#4 Try it out!
- +Now you'll try a test correspondence with an FSF computer program named Edward, who knows how to use encryption. Except where noted, these are the same steps you'd follow when corresponding with a real, live person.
@@ -1032,12 +1032,12 @@ before using your private key to decrypt it. @@ -1145,7 +1145,7 @@ Text. @@ -1230,7 +1230,7 @@ then it will use your private key to decrypt it.#5 Learn the Web of Trust
- +Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually @@ -1260,7 +1260,7 @@ connected to each other by chains of trust expressed through signatures.
@@ -1377,7 +1377,7 @@ and damage the Web of Trust. @@ -1409,7 +1409,7 @@ nice to also include a link to this guide in your standard email signature @@ -1549,7 +1549,7 @@ default program and I don't want it to be.+src="/static/img/fsf-logo.png" />
Copyright © 2014-2021 Free Software Foundation, Inc. source code and license information.
Infographic and guide design by Journalism++