From: Ana Isabel Carvalho Date: Wed, 4 Jun 2014 22:58:24 +0000 (+0100) Subject: Added a link to the infographic in the header. Revised HTML order for the header... X-Git-Url: https://vcs.fsf.org/?a=commitdiff_plain;h=399c9783b265d498404d6dbe138566a8f07a1abc;p=enc.git Added a link to the infographic in the header. Revised HTML order for the header: fsf intro comes before the introduction to the guide. Added PGP pathfinder form to section 4. --- diff --git a/index.html b/index.html index 18b8d5d4..2f3a8f6b 100644 --- a/index.html +++ b/index.html @@ -39,19 +39,12 @@

Email Self-Defense

-
-

The goal of this guide is to make it easy to set up email encryption on your computer. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief can't intercept your email and read it.

- -

All you need is a computer with an Internet connection, an email account and about half an hour. You can use your existing email account for this without affecting it.

-

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org.

- -
-
-

Free Software Foundation

-

Email Self-Defense is a project of the Free Software Foundation. The FSF works to secure freedom for computer users by promoting the development and use of free (as in freedom) software and documentation.

We have big plans to get it in the hands of people under bulk surveillance all over the world, and make more tools like it. Can you make a donation to help us achieve that goal? -

+
+

Free Software Foundation

+

Email Self-Defense is a project of the Free Software Foundation. The FSF works to secure freedom for computer users by promoting the development and use of free (as in freedom) software and documentation.

We have big plans to get it in the hands of people under bulk surveillance all over the world, and make more tools like it. Can you make a donation to help us achieve that goal? +

Donate

@@ -68,6 +61,20 @@
+ +
+

+ Email Self-Defense, Infographic + View & share our infographic → +

+

The goal of this guide is to make it easy to set up email encryption on your computer. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief can't intercept your email and read it.

+ +

All you need is a computer with an Internet connection, an email account and about half an hour. You can use your existing email account for this without affecting it.

+ +

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org.

+ +
+
@@ -276,6 +283,15 @@

You've just effectively said "I trust that Adele's public key actually belongs to Adele." This doesn't mean much because Adele isn't a real person. Before signing a real person's key, always make sure it actually belongs to them, and answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?".

It's important to take keysigning seriously because it will affect people beyond just you and the person who's key you are signing. If someone doubts that a key actually belongs to the person that is says it does, they can go on a keyserver and see the number of signatures that it has. The more it has, the more they are likely to trust it.

The Web of Trust takes this concept to the next level. It is a network of key signatures that is saved in keyservers on the Internet. It builds chains of trust between individuals that do not know each other by passing through others, a bit like the famous "six degrees of separation" game. You don't need to understand it in detail to use email encryption, but it will become a powerful tool if you become an advanced user.

+ +
+
+

From:

+

To:

+

+
+
+