X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=en%2Fnext_steps.html;h=33582593f4a391bb04d9b182f90a61c4b4475f0a;hb=HEAD;hp=1ac073e91ff2683aac0281ca6fe5c5d09e480f39;hpb=7499c6887fdc42736e986207c50c9a7c5c1d66ac;p=enc-live.git diff --git a/en/next_steps.html b/en/next_steps.html index 1ac073e..3358259 100644 --- a/en/next_steps.html +++ b/en/next_steps.html @@ -1,218 +1,343 @@ - - - + + + +Email Self-Defense - a guide to fighting surveillance with GnuPG +encryption + + + + + + - Email Self-Defense - a guide to fighting surveillance with GnuPG encryption - - + + - - - + + - + +
+

#7 Next steps

- -
-
- -
-

#6 Next steps

-

You've now completed the basics of email encryption with GnuPG, taking action against bulk surveillance. A pat on the back to you! These next steps will help make the most of the work you did today.

-
+

You've now completed the basics of email encryption with GnuPG, taking +action against bulk surveillance. These next steps will help make the most +of the work you've done.

+
- -
- -
-

Join the movement

+ +
+ +
+ +

Join the movement

+ +

You've just taken a huge step towards protecting your privacy online. But +each of us acting alone isn't enough. To topple bulk surveillance, we need +to build a movement for the autonomy and freedom of all computer users. Join +the Free Software Foundation's community to meet like-minded people and work +together for change.

+ +

+ GNU Social  |  + + Mastodon  |  +Twitter

+ +

Read why GNU Social and Mastodon +are better than Twitter, and why +we don't use Facebook.

-

[GNU Social] GNU Social | [Pump.io] Pump.io | Twitter

-

Read why GNU Social and Pump.io are better than Twitter.


- -
-
- -
+
+ + + + + + +
+ +

Read our privacy +policy.

+ +
+
+
+ + +
-

Get your friends involved

-

This is the single biggest thing you can do to promote email encryption.

+

Bring Email Self-Defense to new people

-

Before you close this guide, use our sharing page to compose a message to a few friends and ask them to join you in using encrypted email. Remember to include your GnuPG public key ID so they can easily download your key.

+

Understanding and setting up email encryption is a daunting task for +many. To welcome them, make it easy to find your public key and offer to +help with encryption. Here are some suggestions:

-

It's also great to add your public key fingerprint to your email signature so that people you are corresponding with know you accept encrypted email.

+
    +
  • # Lead an Email Self-Defense workshop for your friends and community, +using our teaching guide.
  • -

    We recommend you even go a step further and add it to your social media profiles, blog, Website, or business card. (At the Free Software Foundation, we put ours on our staff page.) We need to get our culture to the point that we feel like something is missing when we see an email address without a public key fingerprint.

    +
  • # Use +our sharing page to compose +a message to a few friends and ask them to join you in using encrypted +email. Remember to include your GnuPG public key fingerprint so they can +easily download your key.
  • -
-
+
  • # Add your public key fingerprint anywhere that you normally display +your email address. Some good places are: your email signature (the text +kind, not the cryptographic kind), social media profiles, blogs, Web sites, +or business cards. At the Free Software Foundation, we put ours on our staff page.
  • + - -
    +
    +
    + +
    +
    + +

    Protect more of your digital life

    + +

    Learn surveillance-resistant technologies for instant +messages, hard drive storage, online sharing, and more at +the Free Software Directory's Privacy Pack and prism-break.org.

    +

    If you are using Windows, macOS or any other proprietary operating +system, we recommend you switch to a free software operating system like +GNU/Linux. This will make it much harder for attackers to enter your computer +through hidden back doors. Check out the Free Software Foundation's endorsed versions of +GNU/Linux.

    +
    +
    + + +
    +

    Optional: Add more email protection with Tor

    + +

    The Onion Router +(Tor) network wraps Internet communication in multiple layers of encryption +and bounces it around the world several times. When used properly, Tor confuses +surveillance field agents and the global surveillance apparatus alike. Using +it simultaneously with GnuPG's encryption will give you the best results.

    +

    To have your email program send and receive email over Tor, install the Torbirdy +plugin by searching for it through Add-ons.

    -

    Protect more of your digital life

    +

    Before beginning to check your email over Tor, make sure you understand +the security tradeoffs involved. This infographic from our +friends at the Electronic Frontier Foundation demonstrates how Tor keeps +you secure.

    -

    Learn surveillance-resistant technologies for instant messages, hard drive storage, online sharing, and more at the Free Software Directory's Privacy Pack and prism-break.org.

    If you are using Windows, Mac OS or any other proprietary operating system, we recommend you switch to a free software operating system like GNU/Linux. This will make it much harder for attackers to enter your computer through hidden back doors. Check out the Free Software Foundation's endorsed versions of GNU/Linux.

    -
    -
    + + - -
    + +
    -
    -

    Make Email Self-Defense tools even better

    -

    Leave feedback and suggest improvements to this guide. We welcome translations, but we ask that you contact us at campaigns@fsf.org before you start, so that we can connect you with other translators working in your language.

    -

    If you like programming, you can contribute code to GnuPG or Enigmail.

    +


    -

    To go the extra mile, support the Free Software Foundation so we can keep improving Email Self-Defense, and make more tools like it.

    Donate

    +

    Return +to the guide

    + +
    +
    + +

    Make Email Self-Defense tools even better

    + +

    Leave +feedback and suggest improvements to this guide. We +welcome translations, but we ask that you contact us at campaigns@fsf.org before you start, +so that we can connect you with other translators working in your language.

    + +

    If you like programming, you can contribute code +to GnuPG.

    + +

    To go the extra mile, support the Free Software Foundation so we can keep +improving Email Self-Defense, and make more tools like it.

    + +


    +
    +
    -
    - + +

    Learn more about GnuPG

    +

    There are a lot more features of GnuPG to discover, including +encrypting files on your computer. There are a variety of resources +accessible via Google, but we recommend starting with the links on the GnuPG Web site.

    - - +--> + + - + - - - - - - - - - - - +for /* Guide Sections Background */ then add #faq to the desired color +
    + +
    + +
    +
    My key expired
    +
    Answer coming soon.
    + +
    Who can read encrypted messages? Who can read signed ones?
    +
    Answer coming soon.
    + +
    My email program is opening at times I don't want it to open/is now my +default program and I don't want it to be.
    +
    Answer coming soon.
    +
    + +
    +
    +
    --> + + + + + + + + + + + + + +