#6 Next steps

You've now completed the basics of email encryption with GnuPG, taking action against bulk surveillance. A pat on the back to you! These next steps will help make the most of the work you did today.

Join the movement

You've just taken a huge step towards protecting your privacy online. But each of us acting alone isn't enough. To topple bulk surveillance, we need to build a movement for the autonomy and freedom of all computer users. Join the Free Software Foundation's community to meet like-minded people and work together for change.

 GNU Social  Pump.io Twitter

Read why GNU Social and Pump.io are better than Twitter.


Teach your friends

This is the single biggest thing you can do to promote email encryption.

Learn how to make GnuPG a breeze for your friends to set up, and help spread GnuPG.

Spread the word

Before you close this guide, use our sharing page to compose a message to a few friends and ask them to join you in using encrypted email. Remember to include your GnuPG public key ID so they can easily download your key.

It's also great to add your public key fingerprint to your email signature so that people you are corresponding with know you accept encrypted email. We recommend you even go a step further and add it to your social media profiles, blog, Website, or business card. (At the Free Software Foundation, we put ours on our staff page.) We need to get our culture to the point that we feel like something is missing when we see an email address without a public key fingerprint.

Protect more of your digital life

Learn surveillance-resistant technologies for instant messages, hard drive storage, online sharing, and more at the Free Software Directory's Privacy Pack and prism-break.org.

If you are using Windows, Mac OS or any other proprietary operating system, we recommend you switch to a free software operating system like GNU/Linux. This will make it much harder for attackers to enter your computer through hidden back doors. Check out the Free Software Foundation's endorsed versions of GNU/Linux.

Optional: Protect Your Privacy with Tor

The Onion Router (Tor) network wraps Internet communication in multiple layers of encryption and bounces it around the world several times. When used properly, Tor confuses surveillance field agents and the global surveillance apparatus alike. To have your email program send and receive email over Tor, install the Torbirdy plugin the same way you installed Enigmail, by searching for it through Add-ons.

Before beginning to check your email over Tor, make sure you understand the security tradeoffs involved. This infographic demonstrates how Tor keeps you secure.

Make Email Self-Defense tools even better

Leave feedback and suggest improvements to this guide. We welcome translations, but we ask that you contact us at campaigns@fsf.org before you start, so that we can connect you with other translators working in your language.

If you like programming, you can contribute code to GnuPG or Enigmail.

To go the extra mile, support the Free Software Foundation so we can keep improving Email Self-Defense, and make more tools like it.

Donate