commit
authorAdam Leibson <adaml@fsf.org>
Tue, 18 Aug 2015 21:33:54 +0000 (17:33 -0400)
committerAdam Leibson <adaml@fsf.org>
Tue, 18 Aug 2015 21:33:54 +0000 (17:33 -0400)
en/workshops.html

index 1d62d93dd075770d56b7963621e98f6a18cedf05..75c815bdac1ca23579c736bcaf64eff38d9be20f 100644 (file)
@@ -99,9 +99,28 @@ step towards protecting their privacy with free software.
 
                                 <div id="step-aa" class="step">
                                         <div class="main">
-                                                <h3><em>Step 1.a</em> Strength in numbers</h3>
+                                                <h3>Strength in numbers</h3>
                                                 <p>Each person who chooses to resist mass surveillance with encryption makes it easier for others to resist as well. People normalizing the use of strong cryptography has multiple powerful effects: It means those that truly need it, like potential whistle-blowers and activists, are more likely to learn about it. More people using it for more things also makes it harder for surveillance systems to single out those that can't afford to be found, and shows solidarity with those people.</p>
                                         </div><!-- End .main -->
+
+                                        <div class="main">
+                                                <h3>Respect your friends' privacy</h3>
+                                                <p>There's no objective way to judge what constitutes a privacy-sensitive correspondence. As such, it's better not to presume that just because you find an email you sent to a friend innocuous, your friend (or a surveillance agent, for that matter!) feels the same way. Show your friends respect by encrypting your correspondences with them.</p>
+                                        </div><!-- End .main -->
+
+
+                                        <div class="main">
+                                                <h3>Privacy technology is normal in the physical world</h3>
+                                                <p>In the physical realm, we take window blinds, envelopes, and closed doors for granted as ways of protecting our privacy. Why should the digital realm be any different?</p>
+                                        </div><!-- End .main -->
+
+
+                                        <div class="main">
+                                                <h3>People you respect may already be using encryption</h3>
+                                                <p>Many journalists, whistleblowers, activists, and researchers use GnuPG, so your friends might unknowingly have heard of a few people who use it already. You can search for "BEGIN PUBLIC KEY BLOCK" + keyword to help make a list of people and organizations who use GnuPG which you community will likely recognize.</p>
+                                        </div><!-- End .main -->
+
+
                                 </div><!-- End #step-2a .step -->
 
                        </div>