X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=en%2Findex.html;h=6cba4814f7ea0dce024ccf6d93f916b4038f95de;hb=b7f7b4a2cff8c7d7ab2d01005079e2886d0ba653;hp=1f9e732f822742962bf3fae788ade442219d1866;hpb=31301371e547bc98696cca5a38b9b6406af26d26;p=enc-live.git diff --git a/en/index.html b/en/index.html index 1f9e732..6cba481 100644 --- a/en/index.html +++ b/en/index.html @@ -5,17 +5,18 @@ Email Self-Defense - a guide to fighting surveillance with GnuPG encryption +email, security, GnuPG2" /> - + +href="../static/img/favicon.ico" /> -

Due to Enigmail's PGP functionality being migrated into Icedove and Thunderbird, steps 2 and 3 of the guide are currently out of date.

Thank you for your patience while we're working on a new round of updates.

+ + @@ -51,6 +52,7 @@ href="//static.fsf.org/nosvn/enc-dev0/img/favicon.ico" /> float: right; width: 280px; padding-left: 20px; + color: #491e17; } #fsf-modal-window-elem-left-column { @@ -132,10 +134,10 @@ href="//static.fsf.org/nosvn/enc-dev0/img/favicon.ico" /> padding: 20px; border-style: solid; border-width: 5px; - border-color: #c44945; + border-color: #3a5b2c; border-radius: 20px; box-shadow: 0px 0px 10px #111111; - background-color: #fff2ab; + background-color: #fdf7b9; } #fsf-modal-window-elem-header { @@ -249,66 +251,63 @@ href="//static.fsf.org/nosvn/enc-dev0/img/favicon.ico" />
-
- +
+ ​
-

All aboard for software freedom!

+

Move freedom forward with a donation to the FSF!

-In our 35 year journey, free software has become a vital global movement for user freedom. +Without free software, we cannot and will not have a free society. We rely on donations from people like you, who use and appreciate our work. Fuel our journey forward, and help us reach our ultimate destination: full software freedom.

-Without free software, we cannot and will not have a free society. Your membership fuels the voyage forward, and will help us reach our ultimate destination: full software freedom. +Support us with a donation today, and help us maximize our summer fundraising goal by donating before July 19 – Every contribution will be matched dollar for dollar by our generous donors up to USD 11,000.

-

- -Join us today for $10/month ($5 for students) and help us reach our December 31 goal of 500 new associate members! - -

- -

Read more | Join

+

Read more | Join

-
-  Join +
+  Join
- -
- +// @license-end
- -
+ +
-

#4 Learn the Web of Trust

+

#5 Learn about the Web of Trust

+

Illustration of keys all interconnected with a web of lines

-

Email encryption is a powerful technology, but it has a weakness; +

Email encryption is a powerful technology, but it has a weakness: it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making -an email address with your friend's name, creating keys to go with it and +an email address with your friend's name, creating keys to go with it, and impersonating your friend. That's why the free software programmers that developed email encryption created keysigning and the Web of Trust.

@@ -1173,31 +1253,25 @@ connected to each other by chains of trust expressed through signatures.

-
+
-

Step 4.a Sign a key

+

Step 5.a Sign a key

-

In your email program's menu, go to Enigmail → Key Management.

+

In your email program's menu, go to OpenPGP Key Manager and select Key properties by right clicking on Edward's key.

-

Right click on Edward's public key and select Sign Key from the context -menu.

- -

In the window that pops up, select "I will not answer" and click ok.

- -

Now you should be back at the Key Management menu. Select Keyserver → -Upload Public Keys and hit ok.

+

Under "Your Acceptance," you can select Yes, I've verified in person this key has the correct fingerprint".

You've just effectively said "I trust that Edward's public key actually belongs to Edward." This doesn't mean much because Edward isn't -a real person, but it's good practice.

+a real person, but it's good practice, and for real people it is important. You can read more about signing a person's key in the check IDs before signing section.

-
+
@@ -1227,15 +1301,15 @@ type="reset" value="reset" name=".reset">

People's public keys are usually identified by their key fingerprint, which is a string of digits like F357AA1A5B1FA42CFD9FE52A9FF2194CC09A61E8 (for Edward's key). You can see the fingerprint for your public key, and -other public keys saved on your computer, by going to Enigmail → Key +other public keys saved on your computer, by going to OpenPGP Key Management in your email program's menu, then right clicking on the key and choosing Key Properties. It's good practice to share your fingerprint wherever you share your email address, so that people can double-check that they have the correct public key when they download yours from a keyserver.

You may also see public keys referred to by a shorter -key ID. This key ID is visible directly from the Key Management -window. These eight character key IDs were previously used for +keyID. This keyID is visible directly from the Key Management +window. These eight character keyIDs were previously used for identification, which used to be safe, but is no longer reliable. You need to check the full fingerprint as part of verifying you have the correct key for the person you are trying to contact. Spoofing, in @@ -1257,12 +1331,9 @@ belongs to them, and that they are who they say they are. Ideally, this confidence comes from having interactions and conversations with them over time, and witnessing interactions between them and others. Whenever signing a key, ask to see the full public key fingerprint, and not just the shorter -key ID. If you feel it's important to sign the key of someone you've just +keyID. If you feel it's important to sign the key of someone you've just met, also ask them to show you their government identification, and make -sure the name on the ID matches the name on the public key. In Enigmail, -answer honestly in the window that pops up and asks "How carefully have you -verified that the key you are about to sign actually belongs to the person(s) -named above?"

+sure the name on the ID matches the name on the public key.

@@ -1272,31 +1343,24 @@ named above?"

Master the Web of Trust
Unfortunately, trust does not spread between users the way many people -think. One of best ways to strengthen the GnuPG community is to deeply many people +think. One of the best ways to strengthen the GnuPG community is to deeply understand the Web of Trust and to carefully sign as many people's keys as circumstances permit.
- -
Set ownertrust
-
If you trust someone enough to validate other people's keys, you can assign -them an ownertrust level through Enigmails's key management window. Right -click on the other person's key, go to the "Select Owner Trust" menu option, -select the trustlevel and click OK. Only do this once you feel you have a -deep understanding of the Web of Trust.
-
+
- -
+ +
-

#5 Use it well

+

#6 Use it well

Everyone uses GnuPG a little differently, but it's important to follow some basic practices to keep your email secure. Not following them, you @@ -1306,12 +1370,12 @@ and damage the Web of Trust.

-
+
@@ -1335,15 +1399,15 @@ nice to also include a link to this guide in your standard email signature (the text kind, not the cryptographic kind).

-
+
-
+
@@ -1356,41 +1420,37 @@ invalid keys might be readable by surveillance programs.

In your email program, go back to the first encrypted email that Edward sent you. Because Edward encrypted it with your public key, it will have a -message from Enigmail at the top, which most likely says "Enigmail: Part of -this message encrypted."

+green checkmark a at the top "OpenPGP" button.

-

When using GnuPG, make a habit of glancing at that bar. The program +

When using GnuPG, make a habit of glancing at that button. The program will warn you there if you get an email signed with a key that can't be trusted.

-
+
-
+

Copy your revocation certificate to somewhere safe

Remember when you created your keys and saved the revocation certificate -that GnuPG made? It's time to copy that certificate onto the safest digital -storage that you have -- the ideal thing is a flash drive, disk, or hard -drive stored in a safe place in your home, not on a device you carry with -you regularly.

+that GnuPG made? It's time to copy that certificate onto the safest storage that you have -- a flash drive, disk, or hard drive stored in a safe place in your home could work, not on a device you carry with you regularly. The safest way we know is actually to print the revocation certificate and store it in a safe place.

If your private key ever gets lost or stolen, you'll need this certificate file to let people know that you are no longer using that keypair.

-
+
-

Important: act swiftly if someone gets your private key

+

IMPORTANT: ACT SWIFTLY if someone gets your private key

-

If you lose your private key or someone else gets ahold +

If you lose your private key or someone else gets a hold of it (say, by stealing or cracking your computer), it's important to revoke it immediately before someone else uses it to read your encrypted email or forge your signature. This @@ -1403,24 +1463,7 @@ of your new key.

- - - - + -
+
+
- -
+ +
@@ -1468,7 +1511,7 @@ email address without a public key fingerprint.

-
+

Infographic and guide design by Journalism++Journalism++Journalism++

+src="../static/js/jquery-1.11.0.min.js"> +src="../static/js/scripts.js">