Commit | Line | Data |
---|---|---|
5ec82b3f A |
1 | <!-- include virtual="head.html" --> |
2 | ||
3 | <!-- ~~~~~~~~~ GnuPG Header and introduction text ~~~~~~~~~ --> | |
4 | <header class="row" id="header"><div> | |
5 | ||
6 | <h1>Email Self-Defense</h1> | |
7 | ||
8 | <!-- include virtual="translist.html" --> | |
9 | ||
10 | <ul id="menu" class="os"> | |
11 | <li class="spacer"><a href="index.html">GNU/Linux</a></li> | |
12 | <li><a href="mac.html">Mac OS</a></li> | |
13 | <li><a href="windows.html">Windows</a></li> | |
14 | <li><a href="workshops.html" class="current">Teach your friends</a></li> | |
15 | <li><a href="https://fsf.org/share?u=https://u.fsf.org/zb&t=Email | |
16 | encryption for everyone via %40fsf">Share | |
17 | <img | |
18 | src="//static.fsf.org/nosvn/enc-dev0/img/gnu-social.png" class="share-logo" | |
19 | alt="[GNU Social]" /> | |
20 | <img | |
21 | src="//static.fsf.org/nosvn/enc-dev0/img/mastodon.png" class="share-logo" | |
22 | alt="[Mastodon]" /> | |
23 | <img | |
24 | src="//static.fsf.org/nosvn/enc-dev0/img/reddit-alien.png" class="share-logo" | |
25 | alt="[Reddit]" /> | |
26 | <img | |
27 | src="//static.fsf.org/nosvn/enc-dev0/img/hacker-news.png" class="share-logo" | |
28 | alt="[Hacker News]" /> | |
29 | </a></li> | |
30 | </ul> | |
31 | ||
32 | <!-- ~~~~~~~~~ FSF Introduction ~~~~~~~~~ --> | |
33 | <div id="fsf-intro"> | |
34 | ||
35 | <h3><a href="http://u.fsf.org/ys"><img | |
36 | alt="Free Software Foundation" | |
37 | src="//static.fsf.org/nosvn/enc-dev0/img/fsf-logo.png" /> | |
38 | </a></h3> | |
39 | ||
40 | <div class="fsf-emphasis"> | |
41 | ||
42 | <p>We want to translate this guide | |
43 | into more languages, and make a version for encryption on mobile | |
44 | devices. Please donate, and help people around the world take the first | |
45 | step towards protecting their privacy with free software.</p> | |
46 | ||
47 | </div> | |
48 | ||
49 | <p><a | |
50 | href="https://crm.fsf.org/civicrm/contribute/transact?reset=1&id=14&pk_campaign=email_self_defense&pk_kwd=guide_donate"><img | |
51 | alt="Donate" | |
52 | src="//static.fsf.org/nosvn/enc-dev0/img/en/donate.png" /></a></p> | |
53 | ||
54 | </div><!-- End #fsf-intro --> | |
55 | ||
56 | <!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ --> | |
57 | <div class="intro"> | |
58 | ||
59 | <p><a id="infographic" | |
60 | href="https://emailselfdefense.fsf.org/en/infographic.html"><img | |
61 | src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" | |
62 | alt="View & share our infographic →" /></a> | |
63 | Understanding and setting up email encryption sounds like a daunting task | |
64 | to many people. That's why helping your friends with GnuPG plays such an | |
65 | important role in helping spread encryption. Even if only one person shows | |
66 | up, that's still one more person using encryption who wasn't before. You have | |
67 | the power to help your friends keep their digital love letters private, and | |
68 | teach them about the importance of free software. If you use GnuPG to send and | |
69 | receive encrypted email, you're a perfect candidate for leading a workshop!</p> | |
70 | ||
71 | </div><!-- End .intro --> | |
72 | </div></header><!-- End #header --> | |
73 | ||
74 | <!-- ~~~~~~~~~ Section 1: Get your friends or community interested ~~~~~~~~~ | |
75 | --> | |
76 | <section style="padding-top: 0px;" class="row" id="section1"> | |
77 | <div style="padding-top: 0px;"> | |
78 | ||
79 | <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ --> | |
80 | <div class="section-intro"> | |
81 | ||
82 | <p style="margin-top: 0px;" class="image"><img | |
83 | src="//static.fsf.org/nosvn/enc-dev0/img/en/screenshots/workshop-section1.png" | |
84 | alt="A small workshop among friends" /></p> | |
85 | ||
86 | <h2><em>#1</em> Get your friends or community interested </h2> | |
87 | ||
88 | <p>If you hear friends grumbling about their lack of privacy, ask them if | |
89 | they're interested in attending a workshop on Email Self-Defense. If your | |
90 | friends don't grumble about privacy, they may need some convincing. You might | |
91 | even hear the classic "if you've got nothing to hide, you've got nothing to | |
92 | fear" argument against using encryption.</p> | |
93 | ||
94 | <p>Here are some talking points you can use to help explain why it's worth | |
95 | it to learn GnuPG. Mix and match whichever you think will make sense to | |
96 | your community:</p> | |
97 | ||
98 | </div><!-- End .section-intro --> | |
99 | <div id="step-aa" class="step"> | |
100 | <div class="sidebar"> | |
101 | <!-- Workshops image commented out from here, to be used above instead. | |
102 | ||
103 | <p><img id="workshops-image" | |
104 | src="//static.fsf.org/nosvn/enc-dev0/img/en/screenshots/workshop-section1.png" | |
105 | alt="Workshop icon"></p>--> | |
106 | </div><!-- /.sidebar --> | |
107 | <div class="main"> | |
108 | ||
109 | <h3>Strength in numbers</h3> | |
110 | ||
111 | <p>Each person who chooses to resist mass surveillance with encryption makes | |
112 | it easier for others to resist as well. People normalizing the use of strong | |
113 | encryption has multiple powerful effects: it means those who need privacy | |
114 | the most, like potential whistle-blowers and activists, are more likely to | |
115 | learn about encryption. More people using encryption for more things also | |
116 | makes it harder for surveillance systems to single out those that can't | |
117 | afford to be found, and shows solidarity with those people.</p> | |
118 | ||
119 | </div><!-- End .main --> | |
120 | <div class="main"> | |
121 | ||
122 | <h3>People you respect may already be using encryption</h3> | |
123 | ||
124 | <p>Many journalists, whistleblowers, activists, and researchers use GnuPG, | |
125 | so your friends might unknowingly have heard of a few people who use it | |
126 | already. You can search for "BEGIN PUBLIC KEY BLOCK" + keyword to help make | |
127 | a list of people and organizations who use GnuPG whom your community will | |
128 | likely recognize.</p> | |
129 | ||
130 | </div><!-- End .main --> | |
131 | <div class="main"> | |
132 | ||
133 | <h3>Respect your friends' privacy</h3> | |
134 | ||
135 | <p>There's no objective way to judge what constitutes privacy-sensitive | |
136 | correspondence. As such, it's better not to presume that just because you | |
137 | find an email you sent to a friend innocuous, your friend (or a surveillance | |
138 | agent, for that matter!) feels the same way. Show your friends respect by | |
139 | encrypting your correspondence with them.</p> | |
140 | ||
141 | </div><!-- End .main --> | |
142 | <div class="main"> | |
143 | ||
144 | <h3>Privacy technology is normal in the physical world</h3> | |
145 | ||
146 | <p>In the physical realm, we take window blinds, envelopes, and closed doors | |
147 | for granted as ways of protecting our privacy. Why should the digital realm | |
148 | be any different?</p> | |
149 | ||
150 | </div><!-- End .main --> | |
151 | <div class="main"> | |
152 | ||
153 | <h3>We shouldn't have to trust our email providers with our privacy</h3> | |
154 | ||
155 | <p>Some email providers are very trustworthy, but many have incentives not | |
156 | to protect your privacy and security. To be empowered digital citizens, | |
157 | we need to build our own security from the bottom up.</p> | |
158 | ||
159 | </div><!-- End .main --> | |
160 | </div><!-- End #step-aa .step --> | |
161 | </div></section><!-- End #section1 --> | |
162 | ||
163 | <!-- ~~~~~~~~~ Section 2: Plan The Workshop ~~~~~~~~~ --> | |
164 | <section class="row" id="section2"><div> | |
165 | ||
166 | <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ --> | |
167 | <div class="section-intro" style="border: none; padding-bottom: 0px; | |
168 | margin-bottom: 0px;"> | |
169 | ||
170 | <h2><em>#2</em> Plan The Workshop</h2> | |
171 | ||
172 | <p>Once you've got at least one interested friend, pick a date and start | |
173 | planning out the workshop. Tell participants to bring their computer and | |
174 | ID (for signing each other's keys). If you'd like to make it easy for the | |
175 | participants to use Diceware for choosing passwords, get a pack of dice | |
176 | beforehand. Make sure the location you select has an easily accessible | |
177 | Internet connection, and make backup plans in case the connection stops | |
178 | working on the day of the workshop. Libraries, coffee shops, and community | |
179 | centers make great locations. Try to get all the participants to set up | |
180 | an Enigmail-compatible email client before the event. Direct them to their | |
181 | email provider's IT department or help page if they run into errors.</p> | |
182 | ||
183 | <p>Estimate that the workshop will take at least forty minutes plus ten minutes | |
184 | for each participant. Plan extra time for questions and technical glitches.</p> | |
185 | ||
186 | <p>The success of the workshop requires understanding and catering to | |
187 | the unique backgrounds and needs of each group of participants. Workshops | |
188 | should stay small, so that each participant receives more individualized | |
189 | instruction. If more than a handful of people want to participate, keep the | |
190 | facilitator to participant ratio high by recruiting more facilitators, or by | |
191 | facilitating multiple workshops. Small workshops among friends work great!</p> | |
192 | ||
193 | </div><!-- End .section-intro --> | |
194 | </div></section><!-- End #section2 --> | |
195 | ||
196 | <!-- ~~~~~~~~~ Section 3: Follow The Guide ~~~~~~~~~ --> | |
197 | <section class="row" id="section3"><div> | |
198 | ||
199 | <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ --> | |
200 | <div class="section-intro" style="border: none; padding-bottom: 0px; | |
201 | margin-bottom: 0px;"> | |
202 | ||
203 | <h2><em>#3</em> Follow the guide as a group</h2> | |
204 | ||
205 | <p>Work through the Email Self-Defense guide a step at a time as a group. Talk | |
206 | about the steps in detail, but make sure not to overload the participants | |
207 | with minutia. Pitch the bulk of your instructions to the least tech-savvy | |
208 | participants. Make sure all the participants complete each step before the | |
209 | group moves on to the next one. Consider facilitating secondary workshops | |
210 | afterwards for people that had trouble grasping the concepts, or those that | |
211 | grasped them quickly and want to learn more.</p> | |
212 | ||
213 | <p>In <a href="index.html#section2">Section 2</a> of the guide, make | |
214 | sure the participants upload their keys to the same keyserver so that | |
215 | they can immediately download each other's keys later (sometimes | |
216 | there is a delay in synchronization between keyservers). During <a | |
217 | href="index.html#section3">Section 3</a>, give the participants the option to | |
218 | send test messages to each other instead of or as well as Edward. Similarly, | |
219 | in <a href="index.html#section4">Section 4</a>, encourage the participants | |
220 | to sign each other's keys. At the end, make sure to remind people to safely | |
221 | back up their revocation certificates.</p> | |
222 | ||
223 | </div><!-- End .section-intro --> | |
224 | </div></section> | |
225 | ||
226 | <!-- ~~~~~~~~~ Section 4: Explain the pitfalls ~~~~~~~~~ --> | |
227 | <section class="row" id="section4"><div> | |
228 | ||
229 | <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ --> | |
230 | <div class="section-intro" style="border: none; padding-bottom: 0px; | |
231 | margin-bottom: 0px;"> | |
232 | ||
233 | <h2><em>#4</em> Explain the pitfalls</h2> | |
234 | ||
235 | <p>Remind participants that encryption works only when it's explicitly used; | |
236 | they won't be able to send an encrypted email to someone who hasn't already | |
237 | set up encryption. Also remind participants to double-check the encryption icon | |
238 | before hitting send, and that subjects and timestamps are never encrypted.</p> | |
239 | ||
240 | <p> Explain the <a | |
241 | href="https://www.gnu.org/proprietary/proprietary.html">dangers | |
242 | of running a proprietary system</a> and | |
243 | advocate for free software, because without it, we can't <a | |
244 | href="https://www.fsf.org/bulletin/2013/fall/how-can-free-software-protect-us-from-surveillance">meaningfully | |
245 | resist invasions of our digital privacy and autonomy</a>.</p> | |
246 | ||
247 | </div><!-- End .section-intro --> | |
248 | </div></section><!-- End #section4 --> | |
249 | ||
250 | <!-- ~~~~~~~~~ Section 5: Explain The Pitfalls ~~~~~~~~~ --> | |
251 | <section id="section5" class="row"><div> | |
252 | ||
253 | <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ --> | |
254 | <div class="section-intro" style="border: none; padding-bottom: 0px; | |
255 | margin-bottom: 0px;"> | |
256 | ||
257 | <h2><em>#5</em> Share additional resources</h2> | |
258 | ||
259 | <p>GnuPG's advanced options are far too complex to teach in a single | |
260 | workshop. If participants want to know more, point out the advanced subsections | |
261 | in the guide and consider organizing another workshop. You can also share | |
262 | <a href="https://www.gnupg.org/documentation/index.html">GnuPG's</a> and | |
263 | <a href="https://www.enigmail.net/index.php/documentation">Enigmail's</a> | |
264 | official documentation and mailing lists. Many GNU/Linux distribution's Web | |
265 | sites also contain a page explaining some of GnuPG's advanced features.</p> | |
266 | ||
267 | </div><!-- End .section-intro --> | |
268 | </div></section><!-- End #section5 --> | |
269 | ||
270 | <!-- ~~~~~~~~~ Section 6: Next steps ~~~~~~~~~ --> | |
271 | <section class="row" id="section6"><div> | |
272 | ||
273 | <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ --> | |
274 | <div class="section-intro" style="border: none; padding-bottom: 0px; | |
275 | margin-bottom: 0px;"> | |
276 | ||
277 | <h2><em>#6</em> Follow up</h2> | |
278 | ||
279 | <p>Make sure everyone has shared email addresses and public key fingerprints | |
280 | before they leave. Encourage the participants to continue to gain GnuPG | |
281 | experience by emailing each other. Send them each an encrypted email one | |
282 | week after the event, reminding them to try adding their public key ID to | |
283 | places where they publicly list their email address.</p> | |
284 | ||
285 | <p>If you have any suggestions for improving this workshop guide, please | |
286 | let us know at <a href="mailto:campaigns@fsf.org">campaigns@fsf.org</a>.</p> | |
287 | ||
288 | </div><!-- End .section-intro --> | |
289 | </div></section><!-- End #section6 --> | |
290 | <!-- include virtual="footer.html" --> | |
291 | <!-- include virtual="javascript.html" --> |