X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=en%2Fnext_steps.html;h=41cda8bfbe1a1afc94eb7217961c69bfd78517e7;hb=b7f7b4a2cff8c7d7ab2d01005079e2886d0ba653;hp=64d8c94320bb96d5110b65e3170817b3c7423e96;hpb=2b82530f2f6480cfa31a05abdd5894efd530ec5a;p=enc-live.git diff --git a/en/next_steps.html b/en/next_steps.html index 64d8c94..41cda8b 100644 --- a/en/next_steps.html +++ b/en/next_steps.html @@ -1,252 +1,338 @@ - - - + + + +Email Self-Defense - a guide to fighting surveillance with GnuPG +encryption + + + + + + - Email Self-Defense - a guide to fighting surveillance with GnuPG encryption - - +

Due to Enigmail's PGP functionality being migrated into Icedove and Thunderbird, steps 2 and 3 of the guide are currently out of date.

Thank you for your patience while we're working on a new round of updates.

- - - + + - + +
+

#7 Next steps

- -
-
+

You've now completed the basics of email encryption with GnuPG, taking +action against bulk surveillance. These next steps will help make the most +of the work you've done.

+
+ +
+ + + +
+
-
-
+

Bring Email Self-Defense to new people

- -
-
+

Understanding and setting up email encryption is a daunting task for +many. To welcome them, make it easy to find your public key and offer to +help with encryption. Here are some suggestions:

-

Teach your friends with our workshop guide

-

Understanding and setting up email encryption sounds like a daunting task to many people. That's why helping your friends with GnuPG plays such an important role in spreading encryption. Read Email Self-Defense's guide to leading workshops and put it to use!

+
    +
  • # Lead an Email Self-Defense workshop for your friends and community, +using our teaching guide.
  • -
-
+
  • # Use our sharing page to compose +a message to a few friends and ask them to join you in using encrypted +email. Remember to include your GnuPG public key fingerprint so they can +easily download your key.
  • +
  • # Add your public key fingerprint anywhere that you normally display +your email address. Some good places are: your email signature (the text +kind, not the cryptographic kind), social media profiles, blogs, Web sites, +or business cards. At the Free Software Foundation, we put ours on our staff page.
  • + - -
    +
    +
    + + +
    -

    Spread the word

    +

    Protect more of your digital life

    + +

    Learn surveillance-resistant technologies for instant +messages, hard drive storage, online sharing, and more at +the Free Software Directory's Privacy Pack and prism-break.org.

    -

    Before you close this guide, use our sharing page to compose a message to a few friends and ask them to join you in using encrypted email. Remember to include your GnuPG public key ID so they can easily download your key.

    +

    If you are using Windows, Mac OS or any other proprietary operating +system, we recommend you switch to a free software operating system like +GNU/Linux. This will make it much harder for attackers to enter your computer +through hidden back doors. Check out the Free Software Foundation's endorsed versions of +GNU/Linux.

    -

    It's also great to add your public key fingerprint to your email signature so that people you are corresponding with know that you accept encrypted email (we're not referring here to your cryptographic signature, but rather the one that your email program can create by default, which normally includes your name). We recommend you even go a step further and add it to your social media profiles, blog, Website, or business card. At the Free Software Foundation, we put ours on our staff page. We need to get our culture to the point that we feel like something is missing when we see an email address without a public key fingerprint.

    +
    +
    -
    - + +
    +
    - -
    +

    Optional: Add more email protection with Tor

    +

    The Onion Router +(Tor) network wraps Internet communication in multiple layers of encryption +and bounces it around the world several times. When used properly, Tor confuses +surveillance field agents and the global surveillance apparatus alike. Using +it simultaneously with GnuPG's encryption will give you the best results.

    +

    To have your email program send and receive email over Tor, install the Torbirdy +plugin by searching for it through Add-ons.

    -
    +

    Before beginning to check your email over Tor, make sure you understand +the security tradeoffs involved. This infographic from our +friends at the Electronic Frontier Foundation demonstrates how Tor keeps +you secure.

    +
    +
    + +
    + -
    +

    Return +to the guide

    +
    +
    - -
    -
    -

    Optional: Add more email protection with Tor

    -

    The Onion Router (Tor) network wraps Internet communication in multiple layers of encryption and bounces it around the world several times. When used properly, Tor confuses surveillance field agents and the global surveillance apparatus alike. Using it simultaneously with GnuPG's encryption will give you the best results.

    -

    To have your email program send and receive email over Tor, install the Torbirdy plugin the same way you installed Enigmail, by searching for it through Add-ons.

    +

    Make Email Self-Defense tools even better

    -

    Before beginning to check your email over Tor, make sure you understand the security tradeoffs involved. This infographic from our friends at the Electronic Frontier Foundation demonstrates how Tor keeps you secure. -

    -
    +

    Leave +feedback and suggest improvements to this guide. We +welcome translations, but we ask that you contact us at campaigns@fsf.org before you start, +so that we can connect you with other translators working in your language.

    - -
    - -
    -

    Make Email Self-Defense tools even better

    -

    Leave feedback and suggest improvements to this guide. We welcome translations, but we ask that you contact us at campaigns@fsf.org before you start, so that we can connect you with other translators working in your language.

    +

    If you like programming, you can contribute code +to GnuPG.

    -

    If you like programming, you can contribute code to GnuPG or Enigmail.

    +

    To go the extra mile, support the Free Software Foundation so we can keep +improving Email Self-Defense, and make more tools like it.

    -

    To go the extra mile, support the Free Software Foundation so we can keep improving Email Self-Defense, and make more tools like it.

    Donate

    +


    +
    +
    -
    -
    + +

    Learn more about GnuPG

    +

    There are a lot more features of GnuPG to discover, including +encrypting files on your computer. There are a variety of resources +accessible via Google, but we recommend starting with the links on the GnuPG Web site.

    - - +--> + + - + - - - - - - - - - - +for /* Guide Sections Background */ then add #faq to the desired color +
    + +
    + +
    +
    My key expired
    +
    Answer coming soon.
    + +
    Who can read encrypted messages? Who can read signed ones?
    +
    Answer coming soon.
    + +
    My email program is opening at times I don't want it to open/is now my +default program and I don't want it to be.
    +
    Answer coming soon.
    +
    + +
    +
    +
    --> + + + + + + + + + + + + + +