X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=en%2Fwindows.html;h=febf7cdaa635052be7ba2e746e732d311e38dbb5;hb=a3a9a0acf3552b45e59872c6067832c26b83e22d;hp=374fdac0f00e3e9021fccd5b7ded53dc7ee76fa1;hpb=64f80aa291b7647c59005a9228a0abdff57a2de0;p=enc-live.git diff --git a/en/windows.html b/en/windows.html index 374fdac..febf7cd 100644 --- a/en/windows.html +++ b/en/windows.html @@ -15,7 +15,7 @@ self-defense in 40 minutes with GnuPG." /> href="//static.fsf.org/nosvn/enc-dev0/img/favicon.ico" /> -
+This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This -makes it safer from surveillance than proprietary software (like Windows). To -defend your freedom as well as protect yourself from surveillance, we recommend -you switch to a free software operating system like GNU/Linux. Learn more -about free software at fsf.org.
+makes it safer from surveillance than proprietary software (like Windows or Mac +OS). To defend your freedom as well as protect yourself from surveillance, we +recommend you switch to a free software operating system like GNU/Linux. Learn +more about free software at fsf.org.To get started, you'll need the IceDove desktop email program installed on your computer. For your system, IceDove may be known by the alternate name @@ -170,6 +162,15 @@ alt="Step 1.A: Install Wizard" />
Open your email program and follow the wizard (step-by-step walkthrough) that sets it up with your email account.
+Look for the letters SSL, TLS, or STARTTLS to the right of the servers +when you're setting up your account. If you don't see them, you will still +be able to use encryption, but this means that the people running your email +system are running behind the industry standard in protecting your security +and privacy. We recommend that you send them a friendly email asking them +to enable SSL, TLS, or STARTTLS for your email server. They will know what +you're talking about, so it's worth making the request even if you aren't +an expert on these security systems.
+There are major security flaws in versions of GnuPG provided by GPG4Win +prior to 3.1.2. Make sure you have GPG4Win 3.1.2 or later.
+Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any +bold;">You should never share your private key with anyone, under any circumstances.
In addition to encryption and decryption, you can also use these keys to @@ -323,10 +333,10 @@ key pair for signing and encrypting my email."
If you'd like to pick a password manually, come up with something @@ -362,15 +372,8 @@ Tools.
In your email program's menu, select Enigmail → Key Management.
-Right click on your key and select Upload Public Keys to Keyserver. Use -the default keyserver in the popup.
+Right click on your key and select Upload Public Keys to Keyserver. You +don't have to use the default keyserver. If, after research, you would like +to change to a different default keyserver, you can change that setting +manually in the Enigmail preferences.
Now someone who wants to send you an encrypted message can download your public key from the Internet. There are multiple keyservers @@ -444,8 +449,8 @@ keyserver.
For greater security against potential attacks, you can turn off +HTML. Instead, you can render the message body as plain text.
+ @@ -653,20 +661,12 @@ independent of the actual email.When Edward receives your email, he will use his private key to decrypt -it, then use your public key (which you sent him in Step -3.A) to encrypt his reply to you.
+it, then reply to you.It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the Use it Well section of this guide.
-When you receive Edward's email and open it, Enigmail will automatically -detect that it is encrypted with your public key, and then it will use your -private key to decrypt it.
- -Notice the bar that Enigmail shows you above the message, with information -about the status of Edward's key.
- @@ -705,9 +705,9 @@ be encrypted, signed, both, or neither.When Edward receives your email, he will use your public key (which you -sent him in Step 3.A) to verify that your signature -is authentic and the message you sent has not been tampered with.
+When Edward receives your email, he will use your public key (which +you sent him in Step 3.A) to verify the message +you sent has not been tampered with and to encrypt his reply to you.
It may take two or three minutes for Edward to
respond. In the meantime, you might want to skip ahead and check out the
+ When you receive Edward's email and open it, Enigmail will
+automatically detect that it is encrypted with your public key, and
+then it will use your private key to decrypt it. Notice the bar that Enigmail shows you above the message, with
+information about the status of Edward's key.