copied the static data into this repo
[enc.git] / ua / kitchen / workshops.t.html
1 <!-- include virtual="head.html" -->
2
3 <!-- ~~~~~~~~~ GnuPG Header and introduction text ~~~~~~~~~ -->
4 <header class="row" id="header"><div>
5
6 <h1>Email Self-Defense</h1>
7
8 <!-- include virtual="translist.html" -->
9
10 <ul id="menu" class="os">
11 <li class="spacer"><a href="index.html">GNU/Linux</a></li>
12 <li><a href="mac.html">Mac OS</a></li>
13 <li><a href="windows.html">Windows</a></li>
14 <li><a href="workshops.html" class="current">Teach your friends</a></li>
15 <li><a href="https://fsf.org/share?u=https://u.fsf.org/zb&amp;t=Email
16 encryption for everyone via %40fsf">Share&nbsp;
17 <img
18 src="//static.fsf.org/nosvn/enc-dev0/img/gnu-social.png" class="share-logo"
19 alt="[GNU Social]" />&nbsp;
20 <img
21 src="//static.fsf.org/nosvn/enc-dev0/img/mastodon.png" class="share-logo"
22 alt="[Mastodon]" />&nbsp;
23 <img
24 src="//static.fsf.org/nosvn/enc-dev0/img/reddit-alien.png" class="share-logo"
25 alt="[Reddit]" />&nbsp;
26 <img
27 src="//static.fsf.org/nosvn/enc-dev0/img/hacker-news.png" class="share-logo"
28 alt="[Hacker News]" />
29 </a></li>
30 </ul>
31
32 <!-- ~~~~~~~~~ FSF Introduction ~~~~~~~~~ -->
33 <div id="fsf-intro">
34
35 <h3><a href="http://u.fsf.org/ys"><img
36 alt="Free Software Foundation"
37 src="//static.fsf.org/nosvn/enc-dev0/img/fsf-logo.png" />
38 </a></h3>
39
40 <div class="fsf-emphasis">
41
42 <p>We want to translate this guide
43 into more languages, and make a version for encryption on mobile
44 devices. Please donate, and help people around the world take the first
45 step towards protecting their privacy with free software.</p>
46
47 </div>
48
49 <p><a
50 href="https://crm.fsf.org/civicrm/contribute/transact?reset=1&amp;id=14&amp;pk_campaign=email_self_defense&amp;pk_kwd=guide_donate"><img
51 alt="Donate"
52 src="//static.fsf.org/nosvn/enc-dev0/img/en/donate.png" /></a></p>
53
54 </div><!-- End #fsf-intro -->
55
56 <!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
57 <div class="intro">
58
59 <p><a id="infographic"
60 href="https://emailselfdefense.fsf.org/en/infographic.html"><img
61 src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png"
62 alt="View &amp; share our infographic →" /></a>
63 Understanding and setting up email encryption sounds like a daunting task
64 to many people. That's why helping your friends with GnuPG plays such an
65 important role in helping spread encryption. Even if only one person shows
66 up, that's still one more person using encryption who wasn't before. You have
67 the power to help your friends keep their digital love letters private, and
68 teach them about the importance of free software. If you use GnuPG to send and
69 receive encrypted email, you're a perfect candidate for leading a workshop!</p>
70
71 </div><!-- End .intro -->
72 </div></header><!-- End #header -->
73
74 <!-- ~~~~~~~~~ Section 1: Get your friends or community interested ~~~~~~~~~
75 -->
76 <section style="padding-top: 0px;" class="row" id="section1">
77 <div style="padding-top: 0px;">
78
79 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
80 <div class="section-intro">
81
82 <p style="margin-top: 0px;" class="image"><img
83 src="//static.fsf.org/nosvn/enc-dev0/img/en/screenshots/workshop-section1.png"
84 alt="A small workshop among friends" /></p>
85
86 <h2><em>#1</em> Get your friends or community interested </h2>
87
88 <p>If you hear friends grumbling about their lack of privacy, ask them if
89 they're interested in attending a workshop on Email Self-Defense. If your
90 friends don't grumble about privacy, they may need some convincing. You might
91 even hear the classic "if you've got nothing to hide, you've got nothing to
92 fear" argument against using encryption.</p>
93
94 <p>Here are some talking points you can use to help explain why it's worth
95 it to learn GnuPG. Mix and match whichever you think will make sense to
96 your community:</p>
97
98 </div><!-- End .section-intro -->
99 <div id="step-aa" class="step">
100 <div class="sidebar">
101 <!-- Workshops image commented out from here, to be used above instead.
102
103 <p><img id="workshops-image"
104 src="//static.fsf.org/nosvn/enc-dev0/img/en/screenshots/workshop-section1.png"
105 alt="Workshop icon"></p>-->
106 </div><!-- /.sidebar -->
107 <div class="main">
108
109 <h3>Strength in numbers</h3>
110
111 <p>Each person who chooses to resist mass surveillance with encryption makes
112 it easier for others to resist as well. People normalizing the use of strong
113 encryption has multiple powerful effects: it means those who need privacy
114 the most, like potential whistle-blowers and activists, are more likely to
115 learn about encryption. More people using encryption for more things also
116 makes it harder for surveillance systems to single out those that can't
117 afford to be found, and shows solidarity with those people.</p>
118
119 </div><!-- End .main -->
120 <div class="main">
121
122 <h3>People you respect may already be using encryption</h3>
123
124 <p>Many journalists, whistleblowers, activists, and researchers use GnuPG,
125 so your friends might unknowingly have heard of a few people who use it
126 already. You can search for "BEGIN PUBLIC KEY BLOCK" + keyword to help make
127 a list of people and organizations who use GnuPG whom your community will
128 likely recognize.</p>
129
130 </div><!-- End .main -->
131 <div class="main">
132
133 <h3>Respect your friends' privacy</h3>
134
135 <p>There's no objective way to judge what constitutes privacy-sensitive
136 correspondence. As such, it's better not to presume that just because you
137 find an email you sent to a friend innocuous, your friend (or a surveillance
138 agent, for that matter!) feels the same way. Show your friends respect by
139 encrypting your correspondence with them.</p>
140
141 </div><!-- End .main -->
142 <div class="main">
143
144 <h3>Privacy technology is normal in the physical world</h3>
145
146 <p>In the physical realm, we take window blinds, envelopes, and closed doors
147 for granted as ways of protecting our privacy. Why should the digital realm
148 be any different?</p>
149
150 </div><!-- End .main -->
151 <div class="main">
152
153 <h3>We shouldn't have to trust our email providers with our privacy</h3>
154
155 <p>Some email providers are very trustworthy, but many have incentives not
156 to protect your privacy and security. To be empowered digital citizens,
157 we need to build our own security from the bottom up.</p>
158
159 </div><!-- End .main -->
160 </div><!-- End #step-aa .step -->
161 </div></section><!-- End #section1 -->
162
163 <!-- ~~~~~~~~~ Section 2: Plan The Workshop ~~~~~~~~~ -->
164 <section class="row" id="section2"><div>
165
166 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
167 <div class="section-intro" style="border: none; padding-bottom: 0px;
168 margin-bottom: 0px;">
169
170 <h2><em>#2</em> Plan The Workshop</h2>
171
172 <p>Once you've got at least one interested friend, pick a date and start
173 planning out the workshop. Tell participants to bring their computer and
174 ID (for signing each other's keys). If you'd like to make it easy for the
175 participants to use Diceware for choosing passwords, get a pack of dice
176 beforehand. Make sure the location you select has an easily accessible
177 Internet connection, and make backup plans in case the connection stops
178 working on the day of the workshop. Libraries, coffee shops, and community
179 centers make great locations. Try to get all the participants to set up
180 an Enigmail-compatible email client before the event. Direct them to their
181 email provider's IT department or help page if they run into errors.</p>
182
183 <p>Estimate that the workshop will take at least forty minutes plus ten minutes
184 for each participant. Plan extra time for questions and technical glitches.</p>
185
186 <p>The success of the workshop requires understanding and catering to
187 the unique backgrounds and needs of each group of participants. Workshops
188 should stay small, so that each participant receives more individualized
189 instruction. If more than a handful of people want to participate, keep the
190 facilitator to participant ratio high by recruiting more facilitators, or by
191 facilitating multiple workshops. Small workshops among friends work great!</p>
192
193 </div><!-- End .section-intro -->
194 </div></section><!-- End #section2 -->
195
196 <!-- ~~~~~~~~~ Section 3: Follow The Guide ~~~~~~~~~ -->
197 <section class="row" id="section3"><div>
198
199 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
200 <div class="section-intro" style="border: none; padding-bottom: 0px;
201 margin-bottom: 0px;">
202
203 <h2><em>#3</em> Follow the guide as a group</h2>
204
205 <p>Work through the Email Self-Defense guide a step at a time as a group. Talk
206 about the steps in detail, but make sure not to overload the participants
207 with minutia. Pitch the bulk of your instructions to the least tech-savvy
208 participants. Make sure all the participants complete each step before the
209 group moves on to the next one. Consider facilitating secondary workshops
210 afterwards for people that had trouble grasping the concepts, or those that
211 grasped them quickly and want to learn more.</p>
212
213 <p>In <a href="index.html#section2">Section 2</a> of the guide, make
214 sure the participants upload their keys to the same keyserver so that
215 they can immediately download each other's keys later (sometimes
216 there is a delay in synchronization between keyservers). During <a
217 href="index.html#section3">Section 3</a>, give the participants the option to
218 send test messages to each other instead of or as well as Edward. Similarly,
219 in <a href="index.html#section4">Section 4</a>, encourage the participants
220 to sign each other's keys. At the end, make sure to remind people to safely
221 back up their revocation certificates.</p>
222
223 </div><!-- End .section-intro -->
224 </div></section>
225
226 <!-- ~~~~~~~~~ Section 4: Explain the pitfalls ~~~~~~~~~ -->
227 <section class="row" id="section4"><div>
228
229 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
230 <div class="section-intro" style="border: none; padding-bottom: 0px;
231 margin-bottom: 0px;">
232
233 <h2><em>#4</em> Explain the pitfalls</h2>
234
235 <p>Remind participants that encryption works only when it's explicitly used;
236 they won't be able to send an encrypted email to someone who hasn't already
237 set up encryption. Also remind participants to double-check the encryption icon
238 before hitting send, and that subjects and timestamps are never encrypted.</p>
239
240 <p> Explain the <a
241 href="https://www.gnu.org/proprietary/proprietary.html">dangers
242 of running a proprietary system</a> and
243 advocate for free software, because without it, we can't <a
244 href="https://www.fsf.org/bulletin/2013/fall/how-can-free-software-protect-us-from-surveillance">meaningfully
245 resist invasions of our digital privacy and autonomy</a>.</p>
246
247 </div><!-- End .section-intro -->
248 </div></section><!-- End #section4 -->
249
250 <!-- ~~~~~~~~~ Section 5: Explain The Pitfalls ~~~~~~~~~ -->
251 <section id="section5" class="row"><div>
252
253 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
254 <div class="section-intro" style="border: none; padding-bottom: 0px;
255 margin-bottom: 0px;">
256
257 <h2><em>#5</em> Share additional resources</h2>
258
259 <p>GnuPG's advanced options are far too complex to teach in a single
260 workshop. If participants want to know more, point out the advanced subsections
261 in the guide and consider organizing another workshop. You can also share
262 <a href="https://www.gnupg.org/documentation/index.html">GnuPG's</a> and
263 <a href="https://www.enigmail.net/index.php/documentation">Enigmail's</a>
264 official documentation and mailing lists. Many GNU/Linux distribution's Web
265 sites also contain a page explaining some of GnuPG's advanced features.</p>
266
267 </div><!-- End .section-intro -->
268 </div></section><!-- End #section5 -->
269
270 <!-- ~~~~~~~~~ Section 6: Next steps ~~~~~~~~~ -->
271 <section class="row" id="section6"><div>
272
273 <!-- ~~~~~~~~~ section introduction: interspersed text ~~~~~~~~~ -->
274 <div class="section-intro" style="border: none; padding-bottom: 0px;
275 margin-bottom: 0px;">
276
277 <h2><em>#6</em> Follow up</h2>
278
279 <p>Make sure everyone has shared email addresses and public key fingerprints
280 before they leave. Encourage the participants to continue to gain GnuPG
281 experience by emailing each other. Send them each an encrypted email one
282 week after the event, reminding them to try adding their public key ID to
283 places where they publicly list their email address.</p>
284
285 <p>If you have any suggestions for improving this workshop guide, please
286 let us know at <a href="mailto:campaigns@fsf.org">campaigns@fsf.org</a>.</p>
287
288 </div><!-- End .section-intro -->
289 </div></section><!-- End #section6 -->
290 <!-- include virtual="footer.html" -->
291 <!-- include virtual="javascript.html" -->