From: NIIBE Yutaka
+ class="share-logo" alt="[GNU Social]" />
GNU Social
|
+ class="share-logo" alt="[Pump.io]" />
Pump.io
|
Twitter
diff --git a/en/index.html b/en/index.html
index 19237e45..6a95095e 100644
--- a/en/index.html
+++ b/en/index.html
@@ -54,13 +54,13 @@
Share
+ class="share-logo" alt="[GNU Social]" />
+ class="share-logo" alt="[Pump.io]" />
+ class="share-logo" alt="[Reddit]" />
+ class="share-logo" alt="[Hacker News]" />
@@ -199,8 +199,8 @@
On the screen titled "Create Key," pick a strong password! You can do it manually, or you can use the Diceware method. Doing it manually is faster but not as secure. Using Diceware takes longer and requires dice, but creates a password that is much harder for attackers figure out. To use it, read the section "Make a secure passphrase with Diceware" in this article by Micah Lee.
+If you'd like to pick a password manually, come up with something you can remember which is at least twelve characters long, and includes at least one lower case and upper case letter and at least one number or punctuation symbol. Never pick a password you've used elsewhere. Don't use any recognizable patterns, such as birthdays, telephone numbers, pets' names, song lyrics, quotes from books, and so on.
@@ -587,7 +587,6 @@ End #step-5d .step--> - diff --git a/en/infographic.html b/en/infographic.html index 0d320406..1e0cc930 100644 --- a/en/infographic.html +++ b/en/infographic.html @@ -20,13 +20,13 @@On the screen titled "Create Key," pick a strong password! You can do it manually, or you can use the Diceware method. Doing it manually is faster but not as secure. Using Diceware takes longer and requires dice, but creates a password that is much harder for attackers figure out. To use it, read the section "Make a secure passphrase with Diceware" in this article by Micah Lee.
+If you'd like to pick a password manually, come up with something you can remember which is at least twelve characters long, and includes at least one lower case and upper case letter and at least one number or punctuation symbol. Never pick a password you've used elsewhere. Don't use any recognizable patterns, such as birthdays, telephone numbers, pets' names, song lyrics, quotes from books, and so on.
@@ -588,7 +588,6 @@ End #step-5d .step--> - diff --git a/en/next_steps.html b/en/next_steps.html index da7627a3..733b895b 100644 --- a/en/next_steps.html +++ b/en/next_steps.html @@ -50,12 +50,12 @@+ class="share-logo" alt="[GNU Social]" /> GNU Social | + class="share-logo" alt="[Pump.io]" /> Pump.io | Twitter @@ -120,7 +120,7 @@
The Onion Router (Tor) network wraps Internet communication in multiple layers of encryption and bounces it around the world several times. When used properly, Tor confuses surveillance field agents and the global surveillance apparatus alike. Using it simultaneously with GnuPG's encryption will give you the best results.
To have your email program send and receive email over Tor, install the Torbirdy plugin the same way you installed Enigmail, by searching for it through Add-ons.
-Before beginning to check your email over Tor, make sure you understand the security tradeoffs involved. This infographic from our friends at the Electronic Frontier Foundation demonstrates how Tor keeps you secure. +
Before beginning to check your email over Tor, make sure you understand the security tradeoffs involved. This infographic from our friends at the Electronic Frontier Foundation demonstrates how Tor keeps you secure.
diff --git a/en/windows.html b/en/windows.html index eecbaa2d..610acf43 100644 --- a/en/windows.html +++ b/en/windows.html @@ -54,13 +54,13 @@ Share + class="share-logo" alt="[GNU Social]" /> + class="share-logo" alt="[Pump.io]" /> + class="share-logo" alt="[Reddit]" /> + class="share-logo" alt="[Hacker News]" /> @@ -203,8 +203,8 @@On the screen titled "Create Key," pick a strong password! You can do it manually, or you can use the Diceware method. Doing it manually is faster but not as secure. Using Diceware takes longer and requires dice, but creates a password that is much harder for attackers figure out. To use it, read the section "Make a secure passphrase with Diceware" in this article by Micah Lee.
+If you'd like to pick a password manually, come up with something you can remember which is at least twelve characters long, and includes at least one lower case and upper case letter and at least one number or punctuation symbol. Never pick a password you've used elsewhere. Don't use any recognizable patterns, such as birthdays, telephone numbers, pets' names, song lyrics, quotes from books, and so on.
@@ -583,7 +583,6 @@ End #step-5d .step--> - diff --git a/en/workshops.html b/en/workshops.html index 2cdca1b9..da970efd 100644 --- a/en/workshops.html +++ b/en/workshops.html @@ -1,13 +1,13 @@ - +Understanding and setting up email encryption sounds like a daunting task to many people. That's why helping your friends with GnuPG plays such an important role in helping spread encryption. Even if only one person shows up, that's still one more person using encryption who wasn't before. You have the power to help your friends keep their digital love letters private, and teach them about the importance of free software. If you use GnuPG to send and receive encrypted email, you're a perfect candidate for leading a workshop!
If you hear friends grumbling about their lack of privacy, ask them if they're interested in attending a workshop on Email Self-Defense. If your friends don't grumble about privacy, they may need some convincing. You might even hear the classic "if you've got nothing to hide, you've got nothing to fear" argument against using encryption.
Here are some talking points you can use to help explain why it's worth it to learn GnuPG. Mix and match whichever you think will make sense to your community: