<!-- PLACE FUNDRAISER MODAL WINDOW HERE -->
+<div class="wip">THIS IS A TEST VERSION!<br />
+The latest changes haven't been approved yet. Please don't update the PO files.</div>
<!-- ~~~~~~~~~ GnuPG Header and introduction text ~~~~~~~~~ -->
<header class="row" id="header"><div>
<div id="step-1a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step1a-install-wizard.png"
alt="Step 1.A: Install Wizard" /></p>
<div class="section-intro">
<h2><em>#2</em> Make your keys</h2>
-<p><img style="float:right; width:400px; margin-bottom:20px;" src="../static/img/en/screenshots/step2a-01-make-keypair.png" alt="A robot with a head shaped like a key holding a private and a public key"/></p>
+<p class="float medium"><img src="../static/img/en/screenshots/step2a-01-make-keypair.png" alt="A robot with a head shaped like a key holding a private and a public key"/></p>
<p>To use the GnuPG system, you'll need a public key and a private key (known
together as a keypair). Each is a long string of randomly generated numbers
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-2a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step2a-02-make-keypair.png"
alt="Step 2.A: Make your Keypair" /></p>
-<br />
-<p><img
+
+<p class="large"><img
src="../static/img/en/screenshots/step2a-03-make-keypair.png"
alt="Step 2.A: Set your passphrase" /></p>
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-2b" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step2b-04-upload-and-certificate.png"
alt="Step 2.B: Send to server and generate a certificate" /></p>
<h4>Export your key to a file</h4>
<p>Use the following command to export your secret key so you can import it into your email client at the next <a href="#section3">step</a>. To avoid getting your key compromised, store this in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Exporting your keys can be done with the following commands:</p>
-<p>
-<code>$ gpg --export-secret-keys -a [keyID] > my_secret_key.asc</code>
-<code>$ gpg --export -a [keyID] > my_public_key.asc</code>
-</p>
+<p><code>
+$ gpg --export-secret-keys -a [keyID] > my_secret_key.asc<br/>
+$ gpg --export -a [keyID] > my_public_key.asc
+</code></p>
<h4>Generate a revocation certificate</h4>
<p>Just in case you lose your key, or it gets compromised, you want to generate a certificate and choose to save it in a safe place on your computer for now (please refer to <a href="#step-6c"> step 6.C</a> for how to best store your revocation cerficate safely). This step is essential for your email self-defense, as you'll learn more about in <a href="#section5">Section 5</a>.</p>
<dd>
<p>Use the following commands to transfer your keys. To avoid getting your key compromised, store it in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Importing and exporting a key can be done with the following commands:</p>
-<p>
-<code>$ gpg --export-secret-keys -a [keyID] > my_private_key.asc</code>
-<code>$ gpg --export -a [keyID] > my_public_key.asc</code>
-<code>$ gpg --import my_private_key.asc</code>
-<code>$ gpg --import my_public_key.asc</code>
-</p>
+<p><code>
+$ gpg --export-secret-keys -a [keyID] > my_private_key.asc<br />
+$ gpg --export -a [keyID] > my_public_key.asc<br />
+$ gpg --import my_private_key.asc<br />
+$ gpg --import my_public_key.asc
+</code></p>
<p>Ensure that the keyID printed is the correct one, and if so, then go ahead and add ultimate trust for it:</p>
$ gpg --edit-key [your@email]
</code></p>
-<p>Because this is your key, you should choose <code>ultimate</code>. You shouldn't trust anyone else's key ultimately.</p>
+<p>Because this is your key, you should choose <code>ultimate</code>. You shouldn't trust anyone else's key ultimately.</p>
<p class="notes"> Refer to <a href="#step-2b">Troubleshooting in Step 2.B</a> for more information on permissions. When transferring keys, your permissions may get mixed, and errors may be prompted. These are easily avoided when your folders and files have the right permissions</p>
</dd>
<div id="step-3a" class="step">
<div class="sidebar">
-<p><img src="../static/img/en/screenshots/step3a-open-key-manager.png"
+<p class="large"><img src="../static/img/en/screenshots/step3a-open-key-manager.png"
alt="Step 3.A: Email Menu" /></p>
-<br />
-<p><img src="../static/img/en/screenshots/step3a-import-from-file.png"
+
+<p class="large"><img src="../static/img/en/screenshots/step3a-import-from-file.png"
alt="Step 3.A: Import From File" /></p>
-<br />
-<p><img src="../static/img/en/screenshots/step3a-success.png"
+
+<p class="large"><img src="../static/img/en/screenshots/step3a-success.png"
alt="Step 3.A: Success" /></p>
-<br />
-<p><img src="../static/img/en/screenshots/step3a-troubleshoot.png"
+
+<p class="large"><img src="../static/img/en/screenshots/step3a-troubleshoot.png"
alt="Step 3.A: Troubleshoot" /></p>
</div><!-- /.sidebar -->
<div class="main">
<div class="section-intro">
<h2><em>#4</em> Try it out!</h2>
-<p><img style="float:right; width:250px; margin-bottom:20px;" src="../static/img/en/screenshots/section3-try-it-out.png" alt="Illustration of a person in a house with a cat connected to a server"/></p>
+<p class="float small"><img src="../static/img/en/screenshots/section3-try-it-out.png" alt="Illustration of a person in a house with a cat connected to a server"/></p>
<p>Now you'll try a test correspondence with an FSF computer program named Edward,
who knows how to use encryption. Except where noted, these are the same
steps you'd follow when corresponding with a real, live person.</p>
may take a long time to respond, or not respond at all. We're sorry about
this and we're working hard to fix it. Your key will still work even without
testing with Edward.</p> -->
+
+<div style="clear: both"></div>
</div><!-- End .section-intro -->
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-4a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step4a-send-key-to-Edward.png"
alt="Step 4.A Send key to Edward." /></p>
<div id="step-4b" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step4b-option1-verify-key.png"
alt="Step 4.B Option 1. Verify key" /></p>
-<br />
-<p><img
+
+<p class="large"><img
src="../static/img/en/screenshots/step4b-option2-import-key.png"
alt="Step 4.B Option 2. Import key" /></p>
</div><!-- /.sidebar -->
<div id="step-4c" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step4c-Edward-response.png"
alt="Step 4.C Edward's response" /></p>
<div class="section-intro">
<h2><em>#5</em> Learn about the Web of Trust</h2>
-<p><img style="float:right; width:250px; margin-bottom:20px;" src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p>
+<p class="float small"><img src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p>
<p>Email encryption is a powerful technology, but it has a weakness:
it requires a way to verify that a person's public key is actually
<div id="step-5a" class="step">
<div class="sidebar">
-<p><img
+<p class="large"><img
src="../static/img/en/screenshots/step5a-key-properties.png"
alt="Section 5: trusting a key" /></p>
<div id="step-6a" class="step">
<div class="sidebar">
-<p><img
+<p class="medium"><img
src="../static/img/en/screenshots/section6-01-use-it-well.png"
alt="Section 6: Use it Well (1)" /></p>
<div id="step-6b" class="step">
<div class="sidebar">
-<p><img
+<p class="medium"><img
src="../static/img/en/screenshots/section6-02-use-it-well.png"
alt="Section 6: Use it Well (2)" /></p>