X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;ds=sidebyside;f=v4-draft%2Fworkshops.html;h=f73ed0f1e7d420b150a4f169e55917eee8679394;hb=866845c939ab81c79b459db2095ef34bed89339a;hp=06e11777ae78485618fc0036bbcba355ce2fd77b;hpb=efcfc03d63e39883b62ccf15d1d455f59b3677db;p=enc-live.git diff --git a/v4-draft/workshops.html b/v4-draft/workshops.html index 06e1177..f73ed0f 100644 --- a/v4-draft/workshops.html +++ b/v4-draft/workshops.html @@ -93,7 +93,7 @@ step towards protecting their privacy with free software.

- View & share our infographic → + View & share our infographic → Each person who chooses to resist mass surveillance makes it easier and less out of the ordinary for others to resist as well. People normalizing the use of strong cryptography helps whistle-blowers, dissidents, and activists and blend in better by providing cover traffic.

There's no objective method of what constitutes an interesting correspondance. As such, don't presume just because you find an email you sent to a friend innocous, your friend (or a third party, for that matter!) feels the same way. Show your friends respect by encrypting your correspondences with them.

@@ -140,7 +140,7 @@ step towards protecting their privacy with free software.

Step 1.a Space and Preparation

@@ -166,7 +166,7 @@ step towards protecting their privacy with free software.

Step 2.a Public and Private Keys key

@@ -178,7 +178,7 @@ step towards protecting their privacy with free software.

Step 2.b Diceware and Passphrases

@@ -217,7 +217,7 @@ step towards protecting their privacy with free software.

Step 4.a Sign a key