permissions plural
[enc-live.git] / en / workshops.html
CommitLineData
19bce4d7
TG
1<!DOCTYPE html>
2<html lang="en">
3<head>
4<meta http-equiv="content-type" content="text/html; charset=utf-8" />
d06ce723
TG
5<title>Email Self-Defense - a guide to fighting surveillance with GnuPG
6encryption</title>
19bce4d7
TG
7<meta name="keywords" content="GnuPG, GPG, openpgp, surveillance, privacy,
8email, Enigmail" />
9<meta name="description" content="Email surveillance violates our fundamental
10rights and makes free speech risky. This guide will teach you email
11self-defense in 40 minutes with GnuPG." />
12<meta name="viewport" content="width=device-width, initial-scale=1" />
14c5f099 13<link rel="stylesheet" href="../static/css/main.css" />
19bce4d7 14<link rel="shortcut icon"
14c5f099 15href="../static/img/favicon.ico" />
2c595172 16</head>
19bce4d7 17
abf30801 18<body><iframe src="https://static.fsf.org/nosvn/banners/2021fundraiser-spring/" style="width: 100%; height: 150px; display: block; margin: 0; border: 0 none; overflow: hidden;"></iframe><div style="text-align: center; padding: 2.5px; background-color: #a94442; color:#fcf8e3;"><p>Due to Enigmail's PGP functionality being migrated into Icedove and Thunderbird, steps 2 and 3 of the guide are currently out of date.</p><p> Thank you for your patience while we're working on a new round of updates.</p></div>
2c595172 19
19bce4d7
TG
20<!-- ~~~~~~~~~ GnuPG Header and introduction text ~~~~~~~~~ -->
21<header class="row" id="header"><div>
2c595172 22
19bce4d7 23<h1>Email Self-Defense</h1>
2c595172 24
19bce4d7
TG
25<!-- Language list for browsers that do not have JS enabled -->
26<ul id="languages" class="os">
810614f7 27<!--<li><a class="current" href="/en">English - v4.0</a></li>
c1fa777e 28<li><a href="/cs">čeština - v4.0</a></li>
f7d7ddc2 29<li><a href="/de">Deutsch - v4.0</a></li>
7c4f505e
ZR
30<li><a href="/el">ελληνικά - v3.0</a></li>
31<li><a href="/es">español - v4.0</a></li>
32<li><a href="/fa">فارسی - v4.0</a></li>
33<li><a href="/fr">français - v4.0</a></li>
34<li><a href="/it">italiano - v3.0</a></li>
35<li><a href="/ja">日本語 - v4.0</a></li>
7c4f505e
ZR
36<li><a href="/pt-br">português do Brasil - v3.0</a></li>
37<li><a href="/ro">română - v3.0</a></li>
38<li><a href="/ru">русский - v4.0</a></li>
19bce4d7 39<li><a href="/sq">Shqip - v4.0</a></li>
7c4f505e
ZR
40<li><a href="/sv">svenska - v4.0</a></li>
41<li><a href="/tr">Türkçe - v4.0</a></li>
810614f7 42<li><a href="/zh-hans">简体中文 - v4.0</a></li>-->
ce9d37a4
TG
43<li><a href="https://libreplanet.org/wiki/GPG_guide/Translation_Guide">
44<strong><span style="color: #2F5FAA;">Translate!</span></strong></a></li>
19bce4d7
TG
45</ul>
46
47<ul id="menu" class="os">
0d48ac9a
AE
48<li class="spacer"><a href="index.html">Set up guide</a></li>
49<!--<li><a href="mac.html">Mac OS</a></li>-->
50<!--<li><a href="windows.html">Windows</a></li>-->
19bce4d7 51<li><a href="workshops.html" class="current">Teach your friends</a></li>
11fb02b0 52<li><a href="https://fsf.org/share?u=https://u.fsf.org/zb&amp;t=Email%20encryption%20for%20everyone%20via%20%40fsf">Share&nbsp;
19bce4d7 53<img
14c5f099 54src="../static/img/gnu-social.png" class="share-logo"
19bce4d7
TG
55alt="[GNU Social]" />&nbsp;
56<img
14c5f099 57src="../static/img/mastodon.png" class="share-logo"
d06ce723 58alt="[Mastodon]" />&nbsp;
19bce4d7 59<img
14c5f099 60src="../static/img/reddit-alien.png" class="share-logo"
19bce4d7
TG
61alt="[Reddit]" />&nbsp;
62<img
14c5f099 63src="../static/img/hacker-news.png" class="share-logo"
19bce4d7
TG
64alt="[Hacker News]" />
65</a></li>
66</ul>
67
68<!-- ~~~~~~~~~ FSF Introduction ~~~~~~~~~ -->
69<div id="fsf-intro">
70
6003a573 71<h3><a href="https://u.fsf.org/ys"><img
19bce4d7 72alt="Free Software Foundation"
14c5f099 73src="../static/img/fsf-logo.png" />
19bce4d7
TG
74</a></h3>
75
76<div class="fsf-emphasis">
77
78<p>We want to translate this guide
79into more languages, and make a version for encryption on mobile
80devices. Please donate, and help people around the world take the first
81step towards protecting their privacy with free software.</p>
2c595172 82
19bce4d7 83</div>
2c595172 84
19bce4d7
TG
85<p><a
86href="https://crm.fsf.org/civicrm/contribute/transact?reset=1&amp;id=14&amp;pk_campaign=email_self_defense&amp;pk_kwd=guide_donate"><img
87alt="Donate"
14c5f099 88src="../static/img/en/donate.png" /></a></p>
19bce4d7
TG
89
90</div><!-- End #fsf-intro -->
91
92<!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
93<div class="intro">
94
95<p><a id="infographic"
96href="https://emailselfdefense.fsf.org/en/infographic.html"><img
14c5f099 97src="../static/img/en/infographic-button.png"
19bce4d7
TG
98alt="View &amp; share our infographic →" /></a>
99Understanding and setting up email encryption sounds like a daunting task
100to many people. That's why helping your friends with GnuPG plays such an
101important role in helping spread encryption. Even if only one person shows
102up, that's still one more person using encryption who wasn't before. You have
103the power to help your friends keep their digital love letters private, and
104teach them about the importance of free software. If you use GnuPG to send and
105receive encrypted email, you're a perfect candidate for leading a workshop!</p>
106
107</div><!-- End .intro -->
108</div></header><!-- End #header -->
109
110<!-- ~~~~~~~~~ Section 1: Get your friends or community interested ~~~~~~~~~
111-->
112<section style="padding-top: 0px;" class="row" id="section1">
113<div style="padding-top: 0px;">
114
115<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
116<div class="section-intro">
19bce4d7 117<p style="margin-top: 0px;" class="image"><img
14c5f099 118src="../static/img/en/screenshots/workshop-section1-update.png"
19bce4d7 119alt="A small workshop among friends" /></p>
19bce4d7
TG
120<h2><em>#1</em> Get your friends or community interested </h2>
121
122<p>If you hear friends grumbling about their lack of privacy, ask them if
123they're interested in attending a workshop on Email Self-Defense. If your
124friends don't grumble about privacy, they may need some convincing. You might
125even hear the classic "if you've got nothing to hide, you've got nothing to
126fear" argument against using encryption.</p>
127
128<p>Here are some talking points you can use to help explain why it's worth
129it to learn GnuPG. Mix and match whichever you think will make sense to
130your community:</p>
131
132</div><!-- End .section-intro -->
133<div id="step-aa" class="step">
134<div class="sidebar">
135<!-- Workshops image commented out from here, to be used above instead.
2c595172 136
19bce4d7 137<p><img id="workshops-image"
14c5f099 138src="../static/img/en/screenshots/workshop-section1.png"
19bce4d7
TG
139alt="Workshop icon"></p>-->
140</div><!-- /.sidebar -->
141<div class="main">
2c595172 142
19bce4d7 143<h3>Strength in numbers</h3>
2c595172 144
19bce4d7
TG
145<p>Each person who chooses to resist mass surveillance with encryption makes
146it easier for others to resist as well. People normalizing the use of strong
147encryption has multiple powerful effects: it means those who need privacy
148the most, like potential whistle-blowers and activists, are more likely to
149learn about encryption. More people using encryption for more things also
150makes it harder for surveillance systems to single out those that can't
151afford to be found, and shows solidarity with those people.</p>
152
153</div><!-- End .main -->
154<div class="main">
2c595172 155
19bce4d7 156<h3>People you respect may already be using encryption</h3>
d083698e 157
19bce4d7
TG
158<p>Many journalists, whistleblowers, activists, and researchers use GnuPG,
159so your friends might unknowingly have heard of a few people who use it
160already. You can search for "BEGIN PUBLIC KEY BLOCK" + keyword to help make
161a list of people and organizations who use GnuPG whom your community will
162likely recognize.</p>
2c595172 163
19bce4d7
TG
164</div><!-- End .main -->
165<div class="main">
2c595172 166
19bce4d7 167<h3>Respect your friends' privacy</h3>
2c595172 168
19bce4d7
TG
169<p>There's no objective way to judge what constitutes privacy-sensitive
170correspondence. As such, it's better not to presume that just because you
171find an email you sent to a friend innocuous, your friend (or a surveillance
172agent, for that matter!) feels the same way. Show your friends respect by
173encrypting your correspondence with them.</p>
2c595172 174
19bce4d7
TG
175</div><!-- End .main -->
176<div class="main">
2c595172 177
19bce4d7 178<h3>Privacy technology is normal in the physical world</h3>
2c595172 179
19bce4d7
TG
180<p>In the physical realm, we take window blinds, envelopes, and closed doors
181for granted as ways of protecting our privacy. Why should the digital realm
182be any different?</p>
2c595172 183
19bce4d7
TG
184</div><!-- End .main -->
185<div class="main">
2c595172 186
19bce4d7
TG
187<h3>We shouldn't have to trust our email providers with our privacy</h3>
188
189<p>Some email providers are very trustworthy, but many have incentives not
190to protect your privacy and security. To be empowered digital citizens,
191we need to build our own security from the bottom up.</p>
2c595172 192
19bce4d7
TG
193</div><!-- End .main -->
194</div><!-- End #step-aa .step -->
195</div></section><!-- End #section1 -->
196
197<!-- ~~~~~~~~~ Section 2: Plan The Workshop ~~~~~~~~~ -->
198<section class="row" id="section2"><div>
199
200<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
201<div class="section-intro" style="border: none; padding-bottom: 0px;
202margin-bottom: 0px;">
203
204<h2><em>#2</em> Plan The Workshop</h2>
205
206<p>Once you've got at least one interested friend, pick a date and start
207planning out the workshop. Tell participants to bring their computer and
208ID (for signing each other's keys). If you'd like to make it easy for the
2e2151c8 209participants to use <a href="https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/">Diceware</a> for choosing passwords, get a pack of dice
19bce4d7
TG
210beforehand. Make sure the location you select has an easily accessible
211Internet connection, and make backup plans in case the connection stops
212working on the day of the workshop. Libraries, coffee shops, and community
213centers make great locations. Try to get all the participants to set up
2e2151c8 214an email client based on Thunderbird before the event. Direct them to their
19bce4d7
TG
215email provider's IT department or help page if they run into errors.</p>
216
217<p>Estimate that the workshop will take at least forty minutes plus ten minutes
218for each participant. Plan extra time for questions and technical glitches.</p>
219
220<p>The success of the workshop requires understanding and catering to
221the unique backgrounds and needs of each group of participants. Workshops
222should stay small, so that each participant receives more individualized
223instruction. If more than a handful of people want to participate, keep the
224facilitator to participant ratio high by recruiting more facilitators, or by
225facilitating multiple workshops. Small workshops among friends work great!</p>
226
227</div><!-- End .section-intro -->
228</div></section><!-- End #section2 -->
229
230<!-- ~~~~~~~~~ Section 3: Follow The Guide ~~~~~~~~~ -->
231<section class="row" id="section3"><div>
2c595172 232
19bce4d7
TG
233<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
234<div class="section-intro" style="border: none; padding-bottom: 0px;
235margin-bottom: 0px;">
2c595172 236
19bce4d7 237<h2><em>#3</em> Follow the guide as a group</h2>
2c595172 238
19bce4d7
TG
239<p>Work through the Email Self-Defense guide a step at a time as a group. Talk
240about the steps in detail, but make sure not to overload the participants
241with minutia. Pitch the bulk of your instructions to the least tech-savvy
242participants. Make sure all the participants complete each step before the
243group moves on to the next one. Consider facilitating secondary workshops
244afterwards for people that had trouble grasping the concepts, or those that
245grasped them quickly and want to learn more.</p>
2c595172 246
19bce4d7
TG
247<p>In <a href="index.html#section2">Section 2</a> of the guide, make
248sure the participants upload their keys to the same keyserver so that
249they can immediately download each other's keys later (sometimes
250there is a delay in synchronization between keyservers). During <a
251href="index.html#section3">Section 3</a>, give the participants the option to
252send test messages to each other instead of or as well as Edward. Similarly,
253in <a href="index.html#section4">Section 4</a>, encourage the participants
254to sign each other's keys. At the end, make sure to remind people to safely
255back up their revocation certificates.</p>
2c595172 256
19bce4d7
TG
257</div><!-- End .section-intro -->
258</div></section>
2c595172 259
19bce4d7
TG
260<!-- ~~~~~~~~~ Section 4: Explain the pitfalls ~~~~~~~~~ -->
261<section class="row" id="section4"><div>
2c595172 262
19bce4d7
TG
263<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
264<div class="section-intro" style="border: none; padding-bottom: 0px;
265margin-bottom: 0px;">
2c595172 266
19bce4d7 267<h2><em>#4</em> Explain the pitfalls</h2>
2c595172 268
19bce4d7
TG
269<p>Remind participants that encryption works only when it's explicitly used;
270they won't be able to send an encrypted email to someone who hasn't already
271set up encryption. Also remind participants to double-check the encryption icon
272before hitting send, and that subjects and timestamps are never encrypted.</p>
2c595172 273
19bce4d7
TG
274<p> Explain the <a
275href="https://www.gnu.org/proprietary/proprietary.html">dangers
276of running a proprietary system</a> and
277advocate for free software, because without it, we can't <a
278href="https://www.fsf.org/bulletin/2013/fall/how-can-free-software-protect-us-from-surveillance">meaningfully
279resist invasions of our digital privacy and autonomy</a>.</p>
2c595172 280
19bce4d7
TG
281</div><!-- End .section-intro -->
282</div></section><!-- End #section4 -->
2c595172 283
19bce4d7
TG
284<!-- ~~~~~~~~~ Section 5: Explain The Pitfalls ~~~~~~~~~ -->
285<section id="section5" class="row"><div>
2c595172 286
19bce4d7
TG
287<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
288<div class="section-intro" style="border: none; padding-bottom: 0px;
289margin-bottom: 0px;">
290
291<h2><em>#5</em> Share additional resources</h2>
292
293<p>GnuPG's advanced options are far too complex to teach in a single
294workshop. If participants want to know more, point out the advanced subsections
295in the guide and consider organizing another workshop. You can also share
2e2151c8 296<a href="https://www.gnupg.org/documentation/index.html">GnuPG's</a>
297official documentation and mailing lists, and the <a href="https://libreplanet.org/wiki/GPG_guide/Public_Review">Email Self-Defense feedback</a> page. Many GNU/Linux distribution's Web
19bce4d7
TG
298sites also contain a page explaining some of GnuPG's advanced features.</p>
299
300</div><!-- End .section-intro -->
301</div></section><!-- End #section5 -->
302
303<!-- ~~~~~~~~~ Section 6: Next steps ~~~~~~~~~ -->
304<section class="row" id="section6"><div>
305
306<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
307<div class="section-intro" style="border: none; padding-bottom: 0px;
308margin-bottom: 0px;">
309
310<h2><em>#6</em> Follow up</h2>
311
312<p>Make sure everyone has shared email addresses and public key fingerprints
313before they leave. Encourage the participants to continue to gain GnuPG
314experience by emailing each other. Send them each an encrypted email one
315week after the event, reminding them to try adding their public key ID to
316places where they publicly list their email address.</p>
2c595172 317
19bce4d7
TG
318<p>If you have any suggestions for improving this workshop guide, please
319let us know at <a href="mailto:campaigns@fsf.org">campaigns@fsf.org</a>.</p>
320
321</div><!-- End .section-intro -->
322</div></section><!-- End #section6 -->
19bce4d7
TG
323<!-- ~~~~~~~~~ Footer ~~~~~~~~~ -->
324<footer class="row" id="footer"><div>
325<div id="copyright">
326
327<h4><a href="https://u.fsf.org/ys"><img
328alt="Free Software Foundation"
14c5f099 329src="../static/img/fsf-logo.png" /></a></h4>
19bce4d7 330
2e2151c8 331<p>Copyright &copy; 2014-2021 <a
19bce4d7
TG
332href="https://u.fsf.org/ys">Free Software Foundation</a>, Inc. <a
333href="https://my.fsf.org/donate/privacypolicy.html">Privacy Policy</a>. Please
334support our work by <a href="https://u.fsf.org/yr">joining us as an associate
335member.</a></p>
336
337<p>The images on this page are under a <a
338href="https://creativecommons.org/licenses/by/4.0/">Creative Commons
339Attribution 4.0 license (or later version)</a>, and the rest of it is under
340a <a href="https://creativecommons.org/licenses/by-sa/4.0">Creative Commons
341Attribution-ShareAlike 4.0 license (or later version)</a>. Download the <a
6003a573 342href="https://agpl.fsf.org/emailselfdefense.fsf.org/edward/CURRENT/edward.tar.gz">
5dd8f91f 343source code of Edward reply bot</a> by Andrew Engelbrecht
a3a9a0ac 344&lt;andrew@engelbrecht.io&gt; and Josh Drake &lt;zamnedix@gnu.org&gt;,
19bce4d7 345available under the GNU Affero General Public License. <a
6003a573 346href="https://www.gnu.org/licenses/license-list.html#OtherLicenses">Why these
19bce4d7
TG
347licenses?</a></p>
348
349<p>Fonts used in the guide &amp; infographic: <a
350href="https://www.google.com/fonts/specimen/Dosis">Dosis</a> by Pablo
6003a573 351Impallari, <a href="https://www.google.com/fonts/specimen/Signika">Signika</a>
19bce4d7 352by Anna Giedry&#347;, <a
6003a573 353href="https://www.google.com/fonts/specimen/Archivo+Narrow">Archivo
19bce4d7
TG
354Narrow</a> by Omnibus-Type, <a
355href="https://libreplanet.org/wiki/GPG_guide/Graphics_Howto#Pitfalls">PXL-2000</a>
356by Florian Cramer.</p>
357
358<p>Download the <a href="emailselfdefense_source.zip">source package</a>
359for this guide, including fonts, image source files and the text of Edward's
360messages.</p>
361
362<p>This site uses the Weblabels standard for labeling <a
363href="https://www.fsf.org/campaigns/freejs">free JavaScript</a>. View
abf30801 364the JavaScript <a href="https://weblabels.fsf.org/emailselfdefense.fsf.org/"
19bce4d7
TG
365rel="jslicense">source code and license information</a>.</p>
366
367</div><!-- /#copyright -->
368
369<p class="credits">Infographic and guide design by <a rel="external"
6003a573 370href="https://jplusplus.org"><strong>Journalism++</strong><img
14c5f099 371src="../static/img/jplusplus.png"
19bce4d7
TG
372alt="Journalism++" /></a></p><!-- /.credits -->
373</div></footer><!-- End #footer -->
7c4f505e 374
5dd8f91f 375<script type="text/javascript"
14c5f099 376src="../static/js/jquery-1.11.0.min.js"></script>
2c595172 377<!-- Piwik -->
e609e128
AE
378<script type="text/javascript">
379 // @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&dn=gpl-2.0.txt GPL-2.0-or-later
380 var _paq = _paq || [];
381 _paq.push(["trackPageView"]);
382 _paq.push(["enableLinkTracking"]);
383
384 (function() {
385 var u = (("https:" == document.location.protocol) ? "https" : "http") + "://"+"piwik.fsf.org//";
386 _paq.push(["setTrackerUrl", u+"piwik.php"]);
387 _paq.push(["setSiteId", "13"]);
388 var d=document, g=d.createElement("script"), s=d.getElementsByTagName("script")[0]; g.type="text/javascript";
389 g.defer=true; g.async=true; g.src=u+"piwik.js"; s.parentNode.insertBefore(g,s);
390 })();
391 // @license-end
392</script>
393<!-- End Piwik Code -->
394<!-- Piwik Image Tracker -->
11fb02b0 395<noscript><img src="https://piwik.fsf.org//piwik.php?idsite=13&amp;rec=1" style="border:0" alt="" /></noscript>
e609e128 396<!-- End Piwik -->
7c4f505e
ZR
397</body>
398</html>