From: lucastx Date: Fri, 20 Jun 2014 20:50:25 +0000 (-0300) Subject: Change image links to point to en/ directory X-Git-Url: https://vcs.fsf.org/?a=commitdiff_plain;h=062d7a82bf23bcefb50c334de4da650dd2c3645c;p=enc.git Change image links to point to en/ directory Commit 5c5cbea changed static images paths --- diff --git a/pt-br/confirmation.html b/pt-br/confirmation.html index b75f1645..04a6d470 100644 --- a/pt-br/confirmation.html +++ b/pt-br/confirmation.html @@ -9,7 +9,7 @@ - + @@ -24,7 +24,7 @@

Se você não receber o link de confirmação, nos mande um e-mail para info@fsf.org para ser adicionado manualmente.

-

Try it out.


+

Try it out.


Junte-se à nós em serviços de microblogging para atualizações no dia-a-dia:

GNU Social | Pump.io | Twitter

@@ -38,7 +38,7 @@ diff --git a/pt-br/index.html b/pt-br/index.html index 0e3e3fd0..ea281329 100644 --- a/pt-br/index.html +++ b/pt-br/index.html @@ -9,7 +9,7 @@ - + @@ -57,7 +57,7 @@

Free Software Foundation + src="//static.fsf.org/nosvn/enc-dev0/img/en/fsf-logo.png">

@@ -71,14 +71,14 @@

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -105,7 +105,7 @@

Step 1.a Set your email program up with your email account (if it isn't already)

@@ -131,9 +131,9 @@
@@ -172,7 +172,7 @@

Step 2.a Make a keypair

@@ -247,7 +247,7 @@

Passo 3.a Mande sua chave pública para Adele

@@ -339,7 +339,7 @@

Passo 4.a Assine uma chave

@@ -385,7 +385,7 @@

Quando devo codificar?

@@ -400,7 +400,7 @@

Importante: Cuidado com chaves inválidas

@@ -483,7 +483,7 @@ diff --git a/pt-br/infographic.html b/pt-br/infographic.html index 8944fd23..81f6459f 100644 --- a/pt-br/infographic.html +++ b/pt-br/infographic.html @@ -9,7 +9,7 @@ - + @@ -19,7 +19,7 @@

← Read the full guide

Share our infographic with the hashtag #EmailSelfDefense

-

View & share our infographic

+

View & share our infographic

Download the source files for the infographic

← Read the full guide

@@ -30,7 +30,7 @@ diff --git a/pt-br/mac.html b/pt-br/mac.html index db26852f..31325dc7 100644 --- a/pt-br/mac.html +++ b/pt-br/mac.html @@ -9,7 +9,7 @@ - + @@ -42,17 +42,17 @@
-

Free Software Foundation

+

Free Software Foundation

We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.

We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal?

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -78,7 +78,7 @@

Step 1.a Set your email program up with your email account (if it isn't already)

@@ -115,9 +115,9 @@
@@ -156,7 +156,7 @@

Step 2.a Make a keypair

@@ -228,7 +228,7 @@

Passo 3.a Mande sua chave pública para Adele

@@ -320,7 +320,7 @@

Passo 4.a Assine uma chave

@@ -366,7 +366,7 @@

Quando devo codificar?

@@ -381,7 +381,7 @@

Importante: Cuidado com chaves inválidas

@@ -464,7 +464,7 @@ diff --git a/pt-br/next_steps.html b/pt-br/next_steps.html index 071bc140..9ed8535f 100644 --- a/pt-br/next_steps.html +++ b/pt-br/next_steps.html @@ -9,7 +9,7 @@ - + @@ -37,7 +37,7 @@

Junte-se ao movimento

@@ -82,14 +82,14 @@

Proteja mais da sua vida digital

-

Aprenda tecnologias resistentes à vigilância para mensagens instantâneas, armazenamento de arquivos em disco, compartilhamento online e outras atividades no @@Free Software Directory's Privacy Pack@@ e no prism-break.org.

Se você está usando o Windows, o Mac OS ou algum outro sistema operacional proprietário, o maior passo que você pode dar de uma vez só é mudar pra um sistema operacional livre como o GNU/Linux. Isso vai tornar muito mais difícil que um adversário invada seu computador através de backdoors. Confira as versões do GNU/Linux recomendadas pela Free Software Foundation.

+

Aprenda tecnologias resistentes à vigilância para mensagens instantâneas, armazenamento de arquivos em disco, compartilhamento online e outras atividades no @@Free Software Directory's Privacy Pack@@ e no prism-break.org.

Se você está usando o Windows, o Mac OS ou algum outro sistema operacional proprietário, o maior passo que você pode dar de uma vez só é mudar pra um sistema operacional livre como o GNU/Linux. Isso vai tornar muito mais difícil que um adversário invada seu computador através de backdoors. Confira as versões do GNU/Linux recomendadas pela Free Software Foundation.

Torne as ferramentas da Auto-Defesa no E-mail ainda melhores

@@ -97,7 +97,7 @@

Se você gosta de programar, pode contribuir com código pro GnuPG ou pro Enigmail.

-

Para ir ainda além, apoie a Free Software Foundation para que possamos promover o Auto-Defesa no E-mail com a maior força possível, e fazer outras ferramentas como essa.

Doe Junte-se agora

+

Para ir ainda além, apoie a Free Software Foundation para que possamos promover o Auto-Defesa no E-mail com a maior força possível, e fazer outras ferramentas como essa.

Doe Junte-se agora


@@ -145,7 +145,7 @@ diff --git a/pt-br/windows.html b/pt-br/windows.html index 732da9a4..4b9a3486 100644 --- a/pt-br/windows.html +++ b/pt-br/windows.html @@ -9,7 +9,7 @@ - + @@ -42,17 +42,17 @@
-

Free Software Foundation

+

Free Software Foundation

We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.

We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal?

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -77,7 +77,7 @@

Step 1.a Set your email program up with your email account (if it isn't already)

@@ -113,9 +113,9 @@
@@ -154,7 +154,7 @@

Step 2.a Make a keypair

@@ -225,7 +225,7 @@

Passo 3.a Mande sua chave pública para Adele

@@ -317,7 +317,7 @@

Passo 4.a Assine uma chave

@@ -363,7 +363,7 @@

Quando devo codificar?

@@ -378,7 +378,7 @@

Importante: Cuidado com chaves inválidas

@@ -461,7 +461,7 @@