fix errors urls images
[enc-live.git] / en / workshops.html
CommitLineData
19bce4d7
TG
1<!DOCTYPE html>
2<html lang="en">
3<head>
4<meta http-equiv="content-type" content="text/html; charset=utf-8" />
d06ce723
TG
5<title>Email Self-Defense - a guide to fighting surveillance with GnuPG
6encryption</title>
19bce4d7
TG
7<meta name="keywords" content="GnuPG, GPG, openpgp, surveillance, privacy,
8email, Enigmail" />
9<meta name="description" content="Email surveillance violates our fundamental
10rights and makes free speech risky. This guide will teach you email
11self-defense in 40 minutes with GnuPG." />
12<meta name="viewport" content="width=device-width, initial-scale=1" />
812ccf00 13<link rel="stylesheet" href="/static/css/main.css" />
19bce4d7 14<link rel="shortcut icon"
812ccf00 15href="/static/img/favicon.ico" />
2c595172 16</head>
19bce4d7 17
abf30801 18<body><iframe src="https://static.fsf.org/nosvn/banners/2021fundraiser-spring/" style="width: 100%; height: 150px; display: block; margin: 0; border: 0 none; overflow: hidden;"></iframe><div style="text-align: center; padding: 2.5px; background-color: #a94442; color:#fcf8e3;"><p>Due to Enigmail's PGP functionality being migrated into Icedove and Thunderbird, steps 2 and 3 of the guide are currently out of date.</p><p> Thank you for your patience while we're working on a new round of updates.</p></div>
2c595172 19
19bce4d7
TG
20<!-- ~~~~~~~~~ GnuPG Header and introduction text ~~~~~~~~~ -->
21<header class="row" id="header"><div>
2c595172 22
19bce4d7 23<h1>Email Self-Defense</h1>
2c595172 24
19bce4d7
TG
25<!-- Language list for browsers that do not have JS enabled -->
26<ul id="languages" class="os">
810614f7 27<!--<li><a class="current" href="/en">English - v4.0</a></li>
c1fa777e 28<li><a href="/cs">čeština - v4.0</a></li>
f7d7ddc2 29<li><a href="/de">Deutsch - v4.0</a></li>
7c4f505e
ZR
30<li><a href="/el">ελληνικά - v3.0</a></li>
31<li><a href="/es">español - v4.0</a></li>
32<li><a href="/fa">فارسی - v4.0</a></li>
33<li><a href="/fr">français - v4.0</a></li>
34<li><a href="/it">italiano - v3.0</a></li>
35<li><a href="/ja">日本語 - v4.0</a></li>
7c4f505e
ZR
36<li><a href="/pt-br">português do Brasil - v3.0</a></li>
37<li><a href="/ro">română - v3.0</a></li>
38<li><a href="/ru">русский - v4.0</a></li>
19bce4d7 39<li><a href="/sq">Shqip - v4.0</a></li>
7c4f505e
ZR
40<li><a href="/sv">svenska - v4.0</a></li>
41<li><a href="/tr">Türkçe - v4.0</a></li>
810614f7 42<li><a href="/zh-hans">简体中文 - v4.0</a></li>-->
ce9d37a4
TG
43<li><a href="https://libreplanet.org/wiki/GPG_guide/Translation_Guide">
44<strong><span style="color: #2F5FAA;">Translate!</span></strong></a></li>
19bce4d7
TG
45</ul>
46
47<ul id="menu" class="os">
48<li class="spacer"><a href="index.html">GNU/Linux</a></li>
49<li><a href="mac.html">Mac OS</a></li>
50<li><a href="windows.html">Windows</a></li>
51<li><a href="workshops.html" class="current">Teach your friends</a></li>
52<li><a href="https://fsf.org/share?u=https://u.fsf.org/zb&amp;t=Email
53encryption for everyone via %40fsf">Share&nbsp;
54<img
812ccf00 55src="/static/img/gnu-social.png" class="share-logo"
19bce4d7
TG
56alt="[GNU Social]" />&nbsp;
57<img
812ccf00 58src="/static/img/mastodon.png" class="share-logo"
d06ce723 59alt="[Mastodon]" />&nbsp;
19bce4d7 60<img
812ccf00 61src="/static/img/reddit-alien.png" class="share-logo"
19bce4d7
TG
62alt="[Reddit]" />&nbsp;
63<img
812ccf00 64src="/static/img/hacker-news.png" class="share-logo"
19bce4d7
TG
65alt="[Hacker News]" />
66</a></li>
67</ul>
68
69<!-- ~~~~~~~~~ FSF Introduction ~~~~~~~~~ -->
70<div id="fsf-intro">
71
6003a573 72<h3><a href="https://u.fsf.org/ys"><img
19bce4d7 73alt="Free Software Foundation"
812ccf00 74src="/static/img/fsf-logo.png" />
19bce4d7
TG
75</a></h3>
76
77<div class="fsf-emphasis">
78
79<p>We want to translate this guide
80into more languages, and make a version for encryption on mobile
81devices. Please donate, and help people around the world take the first
82step towards protecting their privacy with free software.</p>
2c595172 83
19bce4d7 84</div>
2c595172 85
19bce4d7
TG
86<p><a
87href="https://crm.fsf.org/civicrm/contribute/transact?reset=1&amp;id=14&amp;pk_campaign=email_self_defense&amp;pk_kwd=guide_donate"><img
88alt="Donate"
812ccf00 89src="/static/img/en/donate.png" /></a></p>
19bce4d7
TG
90
91</div><!-- End #fsf-intro -->
92
93<!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
94<div class="intro">
95
96<p><a id="infographic"
97href="https://emailselfdefense.fsf.org/en/infographic.html"><img
812ccf00 98src="/static/img/en/infographic-button.png"
19bce4d7
TG
99alt="View &amp; share our infographic →" /></a>
100Understanding and setting up email encryption sounds like a daunting task
101to many people. That's why helping your friends with GnuPG plays such an
102important role in helping spread encryption. Even if only one person shows
103up, that's still one more person using encryption who wasn't before. You have
104the power to help your friends keep their digital love letters private, and
105teach them about the importance of free software. If you use GnuPG to send and
106receive encrypted email, you're a perfect candidate for leading a workshop!</p>
107
108</div><!-- End .intro -->
109</div></header><!-- End #header -->
110
111<!-- ~~~~~~~~~ Section 1: Get your friends or community interested ~~~~~~~~~
112-->
113<section style="padding-top: 0px;" class="row" id="section1">
114<div style="padding-top: 0px;">
115
116<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
117<div class="section-intro">
19bce4d7 118<p style="margin-top: 0px;" class="image"><img
812ccf00 119src="/static/img/en/screenshots/workshop-section1-update.png"
19bce4d7 120alt="A small workshop among friends" /></p>
19bce4d7
TG
121<h2><em>#1</em> Get your friends or community interested </h2>
122
123<p>If you hear friends grumbling about their lack of privacy, ask them if
124they're interested in attending a workshop on Email Self-Defense. If your
125friends don't grumble about privacy, they may need some convincing. You might
126even hear the classic "if you've got nothing to hide, you've got nothing to
127fear" argument against using encryption.</p>
128
129<p>Here are some talking points you can use to help explain why it's worth
130it to learn GnuPG. Mix and match whichever you think will make sense to
131your community:</p>
132
133</div><!-- End .section-intro -->
134<div id="step-aa" class="step">
135<div class="sidebar">
136<!-- Workshops image commented out from here, to be used above instead.
2c595172 137
19bce4d7 138<p><img id="workshops-image"
812ccf00 139src="/static/img/en/screenshots/workshop-section1.png"
19bce4d7
TG
140alt="Workshop icon"></p>-->
141</div><!-- /.sidebar -->
142<div class="main">
2c595172 143
19bce4d7 144<h3>Strength in numbers</h3>
2c595172 145
19bce4d7
TG
146<p>Each person who chooses to resist mass surveillance with encryption makes
147it easier for others to resist as well. People normalizing the use of strong
148encryption has multiple powerful effects: it means those who need privacy
149the most, like potential whistle-blowers and activists, are more likely to
150learn about encryption. More people using encryption for more things also
151makes it harder for surveillance systems to single out those that can't
152afford to be found, and shows solidarity with those people.</p>
153
154</div><!-- End .main -->
155<div class="main">
2c595172 156
19bce4d7 157<h3>People you respect may already be using encryption</h3>
d083698e 158
19bce4d7
TG
159<p>Many journalists, whistleblowers, activists, and researchers use GnuPG,
160so your friends might unknowingly have heard of a few people who use it
161already. You can search for "BEGIN PUBLIC KEY BLOCK" + keyword to help make
162a list of people and organizations who use GnuPG whom your community will
163likely recognize.</p>
2c595172 164
19bce4d7
TG
165</div><!-- End .main -->
166<div class="main">
2c595172 167
19bce4d7 168<h3>Respect your friends' privacy</h3>
2c595172 169
19bce4d7
TG
170<p>There's no objective way to judge what constitutes privacy-sensitive
171correspondence. As such, it's better not to presume that just because you
172find an email you sent to a friend innocuous, your friend (or a surveillance
173agent, for that matter!) feels the same way. Show your friends respect by
174encrypting your correspondence with them.</p>
2c595172 175
19bce4d7
TG
176</div><!-- End .main -->
177<div class="main">
2c595172 178
19bce4d7 179<h3>Privacy technology is normal in the physical world</h3>
2c595172 180
19bce4d7
TG
181<p>In the physical realm, we take window blinds, envelopes, and closed doors
182for granted as ways of protecting our privacy. Why should the digital realm
183be any different?</p>
2c595172 184
19bce4d7
TG
185</div><!-- End .main -->
186<div class="main">
2c595172 187
19bce4d7
TG
188<h3>We shouldn't have to trust our email providers with our privacy</h3>
189
190<p>Some email providers are very trustworthy, but many have incentives not
191to protect your privacy and security. To be empowered digital citizens,
192we need to build our own security from the bottom up.</p>
2c595172 193
19bce4d7
TG
194</div><!-- End .main -->
195</div><!-- End #step-aa .step -->
196</div></section><!-- End #section1 -->
197
198<!-- ~~~~~~~~~ Section 2: Plan The Workshop ~~~~~~~~~ -->
199<section class="row" id="section2"><div>
200
201<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
202<div class="section-intro" style="border: none; padding-bottom: 0px;
203margin-bottom: 0px;">
204
205<h2><em>#2</em> Plan The Workshop</h2>
206
207<p>Once you've got at least one interested friend, pick a date and start
208planning out the workshop. Tell participants to bring their computer and
209ID (for signing each other's keys). If you'd like to make it easy for the
2e2151c8 210participants to use <a href="https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/">Diceware</a> for choosing passwords, get a pack of dice
19bce4d7
TG
211beforehand. Make sure the location you select has an easily accessible
212Internet connection, and make backup plans in case the connection stops
213working on the day of the workshop. Libraries, coffee shops, and community
214centers make great locations. Try to get all the participants to set up
2e2151c8 215an email client based on Thunderbird before the event. Direct them to their
19bce4d7
TG
216email provider's IT department or help page if they run into errors.</p>
217
218<p>Estimate that the workshop will take at least forty minutes plus ten minutes
219for each participant. Plan extra time for questions and technical glitches.</p>
220
221<p>The success of the workshop requires understanding and catering to
222the unique backgrounds and needs of each group of participants. Workshops
223should stay small, so that each participant receives more individualized
224instruction. If more than a handful of people want to participate, keep the
225facilitator to participant ratio high by recruiting more facilitators, or by
226facilitating multiple workshops. Small workshops among friends work great!</p>
227
228</div><!-- End .section-intro -->
229</div></section><!-- End #section2 -->
230
231<!-- ~~~~~~~~~ Section 3: Follow The Guide ~~~~~~~~~ -->
232<section class="row" id="section3"><div>
2c595172 233
19bce4d7
TG
234<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
235<div class="section-intro" style="border: none; padding-bottom: 0px;
236margin-bottom: 0px;">
2c595172 237
19bce4d7 238<h2><em>#3</em> Follow the guide as a group</h2>
2c595172 239
19bce4d7
TG
240<p>Work through the Email Self-Defense guide a step at a time as a group. Talk
241about the steps in detail, but make sure not to overload the participants
242with minutia. Pitch the bulk of your instructions to the least tech-savvy
243participants. Make sure all the participants complete each step before the
244group moves on to the next one. Consider facilitating secondary workshops
245afterwards for people that had trouble grasping the concepts, or those that
246grasped them quickly and want to learn more.</p>
2c595172 247
19bce4d7
TG
248<p>In <a href="index.html#section2">Section 2</a> of the guide, make
249sure the participants upload their keys to the same keyserver so that
250they can immediately download each other's keys later (sometimes
251there is a delay in synchronization between keyservers). During <a
252href="index.html#section3">Section 3</a>, give the participants the option to
253send test messages to each other instead of or as well as Edward. Similarly,
254in <a href="index.html#section4">Section 4</a>, encourage the participants
255to sign each other's keys. At the end, make sure to remind people to safely
256back up their revocation certificates.</p>
2c595172 257
19bce4d7
TG
258</div><!-- End .section-intro -->
259</div></section>
2c595172 260
19bce4d7
TG
261<!-- ~~~~~~~~~ Section 4: Explain the pitfalls ~~~~~~~~~ -->
262<section class="row" id="section4"><div>
2c595172 263
19bce4d7
TG
264<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
265<div class="section-intro" style="border: none; padding-bottom: 0px;
266margin-bottom: 0px;">
2c595172 267
19bce4d7 268<h2><em>#4</em> Explain the pitfalls</h2>
2c595172 269
19bce4d7
TG
270<p>Remind participants that encryption works only when it's explicitly used;
271they won't be able to send an encrypted email to someone who hasn't already
272set up encryption. Also remind participants to double-check the encryption icon
273before hitting send, and that subjects and timestamps are never encrypted.</p>
2c595172 274
19bce4d7
TG
275<p> Explain the <a
276href="https://www.gnu.org/proprietary/proprietary.html">dangers
277of running a proprietary system</a> and
278advocate for free software, because without it, we can't <a
279href="https://www.fsf.org/bulletin/2013/fall/how-can-free-software-protect-us-from-surveillance">meaningfully
280resist invasions of our digital privacy and autonomy</a>.</p>
2c595172 281
19bce4d7
TG
282</div><!-- End .section-intro -->
283</div></section><!-- End #section4 -->
2c595172 284
19bce4d7
TG
285<!-- ~~~~~~~~~ Section 5: Explain The Pitfalls ~~~~~~~~~ -->
286<section id="section5" class="row"><div>
2c595172 287
19bce4d7
TG
288<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
289<div class="section-intro" style="border: none; padding-bottom: 0px;
290margin-bottom: 0px;">
291
292<h2><em>#5</em> Share additional resources</h2>
293
294<p>GnuPG's advanced options are far too complex to teach in a single
295workshop. If participants want to know more, point out the advanced subsections
296in the guide and consider organizing another workshop. You can also share
2e2151c8 297<a href="https://www.gnupg.org/documentation/index.html">GnuPG's</a>
298official documentation and mailing lists, and the <a href="https://libreplanet.org/wiki/GPG_guide/Public_Review">Email Self-Defense feedback</a> page. Many GNU/Linux distribution's Web
19bce4d7
TG
299sites also contain a page explaining some of GnuPG's advanced features.</p>
300
301</div><!-- End .section-intro -->
302</div></section><!-- End #section5 -->
303
304<!-- ~~~~~~~~~ Section 6: Next steps ~~~~~~~~~ -->
305<section class="row" id="section6"><div>
306
307<!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
308<div class="section-intro" style="border: none; padding-bottom: 0px;
309margin-bottom: 0px;">
310
311<h2><em>#6</em> Follow up</h2>
312
313<p>Make sure everyone has shared email addresses and public key fingerprints
314before they leave. Encourage the participants to continue to gain GnuPG
315experience by emailing each other. Send them each an encrypted email one
316week after the event, reminding them to try adding their public key ID to
317places where they publicly list their email address.</p>
2c595172 318
19bce4d7
TG
319<p>If you have any suggestions for improving this workshop guide, please
320let us know at <a href="mailto:campaigns@fsf.org">campaigns@fsf.org</a>.</p>
321
322</div><!-- End .section-intro -->
323</div></section><!-- End #section6 -->
19bce4d7
TG
324<!-- ~~~~~~~~~ Footer ~~~~~~~~~ -->
325<footer class="row" id="footer"><div>
326<div id="copyright">
327
328<h4><a href="https://u.fsf.org/ys"><img
329alt="Free Software Foundation"
812ccf00 330src="/static/img/fsf-logo.png" /></a></h4>
19bce4d7 331
2e2151c8 332<p>Copyright &copy; 2014-2021 <a
19bce4d7
TG
333href="https://u.fsf.org/ys">Free Software Foundation</a>, Inc. <a
334href="https://my.fsf.org/donate/privacypolicy.html">Privacy Policy</a>. Please
335support our work by <a href="https://u.fsf.org/yr">joining us as an associate
336member.</a></p>
337
338<p>The images on this page are under a <a
339href="https://creativecommons.org/licenses/by/4.0/">Creative Commons
340Attribution 4.0 license (or later version)</a>, and the rest of it is under
341a <a href="https://creativecommons.org/licenses/by-sa/4.0">Creative Commons
342Attribution-ShareAlike 4.0 license (or later version)</a>. Download the <a
6003a573 343href="https://agpl.fsf.org/emailselfdefense.fsf.org/edward/CURRENT/edward.tar.gz">
5dd8f91f 344source code of Edward reply bot</a> by Andrew Engelbrecht
a3a9a0ac 345&lt;andrew@engelbrecht.io&gt; and Josh Drake &lt;zamnedix@gnu.org&gt;,
19bce4d7 346available under the GNU Affero General Public License. <a
6003a573 347href="https://www.gnu.org/licenses/license-list.html#OtherLicenses">Why these
19bce4d7
TG
348licenses?</a></p>
349
350<p>Fonts used in the guide &amp; infographic: <a
351href="https://www.google.com/fonts/specimen/Dosis">Dosis</a> by Pablo
6003a573 352Impallari, <a href="https://www.google.com/fonts/specimen/Signika">Signika</a>
19bce4d7 353by Anna Giedry&#347;, <a
6003a573 354href="https://www.google.com/fonts/specimen/Archivo+Narrow">Archivo
19bce4d7
TG
355Narrow</a> by Omnibus-Type, <a
356href="https://libreplanet.org/wiki/GPG_guide/Graphics_Howto#Pitfalls">PXL-2000</a>
357by Florian Cramer.</p>
358
359<p>Download the <a href="emailselfdefense_source.zip">source package</a>
360for this guide, including fonts, image source files and the text of Edward's
361messages.</p>
362
363<p>This site uses the Weblabels standard for labeling <a
364href="https://www.fsf.org/campaigns/freejs">free JavaScript</a>. View
abf30801 365the JavaScript <a href="https://weblabels.fsf.org/emailselfdefense.fsf.org/"
19bce4d7
TG
366rel="jslicense">source code and license information</a>.</p>
367
368</div><!-- /#copyright -->
369
370<p class="credits">Infographic and guide design by <a rel="external"
6003a573 371href="https://jplusplus.org"><strong>Journalism++</strong><img
812ccf00 372src="/static/img/jplusplus.png"
19bce4d7
TG
373alt="Journalism++" /></a></p><!-- /.credits -->
374</div></footer><!-- End #footer -->
7c4f505e 375
5dd8f91f 376<script type="text/javascript"
812ccf00 377src="/static/js/jquery-1.11.0.min.js"></script>
5dd8f91f 378<script type="text/javascript"
2c595172 379<!-- Piwik -->
e609e128
AE
380<script type="text/javascript">
381 // @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&dn=gpl-2.0.txt GPL-2.0-or-later
382 var _paq = _paq || [];
383 _paq.push(["trackPageView"]);
384 _paq.push(["enableLinkTracking"]);
385
386 (function() {
387 var u = (("https:" == document.location.protocol) ? "https" : "http") + "://"+"piwik.fsf.org//";
388 _paq.push(["setTrackerUrl", u+"piwik.php"]);
389 _paq.push(["setSiteId", "13"]);
390 var d=document, g=d.createElement("script"), s=d.getElementsByTagName("script")[0]; g.type="text/javascript";
391 g.defer=true; g.async=true; g.src=u+"piwik.js"; s.parentNode.insertBefore(g,s);
392 })();
393 // @license-end
394</script>
395<!-- End Piwik Code -->
396<!-- Piwik Image Tracker -->
397<noscript><img src="https://piwik.fsf.org//piwik.php?idsite=13&rec=1" style="border:0" alt="" /></noscript>
398<!-- End Piwik -->
7c4f505e
ZR
399</body>
400</html>