X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=en%2Fnext_steps.html;h=41cda8bfbe1a1afc94eb7217961c69bfd78517e7;hb=b7f7b4a2cff8c7d7ab2d01005079e2886d0ba653;hp=21d539c34ab9603d123ebdeadc8407f70818de50;hpb=46a4da4bb11dedebf010311ecf60a47fbf06b2d9;p=enc-live.git diff --git a/en/next_steps.html b/en/next_steps.html index 21d539c..41cda8b 100644 --- a/en/next_steps.html +++ b/en/next_steps.html @@ -1,245 +1,338 @@ - -
- + + + +Due to Enigmail's PGP functionality being migrated into Icedove and Thunderbird, steps 2 and 3 of the guide are currently out of date.
Thank you for your patience while we're working on a new round of updates.
You've now completed the basics of email encryption with GnuPG, taking +action against bulk surveillance. These next steps will help make the most +of the work you've done.
+This is the single biggest thing you can do to promote email encryption.
+Before you close this guide, use our sharing page to compose a message to a few friends and ask them to join you in using encrypted email. Remember to include your GnuPG public key ID so they can easily download your key.
+Understanding and setting up email encryption is a daunting task for +many. To welcome them, make it easy to find your public key and offer to +help with encryption. Here are some suggestions:
-It's also great to add your public key fingerprint to your email signature so that people you are corresponding with know you accept encrypted email.
+We recommend you even go a step further and add it to your social media profiles, blog, Website, or business card. (At the Free Software Foundation, we put ours on our staff page.) We need to get our culture to the point that we feel like something is missing when we see an email address without a public key fingerprint.
+Learn surveillance-resistant technologies for instant +messages, hard drive storage, online sharing, and more at +the Free Software Directory's Privacy Pack and prism-break.org.
+If you are using Windows, Mac OS or any other proprietary operating +system, we recommend you switch to a free software operating system like +GNU/Linux. This will make it much harder for attackers to enter your computer +through hidden back doors. Check out the Free Software Foundation's endorsed versions of +GNU/Linux.
+Learn surveillance-resistant technologies for instant messages, hard drive storage, online sharing, and more at the Free Software Directory's Privacy Pack and prism-break.org.
If you are using Windows, Mac OS or any other proprietary operating system, we recommend you switch to a free software operating system like GNU/Linux. This will make it much harder for attackers to enter your computer through hidden back doors. Check out the Free Software Foundation's endorsed versions of GNU/Linux.
-The Onion Router +(Tor) network wraps Internet communication in multiple layers of encryption +and bounces it around the world several times. When used properly, Tor confuses +surveillance field agents and the global surveillance apparatus alike. Using +it simultaneously with GnuPG's encryption will give you the best results.
+To have your email program send and receive email over Tor, install the Torbirdy +plugin by searching for it through Add-ons.
- -The Onion Router (Tor) network wraps Internet communication in multiple layers of encryption and bounces it around the world several times. When used properly, Tor confuses surveillance field agents and the global surveillance apparatus alike. To have your email program send and receive email over Tor, install the Torbirdy plugin the same way you installed Enigmail, by searching for it through Add-ons.
+Before beginning to check your email over Tor, make sure you understand +the security tradeoffs involved. This infographic from our +friends at the Electronic Frontier Foundation demonstrates how Tor keeps +you secure.
-Before beginning to check your email over Tor, make sure you understand the security tradeoffs involved. This infographic demonstrates how Tor keeps you secure. -
Leave feedback and suggest improvements to this guide. We welcome translations, but we ask that you contact us at campaigns@fsf.org before you start, so that we can connect you with other translators working in your language.
-If you like programming, you can contribute code to GnuPG or Enigmail.
+To go the extra mile, support the Free Software Foundation so we can keep improving Email Self-Defense, and make more tools like it.
+Leave +feedback and suggest improvements to this guide. We +welcome translations, but we ask that you contact us at campaigns@fsf.org before you start, +so that we can connect you with other translators working in your language.
+ +If you like programming, you can contribute code +to GnuPG.
+ +To go the extra mile, support the Free Software Foundation so we can keep +improving Email Self-Defense, and make more tools like it.
+ +There are a lot more features of GnuPG to discover, including +encrypting files on your computer. There are a variety of resources +accessible via Google, but we recommend starting with the links on the GnuPG Web site.
- - +--> + + - + - - - - - - - - - - - +for /* Guide Sections Background */ then add #faq to the desired color +