<div class="section-intro">
<h2><em>#5</em> Learn about the Web of Trust</h2>
-<p><img style="float:right; width:250px; margin-bottom:20px;" src="../static/img/en/screenshots/section4-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p>
+<p><img style="float:right; width:250px; margin-bottom:20px;" src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p>
<p>Email encryption is a powerful technology, but it has a weakness:
it requires a way to verify that a person's public key is actually
<div class="sidebar">
<p><img
-src="../static/img/en/screenshots/section5-01-use-it-well.png"
+src="../static/img/en/screenshots/section6-01-use-it-well.png"
alt="Section 6: Use it Well (1)" /></p>
</div><!-- /.sidebar -->
<div class="sidebar">
<p><img
-src="../static/img/en/screenshots/section5-02-use-it-well.png"
+src="../static/img/en/screenshots/section6-02-use-it-well.png"
alt="Section 6: Use it Well (2)" /></p>
</div><!-- /.sidebar -->