<p>An email program lets you read and write mail without using a Web browser, and provides special features that are hard to find in email systems you use in a Web browser. Using an email program doesn't mean that you have to make a new email account — most people just connect an existing email account from a Web email service (like GMail) or their workplace to their email program. You can think of it as another way to access the same email account.</p>
</div><!-- /.main -->
</div>
- </section>
- <section class="row section1">
+
<div>
<div class="sidebar">
<p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
<div class="main section-intro">
<p>To use the GnuPG system, you'll need a public key and a private key (known together as a keypair). Each is a long string of randomly generated numbers that are unique to you. Your public and private keys are linked together by a special mathematical function.</p>
</div><!-- /.main -->
- </div>
- </section>
- <section class="row section2">
- <div>
+
<div class="sidebar">
<p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
</div><!-- /.sidebar -->
<div class="main section-intro">
<p>Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption. You'd follow the same steps if communicating with a real person. Then you'll send your first signed email to a real person!</p>
</div><!-- /.main -->
- </div>
- </section>
- <section class="row section3">
- <div>
+
<div class="sidebar">
<p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
</div><!-- /.sidebar -->
<p>Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's keypair is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friends name, creating a keypair to go with it and impersonating your friend. They would then be able to impersonate your friend by signing messages with the private key they'd created, and decrypt messages intended for your friend with the public key.</p>
<p>That's why the programmers that developed email encryption created keysigning and the Web of Trust. Keysigning allows a person to publicly state that they trust that a public key belongs to a specific person. To sign someone's public key, you need to use your private key, so the world will know that it was you.</p>
</div><!-- /.main -->
- </div>
- </section>
- <section class="row section4">
- <div>
+
<div class="sidebar">
<p><img src="static/img/placeholder.png" alt="Placeholder" /></p>
</div><!-- /.sidebar -->