77aea16c
TG
1147to do this in Icedove or Thunderbird, go to "View" &rarr; "Message Body As" &rarr; <i>Plain
1148Text</i>.</p>
e72398d7 1149
19bce4d7
TG
1150</div><!-- End .main -->
1151</div><!-- End #step-headers_unencrypted .step-->
d85363e7 1152
19bce4d7 1153<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1154<div id="step-4c" class="step">
1155<div class="sidebar">
1156
69e314de 1157<p class="large"><img
14c5f099 1158src="../static/img/en/screenshots/step4c-Edward-response.png"
7b83f7f9 1159alt="Step 4.C Edward's response" /></p>
1160
1161</div><!-- /.sidebar -->
1162
19bce4d7
TG
1163<div class="main">
1164
7b83f7f9 1165<h3><em>Step 4.c</em> Receive a response</h3>
19bce4d7 1166
80b64e11 1167<p>When Edward receives your email, it will use its private key to decrypt
f54f2134 1168it, then reply to you. </p>
19bce4d7
TG
1169
1170<p class="notes">It may take two or three minutes for Edward to
1171respond. In the meantime, you might want to skip ahead and check out the <a
7b83f7f9 1172href="#section6">Use it Well</a> section of this guide.</p>
1173
169c7097 1174<p>Edward will send you an encrypted email back saying your email was received and decrypted. Your email client will automatically decrypt Edward's message.</p>
7b83f7f9 1175
f2545138 1176<p class="notes">The OpenPGP button in the email will show a little green checkmark over the lock symbol to show the message is encrypted, and a little orange warning sign which means that you have accepted the key, but not verified it. When you have not yet accepted the key, you will see a little question mark there. Clicking the prompts in this button will lead you to key properties as well.</p>
19bce4d7 1177
19bce4d7 1178</div><!-- End .main -->
7b83f7f9 1179</div><!-- End #step-4c .step -->
19bce4d7
TG
1180
1181<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1182<div id="step-4d" class="step">
19bce4d7
TG
1183<div class="main">
1184
80b64e11 1185<h3><em>Step 4.d</em> Send a signed test email</h3>
19bce4d7
TG
1186
1187<p>GnuPG includes a way for you to sign messages and files, verifying that
1188they came from you and that they weren't tampered with along the way. These
1189signatures are stronger than their pen-and-paper cousins -- they're impossible
1190to forge, because they're impossible to create without your private key
1191(another reason to keep your private key safe).</p>
1192
1193<p>You can sign messages to anyone, so it's a great way to make people
1194aware that you use GnuPG and that they can communicate with you securely. If
1195they don't have GnuPG, they will be able to read your message and see your
1196signature. If they do have GnuPG, they'll also be able to verify that your
1197signature is authentic.</p>
1198
a4eb3926 1199<p>To sign an email to Edward, compose any message to the email address and click the
19bce4d7 1200pencil icon next to the lock icon so that it turns gold. If you sign a
5440702c 1201message, GnuPG may ask you for your passphrase before it sends the message,
19bce4d7
TG
1202because it needs to unlock your private key for signing.</p>
1203
77aea16c 1204<p>In "Account Settings" &rarr; "End-To-End-Encryption" you can opt to <i>add digital signature by default</i>.</p>
19bce4d7 1205
7b83f7f9 1206</div><!-- End .main -->
1207</div><!-- End #step-4d .step -->
19bce4d7
TG
1208
1209<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1210<div id="step-4e" class="step">
19bce4d7
TG
1211<div class="main">
1212
7b83f7f9 1213<h3><em>Step 4.e</em> Receive a response</h3>
19bce4d7 1214
f54f2134
Z
1215<p>When Edward receives your email, he will use your public key (which
1216you sent him in <a href="#step-3a">Step 3.A</a>) to verify the message
80b64e11 1217you sent has not been tampered with and to encrypt a reply to you.</p>
19bce4d7
TG
1218
1219<p class="notes">It may take two or three minutes for Edward to
1220respond. In the meantime, you might want to skip ahead and check out the <a
7b83f7f9 1221href="#section6">Use it Well</a> section of this guide.</p>
19bce4d7
TG
1222
1223<p>Edward's reply will arrive encrypted, because he prefers to use encryption
1224whenever possible. If everything goes according to plan, it should say
1225"Your signature was verified." If your test signed email was also encrypted,
1226he will mention that first.</p>
1227
7b83f7f9 1228<p>When you receive Edward's email and open it, your email client will
f54f2134
Z
1229automatically detect that it is encrypted with your public key, and
1230then it will use your private key to decrypt it.</p>
1231
19bce4d7 1232</div><!-- End .main -->
7b83f7f9 1233</div><!-- End #step-4e .step -->
19bce4d7
TG
1234</div></section>
1235
803e8e2e 1236<!-- ~~~~~~~~~ Section 5: Learn About the Web of Trust ~~~~~~~~~ -->
7b83f7f9 1237<section class="row" id="section5"><div>
19bce4d7
TG
1238
1239<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
1240<div class="section-intro">
1241
b7f7b4a2 1242<h2><em>#5</em> Learn about the Web of Trust</h2>
69e314de 1243<p class="float small"><img src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p>
19bce4d7 1244
b7f7b4a2 1245<p>Email encryption is a powerful technology, but it has a weakness:
19bce4d7
TG
1246it requires a way to verify that a person's public key is actually
1247theirs. Otherwise, there would be no way to stop an attacker from making
b7f7b4a2 1248an email address with your friend's name, creating keys to go with it, and
19bce4d7
TG
1249impersonating your friend. That's why the free software programmers that
1250developed email encryption created keysigning and the Web of Trust.</p>
1251
1252<p>When you sign someone's key, you are publicly saying that you've verified
1253that it belongs to them and not someone else.</p>
1254
1255<p>Signing keys and signing messages use the same type of mathematical
1256operation, but they carry very different implications. It's a good practice
1257to generally sign your email, but if you casually sign people's keys, you
77aea16c 1258may accidentally end up vouching for the identity of an imposter.</p>
19bce4d7
TG
1259
1260<p>People who use your public key can see who has signed it. Once you've
1261used GnuPG for a long time, your key may have hundreds of signatures. You
1262can consider a key to be more trustworthy if it has many signatures from
1263people that you trust. The Web of Trust is a constellation of GnuPG users,
1264connected to each other by chains of trust expressed through signatures.</p>
1265
1266</div><!-- End .section-intro -->
1267
1268<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1269<div id="step-5a" class="step">
19bce4d7
TG
1270<div class="sidebar">
1271
69e314de 1272<p class="large"><img
14c5f099 1273src="../static/img/en/screenshots/step5a-key-properties.png"
7b83f7f9 1274alt="Section 5: trusting a key" /></p>
19bce4d7
TG
1275
1276</div><!-- /.sidebar -->
1277<div class="main">
1278
7b83f7f9 1279<h3><em>Step 5.a</em> Sign a key</h3>
19bce4d7 1280
77aea16c 1281<p>In your email program's menu, go to OpenPGP Key Manager and select <i>Key properties</i> by right clicking on Edward's key.</p>
19bce4d7 1282
f1ff80d1 1283<p>Under "Your Acceptance," you can select <i>Yes, I've verified in person this key has the correct fingerprint</i>.</p>
19bce4d7
TG
1284
1285<p class="notes">You've just effectively said "I trust that Edward's public
1286key actually belongs to Edward." This doesn't mean much because Edward isn't
b7f7b4a2 1287a real person, but it's good practice, and for real people it is important. You can read more about signing a person's key in the <a href="#check-ids-before-signing">check IDs before signing</a> section.</p>
19bce4d7
TG
1288
1289<!--<div id="pgp-pathfinder">
1290
1291<form enctype="application/x-www-form-urlencoded" action="/mk_path.cgi"
1292method="get">
1293
f211d856 1294<p><strong>From:</strong><input type="text" value="xD41A008"
19bce4d7
TG
1295name="FROM"></p>
1296
f211d856 1297<p><strong>To:</strong><input type="text" value="50BD01x4" name="TO"></p>
19bce4d7
TG
1298
1299<p class="buttons"><input type="submit" value="trust paths" name="PATHS"><input
1300type="reset" value="reset" name=".reset"></p>
1301
1302</form>
1303
1304</div>End #pgp-pathfinder -->
1305</div><!-- End .main -->
7b83f7f9 1306</div><!-- End #step-5a .step -->
19bce4d7
TG
1307
1308<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
1309<div id="step-identify_keys" class="step">
1310<div class="main">
1311
1312<h3>Identifying keys: Fingerprints and IDs</h3>
1313
1314<p>People's public keys are usually identified by their key fingerprint,
1315which is a string of digits like F357AA1A5B1FA42CFD9FE52A9FF2194CC09A61E8
1316(for Edward's key). You can see the fingerprint for your public key, and
7b83f7f9 1317other public keys saved on your computer, by going to OpenPGP Key
19bce4d7
TG
1318Management in your email program's menu, then right clicking on the key
1319and choosing Key Properties. It's good practice to share your fingerprint
1320wherever you share your email address, so that people can double-check that
1321they have the correct public key when they download yours from a keyserver.</p>
1322
c0c01f86 1323<p class="notes">You may also see public keys referred to by a shorter
a4eb3926 1324keyID. This keyID is visible directly from the Key Management
1325window. These eight character keyIDs were previously used for
c0c01f86
MB
1326identification, which used to be safe, but is no longer reliable. You
1327need to check the full fingerprint as part of verifying you have the
1328correct key for the person you are trying to contact. Spoofing, in
1329which someone intentionally generates a key with a fingerprint whose
1330final eight characters are the same as another, is unfortunately
1331common.</p>
19bce4d7
TG
1332
1333</div><!-- End .main -->
1334</div><!-- End #step-identify_keys .step-->
1335
1336<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
1337<div id="check-ids-before-signing" class="step">
1338<div class="main">
1339
1340<h3><em>Important:</em> What to consider when signing keys</h3>
1341
1342<p>Before signing a person's key, you need to be confident that it actually
1343belongs to them, and that they are who they say they are. Ideally, this
1344confidence comes from having interactions and conversations with them over
1345time, and witnessing interactions between them and others. Whenever signing
1346a key, ask to see the full public key fingerprint, and not just the shorter
a4eb3926 1347keyID. If you feel it's important to sign the key of someone you've just
19bce4d7 1348met, also ask them to show you their government identification, and make
7b83f7f9 1349sure the name on the ID matches the name on the public key.</p>
19bce4d7
TG
1350
1351<!-- ~~~~~~~~~ Troubleshooting ~~~~~~~~~ -->
1352<div class="troubleshooting">
1353
1354<h4>Advanced</h4>
1355
1356<dl>
1357<dt>Master the Web of Trust</dt>
1358<dd>Unfortunately, trust does not spread between users the way <a
6003a573 1359href="https://fennetic.net/irc/finney.org/~hal/web_of_trust.html">many people
a4eb3926 1360think</a>. One of the best ways to strengthen the GnuPG community is to deeply <a
19bce4d7
TG
1361href="https://www.gnupg.org/gph/en/manual/x334.html">understand</a> the Web of
1362Trust and to carefully sign as many people's keys as circumstances permit.</dd>
19bce4d7
TG
1363</dl>
1364
1365</div><!-- /.troubleshooting -->
1366</div><!-- End .main -->
1367</div><!-- End #check-ids-before-signing .step-->
7b83f7f9 1368</div></section><!-- End #section5 -->
d85363e7 1369
7b83f7f9 1370<!-- ~~~~~~~~~ Section 6: Use it well ~~~~~~~~~ -->
1371<section id="section6" class="row"><div>
19bce4d7
TG
1372
1373<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
1374<div class="section-intro">
1375
7b83f7f9 1376<h2><em>#6</em> Use it well</h2>
19bce4d7
TG
1377
1378<p>Everyone uses GnuPG a little differently, but it's important to follow
1379some basic practices to keep your email secure. Not following them, you
1380risk the privacy of the people you communicate with, as well as your own,
1381and damage the Web of Trust.</p>
1382
1383</div><!-- End .section-intro -->
1384
1385<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1386<div id="step-6a" class="step">
19bce4d7
TG
1387<div class="sidebar">
1388
69e314de 1389<p class="medium"><img
1805f65d 1390src="../static/img/en/screenshots/section6-01-use-it-well.png"
7b83f7f9 1391alt="Section 6: Use it Well (1)" /></p>
19bce4d7
TG
1392
1393</div><!-- /.sidebar -->
1394<div class="main">
1395
1396<h3>When should I encrypt? When should I sign?</h3>
1397
1398<p>The more you can encrypt your messages, the better. If you only encrypt
1399emails occasionally, each encrypted message could raise a red flag for
1400surveillance systems. If all or most of your email is encrypted, people
1401doing surveillance won't know where to start. That's not to say that only
1402encrypting some of your email isn't helpful -- it's a great start and it
1403makes bulk surveillance more difficult.</p>
1404
1405<p>Unless you don't want to reveal your own identity (which requires other
1406protective measures), there's no reason not to sign every message, whether or
1407not you are encrypting. In addition to allowing those with GnuPG to verify
1408that the message came from you, signing is a non-intrusive way to remind
1409everyone that you use GnuPG and show support for secure communication. If you
1410often send signed messages to people that aren't familiar with GnuPG, it's
1411nice to also include a link to this guide in your standard email signature
1412(the text kind, not the cryptographic kind).</p>
1413
1414</div><!-- End .main -->
7b83f7f9 1415</div><!-- End #step-6a .step -->
19bce4d7
TG
1416
1417<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1418<div id="step-6b" class="step">
19bce4d7
TG
1419<div class="sidebar">
1420
69e314de 1421<p class="medium"><img
1805f65d 1422src="../static/img/en/screenshots/section6-02-use-it-well.png"
7b83f7f9 1423alt="Section 6: Use it Well (2)" /></p>
19bce4d7
TG
1424
1425</div><!-- /.sidebar -->
1426<div class="main">
1427
1428<h3>Be wary of invalid keys</h3>
1429
1430<p>GnuPG makes email safer, but it's still important to watch out for invalid
1431keys, which might have fallen into the wrong hands. Email encrypted with
1432invalid keys might be readable by surveillance programs.</p>
1433
1434<p>In your email program, go back to the first encrypted email that Edward
1435sent you. Because Edward encrypted it with your public key, it will have a
f1ff80d1 1436green checkmark on the "OpenPGP" button.</p>
19bce4d7 1437
77aea16c 1438<p><strong>When using GnuPG, make a habit of glancing at that button. The program
4227f3fd 1439will warn you there if you get an email signed with a key that can't
77aea16c 1440be trusted.</strong></p>
19bce4d7
TG
1441
1442</div><!-- End .main -->
7b83f7f9 1443</div><!-- End #step-6b .step -->
19bce4d7
TG
1444
1445<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1446<div id="step-6c" class="step">
19bce4d7
TG
1447<div class="main">
1448
1449<h3>Copy your revocation certificate to somewhere safe</h3>
1450
1451<p>Remember when you created your keys and saved the revocation certificate
80b64e11 1452that GnuPG made? It's time to copy that certificate onto the safest storage that you have -- a flash drive, disk, or hard drive stored in a safe place in your home could work, not on a device you carry with you regularly. The safest way we know is actually to print the revocation certificate and store it in a safe place.</p>
19bce4d7
TG
1453
1454<p>If your private key ever gets lost or stolen, you'll need this certificate
1455file to let people know that you are no longer using that keypair.</p>
1456
1457</div><!-- End .main -->
7b83f7f9 1458</div><!-- End #step-6c .step -->
19bce4d7
TG
1459
1460<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
1461<div id="step-lost_key" class="step">
1462<div class="main">
1463
b7f7b4a2 1464<h3><em>IMPORTANT:</em> ACT SWIFTLY if someone gets your private key</h3>
19bce4d7 1465
b7f7b4a2 1466<p>If you lose your private key or someone else gets a hold
19bce4d7
TG
1467of it (say, by stealing or cracking your computer), it's
1468important to revoke it immediately before someone else uses
1469it to read your encrypted email or forge your signature. This
1470guide doesn't cover how to revoke a key, but you can follow these <a
1471href="https://www.hackdiary.com/2004/01/18/revoking-a-gpg-key/">instructions</a>.
1472After you're done revoking, make a new key and send an email to everyone
1473with whom you usually use your key to make sure they know, including a copy
1474of your new key.</p>
1475
1476</div><!-- End .main -->
1477</div><!-- End #step-lost_key .step-->
1478
35f08087 1479<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
19bce4d7
TG
1480<div id="webmail-and-GnuPG" class="step">
1481<div class="main">
1482
1483<h3>Webmail and GnuPG</h3>
1484
1485<p>When you use a web browser to access your email, you're using webmail,
1486an email program stored on a distant website. Unlike webmail, your desktop
1487email program runs on your own computer. Although webmail can't decrypt
1488encrypted email, it will still display it in its encrypted form. If you
1489primarily use webmail, you'll know to open your email client when you receive
1490a scrambled email.</p>
1491
1492</div><!-- End .main -->
1493</div><!-- End #webmail-and-GnuPG .step-->
1494
35f08087 1495<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
7b83f7f9 1496<div id="step-6d" class="step">
19bce4d7
TG
1497<div class="main">
1498
1499<h3>Make your public key part of your online identity</h3>
1500
1501<p> First add your public key fingerprint to your email signature, then
1502compose an email to at least five of your friends, telling them you just
1503set up GnuPG and mentioning your public key fingerprint. Link to this guide
1504and ask them to join you. Don't forget that there's also an awesome <a
1505href="infographic.html">infographic to share.</a></p>
1506
1507<p class="notes">Start writing your public key fingerprint anywhere someone
1508would see your email address: your social media profiles, blog, Website,
1509or business card. (At the Free Software Foundation, we put ours on our
1510<a href="https://fsf.org/about/staff">staff page</a>.) We need to get our
1511culture to the point that we feel like something is missing when we see an
1512email address without a public key fingerprint.</p>
1513
35f08087 1514</div><!-- End .main-->
1515</div><!-- End #step-6d .step-->
7b83f7f9 1516</div></section><!-- End #section6 -->
19bce4d7 1517
7b83f7f9 1518<!-- ~~~~~~~~~ Section 7: Next steps ~~~~~~~~~ -->
b7f7b4a2 1519<section class="row" id="section7">
19bce4d7
TG
1520<div id="step-click_here" class="step">
1521<div class="main">
0a225228 1522
19bce4d7 1523<h2><a href="next_steps.html">Great job! Check out the next steps.</a></h2>
bb28ee32 1524
19bce4d7
TG
1525</div><!-- End .main -->
1526</div><!-- End #step-click_here .step-->
7b83f7f9 1527</section><!-- End #section7 -->
bdf319c4 1528
19bce4d7 1529<!-- ~~~~~~~~~ FAQ ~~~~~~~~~ -->
f44dd62f 1530<!-- When un-commenting this section go to main.css and search
116f80c3 1531for /* Guide Sections Background */ then add #faq to the desired color
19bce4d7 1532<section class="row" id="faq"><div>
116f80c3 1533<div class="sidebar">
19bce4d7 1534
116f80c3 1535<h2>FAQ</h2>
6c495e2d 1536
19bce4d7 1537</div>
116f80c3 1538<div class="main">
19bce4d7 1539
116f80c3
ZR
1540<dl>
1541<dt>My key expired</dt>
1542<dd>Answer coming soon.</dd>
6c495e2d 1543
116f80c3
ZR
1544<dt>Who can read encrypted messages? Who can read signed ones?</dt>
1545<dd>Answer coming soon.</dd>
6c495e2d 1546
19bce4d7
TG
1547<dt>My email program is opening at times I don't want it to open/is now my
1548default program and I don't want it to be.</dt>
116f80c3
ZR
1549<dd>Answer coming soon.</dd>
1550</dl>
19bce4d7 1551
116f80c3
ZR
1552</div>
1553</div>
1554</section> --><!-- End #faq -->
bdf319c4 1555
19bce4d7
TG
1556<!-- ~~~~~~~~~ Footer ~~~~~~~~~ -->
1557<footer class="row" id="footer"><div>
1558<div id="copyright">
1559
1560<h4><a href="https://u.fsf.org/ys"><img
1561alt="Free Software Foundation"
14c5f099 1562src="../static/img/fsf-logo.png" /></a></h4>
19bce4d7 1563
37d0bc33 1564<p>Copyright &copy; 2014-2021 <a
19bce4d7
TG
1565href="https://u.fsf.org/ys">Free Software Foundation</a>, Inc. <a
1566href="https://my.fsf.org/donate/privacypolicy.html">Privacy Policy</a>. Please
1567support our work by <a href="https://u.fsf.org/yr">joining us as an associate
1568member.</a></p>
1569
1570<p>The images on this page are under a <a
1571href="https://creativecommons.org/licenses/by/4.0/">Creative Commons
1572Attribution 4.0 license (or later version)</a>, and the rest of it is under
1573a <a href="https://creativecommons.org/licenses/by-sa/4.0">Creative Commons
1574Attribution-ShareAlike 4.0 license (or later version)</a>. Download the <a
6003a573 1575href="https://agpl.fsf.org/emailselfdefense.fsf.org/edward/CURRENT/edward.tar.gz">
f211d856 1576source code of Edward reply bot</a> by Andrew Engelbrecht
a3a9a0ac 1577&lt;andrew@engelbrecht.io&gt; and Josh Drake &lt;zamnedix@gnu.org&gt;,
19bce4d7 1578available under the GNU Affero General Public License. <a
6003a573 1579href="https://www.gnu.org/licenses/license-list.html#OtherLicenses">Why these
19bce4d7
TG
1580licenses?</a></p>
1581
1582<p>Fonts used in the guide &amp; infographic: <a
1583href="https://www.google.com/fonts/specimen/Dosis">Dosis</a> by Pablo
6003a573 1584Impallari, <a href="https://www.google.com/fonts/specimen/Signika">Signika</a>
19bce4d7 1585by Anna Giedry&#347;, <a
6003a573 1586href="https://www.google.com/fonts/specimen/Archivo+Narrow">Archivo
19bce4d7
TG
1587Narrow</a> by Omnibus-Type, <a
1588href="https://libreplanet.org/wiki/GPG_guide/Graphics_Howto#Pitfalls">PXL-2000</a>
1589by Florian Cramer.</p>
1590
1591<p>Download the <a href="emailselfdefense_source.zip">source package</a>
1592for this guide, including fonts, image source files and the text of Edward's
1593messages.</p>
1594
1595<p>This site uses the Weblabels standard for labeling <a
1596href="https://www.fsf.org/campaigns/freejs">free JavaScript</a>. View
abf30801 1597the JavaScript <a href="https://weblabels.fsf.org/emailselfdefense.fsf.org/"
19bce4d7
TG
1598rel="jslicense">source code and license information</a>.</p>
1599
1600</div><!-- /#copyright -->
1601
1602<p class="credits">Infographic and guide design by <a rel="external"
6003a573 1603href="https://jplusplus.org"><strong>Journalism++</strong><img
e277af54 1604src="../static/img/jplusplus.png"
19bce4d7
TG
1605alt="Journalism++" /></a></p><!-- /.credits -->
1606</div></footer><!-- End #footer -->
116f80c3 1607
116f80c3 1608
f211d856 1609<script type="text/javascript"
14c5f099 1610src="../static/js/jquery-1.11.0.min.js"></script>
f211d856 1611<script type="text/javascript"
14c5f099 1612src="../static/js/scripts.js"></script>
116f80c3 1613<!-- Piwik -->
e609e128 1614<script type="text/javascript">
77aea16c 1615 // @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-2.0-or-later
e609e128
AE
1616 var _paq = _paq || [];
1617 _paq.push(["trackPageView"]);
1618 _paq.push(["enableLinkTracking"]);
1619
1620 (function() {
1621 var u = (("https:" == document.location.protocol) ? "https" : "http") + "://"+"piwik.fsf.org//";
1622 _paq.push(["setTrackerUrl", u+"piwik.php"]);
1623 _paq.push(["setSiteId", "13"]);
1624 var d=document, g=d.createElement("script"), s=d.getElementsByTagName("script")[0]; g.type="text/javascript";
1625 g.defer=true; g.async=true; g.src=u+"piwik.js"; s.parentNode.insertBefore(g,s);
1626 })();
1627 // @license-end
1628</script>
1629<!-- End Piwik Code -->
1630<!-- Piwik Image Tracker -->
9420f8ec 1631<!-- <noscript><img src="https://piwik.fsf.org//piwik.php?idsite=13&amp;rec=1" style="border:0" alt="" /></noscript> -->
e609e128 1632<!-- End Piwik -->
116f80c3 1633</body>
bdf319c4 1634</html>