Probably final changes for this launch.
[enc-live.git] / en / workshops.html
CommitLineData
2c595172
ZR
1<html><head>
2 <meta http-equiv="content-type" content="text/html; charset=utf-8">
3
4 <title>Email Self-Defense - Teach your friends!</title>
5 <meta name="keywords" content="GnuPG, GPG, openpgp, surveillance, privacy, email, Enigmail">
6 <meta name="description" content="Email surveillance violates our fundamental rights and makes free speech risky. This guide will teach you email self-defense in 30 minutes with GnuPG.">
7
8 <meta name="viewport" content="width=device-width, initial-scale=1">
9 <link rel="stylesheet" href="//static.fsf.org/nosvn/enc-dev0/css/main.css">
10 <link rel="shortcut icon" href="//static.fsf.org/nosvn/enc-dev0/img/favicon.ico">
11
12</head>
13<body>
14
15 <!-- ~~~~~~~~~ GnuPG Header and introduction text ~~~~~~~~~ -->
16
17 <header class="row" id="header">
18 <div>
19 <h1>Email Self-Defense</h1>
20
21 <!-- Languages removed until we have translations-->
22
23 <ul id="menu" class="os">
24 <li class="spacer">
25 <a href="index.html">GNU/Linux</a>
26 </li>
27 <li>
28 <a href="mac.html">Mac OS</a>
29 </li>
30 <li>
31 <a href="windows.html">Windows</a>
32 </li>
33 <li class="spacer"><a href="workshops.html" class="current">Teach your friends</a></li>
34 <li class="spacer">
35 <a href="https://fsf.org/share?u=https://u.fsf.org/zb&amp;t=Email encryption for everyone via %40fsf">
36 Share&nbsp;
37 <img src="//static.fsf.org/nosvn/enc-dev0/img/gnu-social.png" class="share-logo" alt="[GNU Social]">&nbsp;
38 <img src="//static.fsf.org/nosvn/enc-dev0/img/pump.io.png" class="share-logo" alt="[Pump.io]">&nbsp;
39 <img src="//static.fsf.org/nosvn/enc-dev0/img/reddit-alien.png" class="share-logo" alt="[Reddit]">&nbsp;
40 <img src="//static.fsf.org/nosvn/enc-dev0/img/hacker-news.png" class="share-logo" alt="[Hacker News]">
41 </a>
42 </li>
43 <li class="spacer">V4.0</li>
44 </ul>
45 <!-- ~~~~~~~~~ FSF Introduction ~~~~~~~~~ -->
46 <div id="fsf-intro">
47 <h3>
48 <a href="http://u.fsf.org/ys">
49 <img alt="Free Software Foundation" src="//static.fsf.org/nosvn/enc-dev0/img/fsf-logo.png">
50 </a>
51 </h3>
52 <div class="fsf-emphasis">
53 <p>
54 We fight for computer users'
55 rights, and promote the development of free (as in freedom) software.
56 Resisting bulk surveillance is very important to us.
57 </p>
58 <p>
59 <strong>
60 We want to translate this guide
61 into more languages, and make a version for encryption on mobile
62 devices. Please donate, and help people around the world take the first
63 step towards protecting their privacy with free software.
64 </strong>
65 </p>
66 </div>
67
68 <p><a href="https://crm.fsf.org/civicrm/contribute/transact?reset=1&amp;id=14&amp;pk_campaign=email_self_defense&amp;pk_kwd=guide_donate"><img alt="Donate" src="//static.fsf.org/nosvn/enc-dev0/img/en/donate.png"></a> </p>
69
70 </div><!-- End #fsf-intro -->
71
72 <!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
73 <div class="intro">
74 <p>
75 <a id="infographic" href="https://emailselfdefense.fsf.org/en/infographic.html"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" alt="View &amp; share our infographic →"></a>
76 </p><p>Understanding and setting up email encryption sounds like a daunting task to many people. That's why helping your friends with GnuPG plays such an important role in helping spread encryption. Even if only one person shows up, that's still one more person using encryption who wasn't before. You have the power to help your friends keep their digital love letters private, and teach them about the importance of free software. If you use GnuPG to send and receive encrypted email, you're a perfect candidate for leading a workshop!</p>
77
78 </div><!-- End .intro -->
79
80 </div>
81 </header><!-- End #header -->
82
83 <!-- ~~~~~~~~~ Section 1: Get your friends or community interested> ~~~~~~~~~ -->
84 <section style="padding-top: 0px;" class="row" id="section1">
85 <div style="padding-top: 0px;">
86
87 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
88 <div class="section-intro">
89 <p style="margin-top: 0px;" class="image"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/screenshots/workshop-section1.png"></p>
90 <h2><em>#1</em> Get your friends or community interested </h2> <p>If you hear friends grumbling about their lack of privacy, ask them if they're interested in attending a workshop on Email Self-Defense. If your friends don't grumble about privacy, they may need some convincing. You might even hear the classic "if you've got nothing to hide, you've got nothing to fear" argument against using encryption.</p>
d083698e 91 <p>Here are some talking points you can use to help explain why it's worth it to learn GnuPG. Mix and match whichever you think will make sense to your community:</p>
2c595172
ZR
92
93 </div><!-- End .section-intro -->
94
95 <div id="step-aa" class="step">
96
97
98 <div class="sidebar">
99<!-- Workshops image commented out from here, to be used above instead.
100 <p><img id="workshops-image" src="//static.fsf.org/nosvn/enc-dev0/img/en/screenshots/workshop-section1.png" alt="Workshop icon"></p>-->
101 </div><!-- /.sidebar -->
102
103 <div class="main">
104 <h3>Strength in numbers</h3>
d083698e 105 <p>Each person who chooses to resist mass surveillance with encryption makes it easier for others to resist as well. People normalizing the use of strong encryption has multiple powerful effects: it means those who need privacy the most, like potential whistle-blowers and activists, are more likely to learn about encryption. More people using encryption for more things also makes it harder for surveillance systems to single out those that can't afford to be found, and shows solidarity with those people.</p>
2c595172
ZR
106 </div><!-- End .main -->
107
108 <div class="main">
109 <h3>People you respect may already be using encryption</h3>
116f80c3 110 <p>Many journalists, whistleblowers, activists, and researchers use GnuPG, so your friends might unknowingly have heard of a few people who use it already. You can search for "BEGIN PUBLIC KEY BLOCK" + keyword to help make a list of people and organizations who use GnuPG whom your community will likely recognize.</p>
2c595172
ZR
111 </div><!-- End .main -->
112
113 <div class="main">
114 <h3>Respect your friends' privacy</h3>
116f80c3 115 <p>There's no objective way to judge what constitutes privacy-sensitive correspondence. As such, it's better not to presume that just because you find an email you sent to a friend innocuous, your friend (or a surveillance agent, for that matter!) feels the same way. Show your friends respect by encrypting your correspondence with them.</p>
2c595172
ZR
116 </div><!-- End .main -->
117
118
119 <div class="main">
120 <h3>Privacy technology is normal in the physical world</h3>
121 <p>In the physical realm, we take window blinds, envelopes, and closed doors for granted as ways of protecting our privacy. Why should the digital realm be any different?</p>
122 </div><!-- End .main -->
123
d083698e
ZR
124 <div class="main">
125 <h3>We shouldn't have to trust our email providers with our privacy</h3>
126 <p>Some email providers are very trustworthy, but many have incentives not to protect your privacy and security. To be empowered digital citizens, we need to build our own security from the bottom up.</p>
127 </div><!-- End .main -->
128
2c595172
ZR
129
130 </div><!-- End #step-2a .step -->
131
132 </div>
133 </section><!-- End #section1 -->
134
135 <!-- ~~~~~~~~~ Section 2: Plan The Workshop ~~~~~~~~~ -->
136 <section class="row" id="section2">
137 <div>
138 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
139 <div class="section-intro" style="border: none; padding-bottom: 0px; margin-bottom: 0px;">
140 <h2><em>#2</em> Plan The Workshop</h2>
116f80c3
ZR
141 <p>Once you've got at least one interested friend, pick a date and start planning out the workshop. Tell participants to bring their computer and ID (for signing each other's keys). If you'd like to make it easy for the participants to use Diceware for choosing passwords, get a pack of dice beforehand. Make sure the location you select has an easily accessible Internet connection, and make backup plans in case the connection stops working on the day of the workshop. Libraries, coffee shops, and community centers make great locations. Try to get all the participants to set up an Enigmail-compatible email client before the event. Direct them to their email provider's IT department or help page if they run into errors.</p><p>
142 </p><p>Estimate that the workshop will take at least forty minutes plus ten minutes for each participant. Plan extra time for questions and technical glitches.</p>
d083698e 143 <p>The success of the workshop requires understanding and catering to the unique backgrounds and needs of each group of participants. Workshops should stay small, so that each participant receives more individualized instruction. If more than a handful of people want to participate, keep the facilitator to participant ratio high by recruiting more facilitators, or by facilitating multiple workshops. Small workshops among friends work great!</p>
2c595172
ZR
144
145
146 </div><!-- End .section-intro -->
147
148 </div>
149 </section><!-- End #section2 -->
150
151 <!-- ~~~~~~~~~ Section 3: Follow The Guide ~~~~~~~~~ -->
152 <section class="row" id="section3">
153 <div>
154 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
155 <div class="section-intro" style="border: none; padding-bottom: 0px; margin-bottom: 0px;">
156 <h2><em>#3</em> Follow the guide as a group</h2>
116f80c3
ZR
157 <p>Work through the Email Self-Defense guide a step at a time as a group. Talk about the steps in detail, but make sure not to overload the participants with minutia. Pitch the bulk of your instructions to the least tech-savvy participants. Make sure all the participants complete each step before the group moves on to the next one. Consider facilitating secondary workshops afterwards for people that had trouble grasping the concepts, or those that grasped them quickly and want to learn more.</p>
158 <p>In <a href="index.html#section2">Section 2</a> of the guide, make sure the participants upload their keys to the same keyserver so that they can immediately download each other's keys later (sometimes there is a delay in synchronization between keyservers). During <a href="index.html#section3">Section 3</a>, give the participants the option to send test messages to each other instead of or as well as Edward. Similarly, in <a href="index.html#section4">Section 4</a>, encourage the participants to sign each other's keys. At the end, make sure to remind people to safely back up their revocation certificates.</p>
2c595172
ZR
159
160 </div><!-- End .section-intro -->
161 </div>
162 </section>
163
164
165 <!-- ~~~~~~~~~ Section 4: Explain the pitfalls ~~~~~~~~~ -->
166 <section class="row" id="section4">
167 <div>
168 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
169 <div class="section-intro" style="border: none; padding-bottom: 0px; margin-bottom: 0px;">
170 <h2><em>#4</em> Explain the pitfalls</h2>
d083698e
ZR
171 <p>Remind participants that encryption works only when it's explicitly used; they won't be able to send an encrypted email to someone who hasn't already set up encryption. Also remind participants to double-check the encryption icon before hitting send, and that subjects and timestamps are never encrypted.</p>
172 <p> Explain the <a href="https://www.gnu.org/proprietary/proprietary.html">dangers of running a proprietary system</a> and advocate for free software, because without it, we can't <a href="https://www.fsf.org/bulletin/2013/fall/how-can-free-software-protect-us-from-surveillance">meaningfully resist invasions of our digital privacy and autonomy</a>.</p>
2c595172
ZR
173
174
175
176 </div><!-- End .section-intro -->
177
178 </div>
179 </section><!-- End #section4 -->
180
181 <!-- ~~~~~~~~~ Section 5: Explain The Pitfalls ~~~~~~~~~ -->
182 <section id="section5" class="row">
183 <div>
184 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
185 <div class="section-intro" style="border: none; padding-bottom: 0px; margin-bottom: 0px;">
186 <h2><em>#5</em> Share additional resources</h2>
187 <p>GnuPG's advanced options are far too complex to teach in a single workshop. If participants want to know more, point out the advanced subsections in the guide and consider organizing another workshop. You can also share <a href="https://www.gnupg.org/documentation/index.html">GnuPG's</a> and <a href="https://www.enigmail.net/documentation/index.php">Enigmail's</a> official documentation and mailing lists. Many GNU/Linux distribution's Web sites also contain a page explaining some of GnuPG's advanced features.</p>
188
189 </div><!-- End .section-intro -->
190
191
192 </div>
193 </section><!-- End #section5 -->
194
195
196
197 <!-- ~~~~~~~~~ Section 6: Next steps ~~~~~~~~~ -->
198 <section class="row" id="section6">
199 <div>
200 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
201 <div class="section-intro" style="border: none; padding-bottom: 0px; margin-bottom: 0px;">
202 <h2><em>#6</em> Follow up</h2>
116f80c3 203 <p>Make sure everyone has shared email addresses and public key fingerprints before they leave. Encourage the participants to continue to gain GnuPG experience by emailing each other. Send them each an encrypted email one week after the event, reminding them to try adding their public key ID in places where they publicly list their email address.</p>
2c595172
ZR
204 <p>If you have any suggestions for improving this workshop guide, please let us know at <a href="mailto:campaigns@fsf.org">campaigns@fsf.org</a>.</p>
205
206 </div><!-- End .section-intro -->
207
208
209 </div>
210 </section><!-- End #section6 -->
211
212 <!-- ~~~~~~~~~ FAQ ~~~~~~~~~ -->
213 <!-- When un-commenting this section go to main.css and search
214 for /* Guide Sections Background */ then add #faq to the desired color
215
216 <section class="row" id="faq">
217 <div>
218 <div class="sidebar">
219 <h2>FAQ</h2>
220</div>
221
222<div class="main">
223<dl>
224<dt>My key expired</dt>
225<dd>Answer coming soon.</dd>
226
227<dt>Who can read encrypted messages? Who can read signed ones?</dt>
228<dd>Answer coming soon.</dd>
229
230<dt>My email program is opening at times I don't want it to open/is now my default program and I don't want it to be.</dt>
231<dd>Answer coming soon.</dd>
232</dl>
233</div>
234</div>
235</section> --><!-- End #faq -->
236
237<!-- ~~~~~~~~~ Footer ~~~~~~~~~ -->
2b82530f
ZR
238 <footer class="row" id="footer">
239 <div>
240 <div id="copyright">
241 <h4><a href="https://u.fsf.org/ys"><img alt="Free Software Foundation" src="//static.fsf.org/nosvn/enc-dev0/img/fsf-logo.png" /></a></h4>
242 <p>Copyright &copy; 2014-2016 <a href="https://u.fsf.org/ys">Free Software Foundation</a>, Inc. <a href="https://my.fsf.org/donate/privacypolicy.html">Privacy Policy</a>. Please support our work by <a href="https://u.fsf.org/yr">joining us as an associate member.</a></p>
243
244<p>The images on this page are under a <a href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 license (or later version)</a>, and the rest of it is under a <a href="https://creativecommons.org/licenses/by-sa/4.0">Creative Commons Attribution-ShareAlike 4.0 license (or later version)</a>. Download the <a href="http://agpl.fsf.org/emailselfdefense.fsf.org/edward/CURRENT/edward.tar.gz">source code of Edward reply bot</a> by Andrew Engelbrecht &lt;sudoman@ninthfloor.org&gt; and Josh Drake &lt;zamnedix@gnu.org&gt;, available under the GNU Affero General Public License. <a href="http://www.gnu.org/licenses/license-list.html#OtherLicenses">Why these licenses?</a></p>
245
246<p>Fonts used in the guide &amp; infographic: <a href="https://www.google.com/fonts/specimen/Dosis">Dosis</a> by Pablo Impallari, <a href="http://www.google.com/fonts/specimen/Signika">Signika</a> by Anna Giedry&#347;, <a href="http://www.google.com/fonts/specimen/Archivo+Narrow">Archivo Narrow</a> by Omnibus-Type, <a href="https://libreplanet.org/wiki/GPG_guide/Graphics_Howto#Pitfalls">PXL-2000</a> by Florian Cramer.</p>
247
248<p>Download the <a href="emailselfdefense_source.zip">source package</a> for this guide, including fonts, image source files and the text of Edward's messages.</p>
2c595172 249
2b82530f
ZR
250<p>This site uses the Weblabels standard for labeling <a href="https://www.fsf.org/campaigns/freejs">free JavaScript</a>. View the JavaScript <a href="//weblabels.fsf.org/emailselfdefense.fsf.org/" rel="jslicense">source code and license information</a>.</p>
251 </div><!-- /#copyright -->
252 <p class="credits">
253 Infographic and guide design by <a rel="external" href="http://jplusplus.org"><strong>Journalism++</strong> <img src="//static.fsf.org/nosvn/enc-dev0/img/jplusplus.png" alt="Journalism++" /></a>
254 </p><!-- /.credits -->
255 </div>
256 </footer><!-- End #footer -->
2c595172
ZR
257<script src="http://piwik.fsf.org/piwik.js" async="" defer="" type="text/javascript"></script><script src="//static.fsf.org/nosvn/enc-dev0/js/jquery-1.11.0.min.js"></script>
258<!-- <script src="//static.fsf.org/nosvn/enc-dev0/js/scripts.js"></script> -->
259
260<!-- Piwik -->
261<script type="text/javascript">
262 /*
263 @licstart The following is the entire license notice for the
264 JavaScript code in this page.
265
266 Copyright 2014 Matthieu Aubry
267
268 This program is free software: you can redistribute it and/or modify
269 it under the terms of the GNU General Public License as published by
270 the Free Software Foundation, either version 3 of the License, or
271 (at your option) any later version.
272
273 This program is distributed in the hope that it will be useful,
274 but WITHOUT ANY WARRANTY; without even the implied warranty of
275 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
276 GNU General Public License for more details.
277
278 You should have received a copy of the GNU General Public License
279 along with this program. If not, see http://www.gnu.org/licenses/.
280
281 @licend The above is the entire license notice
282 for the JavaScript code in this page.
283 */
284 var _paq = _paq || [];
285 _paq.push(["setDocumentTitle", document.domain + "/" + document.title]);
286 _paq.push(["setCookieDomain", "*.www.fsf.org"]);
287 _paq.push(["setDomains", ["*.www.fsf.org","*.www.fsf.org"]]);
288 _paq.push(["trackPageView"]);
289 _paq.push(["enableLinkTracking"]);
290
291 (function() {
292 var u=(("https:" == document.location.protocol) ? "https" : "http") + "://piwik.fsf.org/";
293 _paq.push(["setTrackerUrl", u+"piwik.php"]);
294 _paq.push(["setSiteId", "5"]);
295 var d=document, g=d.createElement("script"), s=d.getElementsByTagName("script")[0]; g.type="text/javascript";
296 g.defer=true; g.async=true; g.src=u+"piwik.js"; s.parentNode.insertBefore(g,s);
297 })();
298</script>
299<!-- End Piwik Code -->
300
301
302</body></html>