Removed in-between sections that didn't make sense (sematically) and created extra...
authorAna Isabel Carvalho <ana.isabelc@gmail.com>
Sun, 1 Jun 2014 17:01:42 +0000 (18:01 +0100)
committerAna Isabel Carvalho <ana.isabelc@gmail.com>
Sun, 1 Jun 2014 17:01:42 +0000 (18:01 +0100)
index.html

index b155d2df3708897048a1389956149b515c1d6cf2..c7edd331b74b40689426b8f75333320deab947b3 100644 (file)
@@ -57,8 +57,7 @@
                                        <p>An email program lets you read and write mail without using a Web browser, and provides special features that are hard to find in email systems you use in a Web browser. Using an email program doesn't mean that you have to make a new email account &mdash; most people just connect an existing email account from a Web email service (like GMail) or their workplace to their email program. You can think of it as another way to access the same email account.</p>
                                </div><!-- /.main -->
                        </div>
-               </section>
-               <section class="row section1">
+
                        <div>
                                <div class="sidebar">
                                        <p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
                                <div class="main section-intro">
                                        <p>To use the GnuPG system, you'll need a public key and a private key (known together as a keypair). Each is a long string of randomly generated numbers that are unique to you. Your public and private keys are linked together by a special mathematical function.</p>
                                </div><!-- /.main -->
-                       </div>
-               </section>
-               <section class="row section2">
-                       <div>
+
                                <div class="sidebar">
                                        <p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
                                </div><!-- /.sidebar -->
                                <div class="main section-intro">
                                        <p>Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption. You'd follow the same steps if communicating with a real person. Then you'll send your first signed email to a real person!</p>
                                </div><!-- /.main -->
-                       </div>
-               </section>
-               <section class="row section3">
-                       <div>
+
                                <div class="sidebar">
                                        <p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
                                </div><!-- /.sidebar -->
                                        <p>Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's keypair is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friends name, creating a keypair to go with it and impersonating your friend. They would then be able to impersonate your friend by signing messages with the private key they'd created, and decrypt messages intended for your friend with the public key.</p>
                                        <p>That's why the programmers that developed email encryption created keysigning and the Web of Trust. Keysigning allows a person to publicly state that they trust that a public key belongs to a specific person. To sign someone's public key, you need to use your private key, so the world will know that it was you.</p>
                                </div><!-- /.main -->
-                       </div>
-               </section>
-               <section class="row section4">
-                       <div>
+
                                <div class="sidebar">
                                        <p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
                                </div><!-- /.sidebar -->