X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=en%2Fwindows.html;h=d03f081a31670414bd74225b7531bc49ad707c1d;hb=00d120e1565d092ef77dbac7b4b9f358795286b8;hp=eecbaa2dc0eb8b77dca1dc93704f3b190662aec0;hpb=b9365efaded3a97a081be5066b6f22e3d20bae85;p=enc-live.git diff --git a/en/windows.html b/en/windows.html index eecbaa2..d03f081 100644 --- a/en/windows.html +++ b/en/windows.html @@ -5,7 +5,7 @@ Email Self-Defense - a guide to fighting surveillance with GnuPG encryption - + @@ -22,20 +22,22 @@ @@ -54,13 +56,13 @@ Share    + class="share-logo" alt="[GNU Social]" />    + class="share-logo" alt="[Pump.io]" />    + class="share-logo" alt="[Reddit]" />  + class="share-logo" alt="[Hacker News]" /> @@ -79,7 +81,7 @@

- Please donate to support Email Self-Defense. We need to keep improving it and making other materials like, for the benefit of people around the world taking the first step towards protecting their privacy. + Please donate to support Email Self-Defense. We need to keep improving it, and making more materials, for the benefit of people around the world taking the first step towards protecting their privacy.

@@ -91,7 +93,7 @@

- View & share our infographic →Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambed to make sure a surveillance agent or thief intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.

+ View & share our infographic →Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure a surveillance agent or thief intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that whistleblowers use to protect their identities while shining light on human rights abuses, corruption and other crimes.

@@ -108,7 +110,7 @@

#1 Get the pieces

-

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). To defend your freedom as well as protect yourself from surveillance, we recommend you switch to a free software operating system like GNU/Linux. Learn more about free software at fsf.org.

+

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). To defend your freedom as well as protect yourself from surveillance, we recommend you switch to a free software operating system like GNU/Linux. Learn more about free software at fsf.org.

To get started, you'll need the IceDove desktop email program installed on your computer. For your system, IceDove may be known by the alternate name "Thunderbird." Email programs are another way to access the same email accounts you can access in a browser (like Gmail), but provide extra features.

If you already have an email program, you can skip to Step 1.b.

@@ -119,7 +121,7 @@

Step 1.A: Install Wizard

-

Step 1.a Setup your email program with your email account

+

Step 1.a Set up your email program with your email account

Open your email program and follow the wizard (step-by-step walkthrough) that sets it up with your email account.

@@ -203,8 +205,7 @@
  • On the screen titled "Encryption," select "Encrypt all of my messages by default, because privacy is critical to me."
  • On the screen titled "Signing," select "Don't sign my messages by default."
  • On the screen titled "Key Selection," select "I want to create a new key pair for signing and encrypting my email."
  • -
  • On the screen titled "Create Key," pick a strong password! You can do it manually, or you can use the Diceware method. Doing it manually is faster but not as secure. Using Diceware takes longer and requires dice, but creates a password that is much harder for attackers figure out. To use it, read the section "Make a secure passphrase with Diceware" in this article by Micah Lee.

    - +
  • On the screen titled "Create Key," pick a strong password! You can do it manually, or you can use the Diceware method. Doing it manually is faster but not as secure. Using Diceware takes longer and requires dice, but creates a password that is much harder for attackers figure out. To use it, read the section "Make a secure passphrase with Diceware" in this article by Micah Lee.
  • If you'd like to pick a password manually, come up with something you can remember which is at least twelve characters long, and includes at least one lower case and upper case letter and at least one number or punctuation symbol. Never pick a password you've used elsewhere. Don't use any recognizable patterns, such as birthdays, telephone numbers, pets' names, song lyrics, quotes from books, and so on.

    @@ -259,7 +260,7 @@
    The progress bar never finishes
    Close the upload popup, make sure you are connected to the Internet, and try again. If that doesn't work, try again, selecting a different keyserver.
    -
    My key doesnt appear in the list
    +
    My key doesn't appear in the list
    Try checking "Display All Keys by Default."
    More documentation
    If you're having trouble with our instructions or just want to learn more, check out Enigmail's documentation.
    @@ -510,7 +511,7 @@

    When should I encrypt? When should I sign?

    @@ -524,7 +525,7 @@

    Be wary of invalid keys

    @@ -558,7 +559,7 @@

    Transferring you key

    You can use Enigmail's key management window to import and export keys. If you want to be able to read your encrypted email on a different computer, you will need to export your secret key from here. Be warned, if you transfer the key without encrypting the drive it's on the transfer will be dramatically less secure.

    -
    +
    -->
    @@ -570,7 +571,7 @@

    Webmail and GnuPG

    When you use a web browser to access your email, you're using webmail, an email program stored on a distant website. Unlike webmail, your desktop email program runs on your own computer. Although webmail can't decrypt encrypted email, it will still display it in its encrypted form. If you primarily use webmail, you'll know to open your email client when you receive a scrambled email.

    -
    +
    -