From: Thérèse Godefroy <godef.th@free.fr> Date: Wed, 4 Aug 2021 12:52:43 +0000 (+0200) Subject: en/index: add a left margin to right-floating images. X-Git-Url: https://vcs.fsf.org/?a=commitdiff_plain;h=1aa64d21409a724841ef689a893822ba1cdefa17;p=enc.git en/index: add a left margin to right-floating images. --- diff --git a/en/index.html b/en/index.html index 0d8f59a9..5c5a9171 100644 --- a/en/index.html +++ b/en/index.html @@ -256,7 +256,7 @@ is the program that implements the standard. Most email programs provide an inte <div class="section-intro"> <h2><em>#2</em> Make your keys</h2> -<p><img style="float:right; width:400px; margin-bottom:20px;" src="../static/img/en/screenshots/step2a-01-make-keypair.png" alt="A robot with a head shaped like a key holding a private and a public key"/></p> +<p><img style="float:right; width:400px; margin:0 0 20px 20px;" src="../static/img/en/screenshots/step2a-01-make-keypair.png" alt="A robot with a head shaped like a key holding a private and a public key"/></p> <p>To use the GnuPG system, you'll need a public key and a private key (known together as a keypair). Each is a long string of randomly generated numbers @@ -560,7 +560,7 @@ page</a>.</dd> <div class="section-intro"> <h2><em>#4</em> Try it out!</h2> -<p><img style="float:right; width:250px; margin-bottom:20px;" src="../static/img/en/screenshots/section3-try-it-out.png" alt="Illustration of a person in a house with a cat connected to a server"/></p> +<p><img style="float:right; width:250px; margin-bottom:0 0 20px 20px;" src="../static/img/en/screenshots/section3-try-it-out.png" alt="Illustration of a person in a house with a cat connected to a server"/></p> <p>Now you'll try a test correspondence with an FSF computer program named Edward, who knows how to use encryption. Except where noted, these are the same steps you'd follow when corresponding with a real, live person.</p> @@ -809,7 +809,7 @@ then it will use your private key to decrypt it.</p> <div class="section-intro"> <h2><em>#5</em> Learn about the Web of Trust</h2> -<p><img style="float:right; width:250px; margin-bottom:20px;" src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p> +<p><img style="float:right; width:250px; margin:0 0 20px 20px;" src="../static/img/en/screenshots/section5-web-of-trust.png" alt="Illustration of keys all interconnected with a web of lines"/></p> <p>Email encryption is a powerful technology, but it has a weakness: it requires a way to verify that a person's public key is actually