From: Thérèse Godefroy Date: Thu, 25 Jun 2020 09:11:21 +0000 (+0200) Subject: Wrap long lines. X-Git-Url: https://vcs.fsf.org/?a=commitdiff_plain;h=c226604bcb727b60e28535b82495c68b4ca21201;p=enc.git Wrap long lines. --- diff --git a/en/index.html b/en/index.html index f943a194..d11b99b5 100644 --- a/en/index.html +++ b/en/index.html @@ -280,7 +280,7 @@ look up your public key.

Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any +bold;">You should never share your private key with anyone, under any circumstances.

In addition to encryption and decryption, you can also use these keys to @@ -415,7 +415,10 @@ provide good guides for setting up a secure subkey configuration.

In your email program's menu, select Enigmail → Key Management.

-

Right click on your key and select Upload Public Keys to Keyserver. You don't have to use the default keyserver. If, after research, you would like to change to a different default keyserver, you can change that setting manually in the Enigmail preferences.

+

Right click on your key and select Upload Public Keys to Keyserver. You +don't have to use the default keyserver. If, after research, you would like +to change to a different default keyserver, you can change that setting +manually in the Enigmail preferences.

Now someone who wants to send you an encrypted message can download your public key from the Internet. There are multiple keyservers @@ -654,20 +657,12 @@ Text.

Step 3.c Receive a response

When Edward receives your email, he will use his private key to decrypt -it, then use your public key (which you sent him in Step -3.A) to encrypt his reply to you.

+it, then reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the Use it Well section of this guide.

-

When you receive Edward's email and open it, Enigmail will automatically -detect that it is encrypted with your public key, and then it will use your -private key to decrypt it.

- -

Notice the bar that Enigmail shows you above the message, with information -about the status of Edward's key.

- @@ -706,9 +701,9 @@ be encrypted, signed, both, or neither.

Step 3.e Receive a response

-

When Edward receives your email, he will use your public key (which you -sent him in Step 3.A) to verify that your signature -is authentic and the message you sent has not been tampered with.

+

When Edward receives your email, he will use your public key (which +you sent him in Step 3.A) to verify the message +you sent has not been tampered with and to encrypt his reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the +

When you receive Edward's email and open it, Enigmail will +automatically detect that it is encrypted with your public key, and +then it will use your private key to decrypt it.

+ +

Notice the bar that Enigmail shows you above the message, with +information about the status of Edward's key.

+ diff --git a/en/kitchen/index.t.html b/en/kitchen/index.t.html index e3c08803..68748c34 100644 --- a/en/kitchen/index.t.html +++ b/en/kitchen/index.t.html @@ -338,7 +338,7 @@ look up your public key.

Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any +bold;">You should never share your private key with anyone, under any circumstances.

In addition to encryption and decryption, you can also use these keys to @@ -475,7 +475,10 @@ provide good guides for setting up a secure subkey configuration.

In your email program's menu, select Enigmail → Key Management.

-

Right click on your key and select Upload Public Keys to Keyserver. You don't have to use the default keyserver. If, after research, you would like to change to a different default keyserver, you can change that setting manually in the Enigmail preferences.

+

Right click on your key and select Upload Public Keys to Keyserver. You +don't have to use the default keyserver. If, after research, you would like +to change to a different default keyserver, you can change that setting +manually in the Enigmail preferences.

Now someone who wants to send you an encrypted message can download your public key from the Internet. There are multiple keyservers @@ -720,20 +723,12 @@ HTML. Instead, you can render the message body as plain text.

Step 3.c Receive a response

When Edward receives your email, he will use his private key to decrypt -it, then use your public key (which you sent him in Step -3.A) to encrypt his reply to you.

+it, then reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the Use it Well section of this guide.

-

When you receive Edward's email and open it, Enigmail will automatically -detect that it is encrypted with your public key, and then it will use your -private key to decrypt it.

- -

Notice the bar that Enigmail shows you above the message, with information -about the status of Edward's key.

- @@ -772,9 +767,9 @@ be encrypted, signed, both, or neither.

Step 3.e Receive a response

-

When Edward receives your email, he will use your public key (which you -sent him in Step 3.A) to verify that your signature -is authentic and the message you sent has not been tampered with.

+

When Edward receives your email, he will use your public key (which +you sent him in Step 3.A) to verify the message +you sent has not been tampered with and to encrypt his reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the +

When you receive Edward's email and open it, Enigmail will +automatically detect that it is encrypted with your public key, and +then it will use your private key to decrypt it.

+ +

Notice the bar that Enigmail shows you above the message, with +information about the status of Edward's key.

+ diff --git a/en/mac.html b/en/mac.html index 02b9b149..ef5eecfd 100644 --- a/en/mac.html +++ b/en/mac.html @@ -294,7 +294,7 @@ look up your public key.

Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any +bold;">You should never share your private key with anyone, under any circumstances.

In addition to encryption and decryption, you can also use these keys to @@ -424,7 +424,10 @@ provide good guides for setting up a secure subkey configuration.

In your email program's menu, select Enigmail → Key Management.

-

Right click on your key and select Upload Public Keys to Keyserver. You don't have to use the default keyserver. If, after research, you would like to change to a different default keyserver, you can change that setting manually in the Enigmail preferences.

+

Right click on your key and select Upload Public Keys to Keyserver. You +don't have to use the default keyserver. If, after research, you would like +to change to a different default keyserver, you can change that setting +manually in the Enigmail preferences.

Now someone who wants to send you an encrypted message can download your public key from the Internet. There are multiple keyservers @@ -661,20 +664,12 @@ HTML. Instead, you can render the message body as plain text.

Step 3.c Receive a response

When Edward receives your email, he will use his private key to decrypt -it, then use your public key (which you sent him in Step -3.A) to encrypt his reply to you.

+it, then reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the Use it Well section of this guide.

-

When you receive Edward's email and open it, Enigmail will automatically -detect that it is encrypted with your public key, and then it will use your -private key to decrypt it.

- -

Notice the bar that Enigmail shows you above the message, with information -about the status of Edward's key.

- @@ -713,9 +708,9 @@ be encrypted, signed, both, or neither.

Step 3.e Receive a response

-

When Edward receives your email, he will use your public key (which you -sent him in Step 3.A) to verify that your signature -is authentic and the message you sent has not been tampered with.

+

When Edward receives your email, he will use your public key (which +you sent him in Step 3.A) to verify the message +you sent has not been tampered with and to encrypt his reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the +

When you receive Edward's email and open it, Enigmail will +automatically detect that it is encrypted with your public key, and +then it will use your private key to decrypt it.

+ +

Notice the bar that Enigmail shows you above the message, with +information about the status of Edward's key.

+ diff --git a/en/windows.html b/en/windows.html index 72ce19a4..6a4694d5 100644 --- a/en/windows.html +++ b/en/windows.html @@ -294,7 +294,7 @@ look up your public key.

Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any +bold;">You should never share your private key with anyone, under any circumstances.

In addition to encryption and decryption, you can also use these keys to @@ -424,7 +424,10 @@ provide good guides for setting up a secure subkey configuration.

In your email program's menu, select Enigmail → Key Management.

-

Right click on your key and select Upload Public Keys to Keyserver. You don't have to use the default keyserver. If, after research, you would like to change to a different default keyserver, you can change that setting manually in the Enigmail preferences.

+

Right click on your key and select Upload Public Keys to Keyserver. You +don't have to use the default keyserver. If, after research, you would like +to change to a different default keyserver, you can change that setting +manually in the Enigmail preferences.

Now someone who wants to send you an encrypted message can download your public key from the Internet. There are multiple keyservers @@ -661,20 +664,12 @@ HTML. Instead, you can render the message body as plain text.

Step 3.c Receive a response

When Edward receives your email, he will use his private key to decrypt -it, then use your public key (which you sent him in Step -3.A) to encrypt his reply to you.

+it, then reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the Use it Well section of this guide.

-

When you receive Edward's email and open it, Enigmail will automatically -detect that it is encrypted with your public key, and then it will use your -private key to decrypt it.

- -

Notice the bar that Enigmail shows you above the message, with information -about the status of Edward's key.

- @@ -713,9 +708,9 @@ be encrypted, signed, both, or neither.

Step 3.e Receive a response

-

When Edward receives your email, he will use your public key (which you -sent him in Step 3.A) to verify that your signature -is authentic and the message you sent has not been tampered with.

+

When Edward receives your email, he will use your public key (which +you sent him in Step 3.A) to verify the message +you sent has not been tampered with and to encrypt his reply to you.

It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the +

When you receive Edward's email and open it, Enigmail will +automatically detect that it is encrypted with your public key, and +then it will use your private key to decrypt it.

+ +

Notice the bar that Enigmail shows you above the message, with +information about the status of Edward's key.

+