Bulk surveillance violates our fundamental rights and makes free speech
risky. This guide will teach you a basic surveillance self-defense skill: email
@@ -569,7 +569,7 @@ href="#section2">Step 2.
@@ -676,7 +676,7 @@ is the program that implements the standard. Most email programs provide an inte
#2 Make your keys
-
+
To use the GnuPG system, you'll need a public key and a private key (known
together as a keypair). Each is a long string of randomly generated numbers
@@ -705,11 +705,11 @@ discuss this more in the next section.
@@ -806,7 +806,7 @@ provide good guides for setting up a secure subkey configuration.
@@ -926,16 +926,16 @@ Because this is your key, you should choose
-
-
-
-
@@ -980,7 +980,7 @@ page.
#4 Try it out!
-
+
Now you'll try a test correspondence with an FSF computer program named Edward,
who knows how to use encryption. Except where noted, these are the same
steps you'd follow when corresponding with a real, live person.
@@ -1032,12 +1032,12 @@ before using your private key to decrypt it.
@@ -1145,7 +1145,7 @@ Text.
@@ -1230,7 +1230,7 @@ then it will use your private key to decrypt it.
#5 Learn the Web of Trust
-
+
Email encryption is a powerful technology, but it has a weakness;
it requires a way to verify that a person's public key is actually
@@ -1260,7 +1260,7 @@ connected to each other by chains of trust expressed through signatures.
@@ -1377,7 +1377,7 @@ and damage the Web of Trust.
@@ -1409,7 +1409,7 @@ nice to also include a link to this guide in your standard email signature
@@ -1549,7 +1549,7 @@ default program and I don't want it to be.