<a href="https://status.fsf.org/fsf">
<img src="//static.fsf.org/nosvn/enc-dev0/img/gnu-social.png"
class="share-logo" alt="[GNU Social]" />
- GNU Social
- </a> |
+ GNU Social</a> |
<a href="http://microca.st/fsf">
<img src="//static.fsf.org/nosvn/enc-dev0/img/pump.io.png"
class="share-logo" alt="[Pump.io]" />
- Pump.io
- </a> |
+ Pump.io</a> |
<a href="https://www.twitter.com/fsf">Twitter</a>
</p>
<p><small><a href="https://www.fsf.org/twitter">Read why GNU Social and Pump.io are better than Twitter.</a></small></p>
<!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
<div class="intro">
<p>
- <a id="infographic" href="infographic.html"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" alt="View & share our infographic →" /></a>Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure anyone, including a surveillance agent or thief, intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.</p>
+ <a id="infographic" href="infographic.html"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" alt="View & share our infographic →" /></a>
+Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure anyone, including a surveillance agent or thief, intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.</p>
<p>Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that whistleblowers use to protect their identities while shining light on human rights abuses, corruption and other crimes.</p>
</div><!-- End .main -->
</div><!-- End #step-3c .step -->
-
+ <!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-3d" class="step">
<div class="main">
<h3><em>Step 3.d</em> Send a test signed email</h3>
<p>Edward's reply will arrive encrypted, because he prefers to use encryption whenever possible. If everything goes according to plan, it should say "Your signature was verified." If your test signed email was also encrypted, he will mention that first.</p>
</div><!-- End .main -->
- </div><!-- End #step-3c .step -->
+ </div><!-- End #step-3e .step -->
</div>
</section>
<p class="notes">You may also see public keys referred to by their key ID, which is simply the last eight digits of the fingerprint, like C09A61E8 for Edward. The key ID is visible directly from the Key Management window. This key ID is like a person's first name (it is a useful shorthand but may not be unique to a given key), whereas the fingerprint actually identifies the key uniquely without the possibility of confusion. If you only have the key ID, you can still look up the key (as well as its fingerprint), like you did in Step 3, but if multiple options appear, you'll need the fingerprint of the person to whom you are trying to communicate to verify which one to use.</p>
</div><!-- End .main -->
- </div><!-- End #step-sign_real_keys .step-->
+ </div><!-- End #step-identify_keys .step-->
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="check-ids-before-signing" class="step">
</div><!-- /.troubleshooting -->
</div><!-- End .main -->
- </div><!-- End #step-sign_real_keys .step-->
+ </div><!-- End #check-ids-before-signing .step-->
</div>
<div class="main">
<h3>Transferring you key</h3>
<p>You can use Enigmail's <a href="https://www.enigmail.net/documentation/keyman.php">key management window</a> to import and export keys. If you want to be able to read your encrypted email on a different computer, you will need to export your secret key from here. Be warned, if you transfer the key without <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">encrypting</a> the drive it's on the transfer will be dramatically less secure.</p>
- </div>--><!-- End .main -->
- </div><!-- End #step-lost_key .step-->
+ </div>--><!-- End .main
+ </div> End #transfer-key .step-->
</div>--><!-- End .main
</div> End #step-5d .step-->
+ </div>
</section><!-- End #section5 -->
<!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
<div class="intro">
<p>
- <a id="infographic" href="infographic.html"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" alt="View & share our infographic →" /></a>Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure a surveillance agent or thief intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.</p>
+ <a id="infographic" href="infographic.html"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" alt="View & share our infographic →" /></a>
+Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure a surveillance agent or thief intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.</p>
<p>Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that whistleblowers use to protect their identities while shining light on human rights abuses, corruption and other crimes.</p>
</div><!-- End .main -->
</div><!-- End #step-3c .step -->
-
+ <!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-3d" class="step">
<div class="main">
<h3><em>Step 3.d</em> Send a test signed email</h3>
<p>Edward's reply will arrive encrypted, because he prefers to use encryption whenever possible. If everything goes according to plan, it should say "Your signature was verified." If your test signed email was also encrypted, he will mention that first.</p>
</div><!-- End .main -->
- </div><!-- End #step-3c .step -->
+ </div><!-- End #step-3e .step -->
</div>
</section>
<p class="notes">You may also see public keys referred to by their key ID, which is simply the last eight digits of the fingerprint, like C09A61E8 for Edward. The key ID is visible directly from the Key Management window. This key ID is like a person's first name (it is a useful shorthand but may not be unique to a given key), whereas the fingerprint actually identifies the key uniquely without the possibility of confusion. If you only have the key ID, you can still look up the key (as well as its fingerprint), like you did in Step 3, but if multiple options appear, you'll need the fingerprint of the person to whom you are trying to communicate to verify which one to use.</p>
</div><!-- End .main -->
- </div><!-- End #step-sign_real_keys .step-->
+ </div><!-- End #step-identify_keys .step-->
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="check-ids-before-signing" class="step">
</div><!-- /.troubleshooting -->
</div><!-- End .main -->
- </div><!-- End #step-sign_real_keys .step-->
+ </div><!-- End #check-ids-before-signing .step-->
</div>
<div class="main">
<h3>Transferring you key</h3>
<p>You can use Enigmail's <a href="https://www.enigmail.net/documentation/keyman.php">key management window</a> to import and export keys. If you want to be able to read your encrypted email on a different computer, you will need to export your secret key from here. Be warned, if you transfer the key without <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">encrypting</a> the drive it's on the transfer will be dramatically less secure.</p>
- </div>--><!-- End .main -->
- </div><!-- End #step-lost_key .step-->
+ </div>--><!-- End .main
+ </div> End #transfer-key .step-->
</div>--><!-- End .main
</div> End #step-5d .step-->
-
+ </div>
</section><!-- End #section5 -->
<a href="https://status.fsf.org/fsf">
<img src="//static.fsf.org/nosvn/enc-dev0/img/gnu-social.png"
class="share-logo" alt="[GNU Social]" />
- GNU Social
- </a> |
+ GNU Social</a> |
<a href="http://microca.st/fsf">
<img src="//static.fsf.org/nosvn/enc-dev0/img/pump.io.png"
class="share-logo" alt="[Pump.io]" />
- Pump.io
- </a> |
+ Pump.io</a> |
<a href="https://www.twitter.com/fsf">Twitter</a>
</p>
<p><small>Read <a href="https://www.fsf.org/twitter">why GNU Social and Pump.io are better than Twitter</a>, and <a href="http://www.fsf.org/facebook">why we don't use Facebook</a>.</small></p>
<li>Add your public key fingerprint anywhere that you normally display your email address. Some good places are: your email signature (the text kind, not the cryptographic kind), social media profiles, blogs, Websites, or business cards. At the Free Software Foundation, we put ours on our <a href="https://fsf.org/about/staff">staff page</a>.</li>
</ul>
</div><!-- End .main -->
- </div><!-- End #step-friends .step -->
+ </div><!-- End #teach-friends .step -->
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-more_technologies" class="step">
<p>Before beginning to check your email over Tor, make sure you understand <a href="https://www.torproject.org/docs/faq.html.en#WhatProtectionsDoesTorProvide">the security tradeoffs involved</a>. This <a href="https://www.eff.org/pages/tor-and-https">infographic</a> from our friends at the Electronic Frontier Foundation demonstrates how Tor keeps you secure.</p>
</div><!-- End .main -->
- </div><!-- End #step-lost_key .step-->
+ </div><!-- End #privacy-tor .step-->
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-better" class="step">
<!-- ~~~~~~~~~ Guide Introduction ~~~~~~~~~ -->
<div class="intro">
<p>
- <a id="infographic" href="infographic.html"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" alt="View & share our infographic →" /></a>Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure a surveillance agent or thief intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.</p>
+ <a id="infographic" href="infographic.html"><img src="//static.fsf.org/nosvn/enc-dev0/img/en/infographic-button.png" alt="View & share our infographic →" /></a>
+Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure a surveillance agent or thief intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.</p>
<p>Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that whistleblowers use to protect their identities while shining light on human rights abuses, corruption and other crimes.</p>
</div><!-- End .main -->
</div><!-- End #step-3c .step -->
-
+ <!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="step-3d" class="step">
<div class="main">
<h3><em>Step 3.d</em> Send a test signed email</h3>
<p>Edward's reply will arrive encrypted, because he prefers to use encryption whenever possible. If everything goes according to plan, it should say "Your signature was verified." If your test signed email was also encrypted, he will mention that first.</p>
</div><!-- End .main -->
- </div><!-- End #step-3c .step -->
+ </div><!-- End #step-3e .step -->
</div>
</section>
<p class="notes">You may also see public keys referred to by their key ID, which is simply the last eight digits of the fingerprint, like C09A61E8 for Edward. The key ID is visible directly from the Key Management window. This key ID is like a person's first name (it is a useful shorthand but may not be unique to a given key), whereas the fingerprint actually identifies the key uniquely without the possibility of confusion. If you only have the key ID, you can still look up the key (as well as its fingerprint), like you did in Step 3, but if multiple options appear, you'll need the fingerprint of the person to whom you are trying to communicate to verify which one to use.</p>
</div><!-- End .main -->
- </div><!-- End #step-sign_real_keys .step-->
+ </div><!-- End #step-identify_keys .step-->
<!-- ~~~~~~~~~ a div for each step ~~~~~~~~~ -->
<div id="check-ids-before-signing" class="step">
</div><!-- /.troubleshooting -->
</div><!-- End .main -->
- </div><!-- End #step-sign_real_keys .step-->
+ </div><!-- End #check-ids-before-signing .step-->
</div>
<div class="main">
<h3>Transferring you key</h3>
<p>You can use Enigmail's <a href="https://www.enigmail.net/documentation/keyman.php">key management window</a> to import and export keys. If you want to be able to read your encrypted email on a different computer, you will need to export your secret key from here. Be warned, if you transfer the key without <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">encrypting</a> the drive it's on the transfer will be dramatically less secure.</p>
- </div>--><!-- End .main -->
- </div><!-- End #step-lost_key .step-->
+ </div>--><!-- End .main
+ </div> End #transfer-key .step-->
</div>--><!-- End .main
</div> End #step-5d .step-->
-
+ </div>
</section><!-- End #section5 -->
</div><!-- End .main -->
- </div><!-- End #step-2a .step -->
+ </div><!-- End #step-aa .step -->
</div>
</section><!-- End #section1 -->