From 0fe6e02e5a1721f0a03a5b25cf9bd0cec429e4ce Mon Sep 17 00:00:00 2001 From: Zak Rogoff Date: Wed, 4 Jun 2014 22:46:46 -0400 Subject: [PATCH] Editing intro section and commenting out key ide in index. --- index.html | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/index.html b/index.html index 76b44960..13f6fca4 100644 --- a/index.html +++ b/index.html @@ -67,9 +67,13 @@

View & share our infographic →

-

Bulk surveillance violates our fundamental rights and makes free speech risky. But we're far from helpless to do something about it. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief can't intercept your email and read it.

+

Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief can't intercept your email and read it.

+ +

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

+ -

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org.

+ +

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org.

Let's get started!

@@ -325,7 +329,7 @@

You've just effectively said "I trust that Adele's public key actually belongs to Adele." This doesn't mean much because Adele isn't a real person, but it's good practice.

-
+