From 1a7754f47e9efbb51a7e15c4853feb8cb5eb47c3 Mon Sep 17 00:00:00 2001 From: Ana Isabel Carvalho Date: Wed, 4 Jun 2014 22:37:51 +0100 Subject: [PATCH] Fixed internal link for step 1.b. Added illustration for step 2.A. Replaced -> with → --- index.html | 12 ++++++------ static | 2 +- 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/index.html b/index.html index 43569d3..34ddba5 100644 --- a/index.html +++ b/index.html @@ -42,7 +42,7 @@

The goal of this guide is to make it easy to set up email encryption on your computer. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief can't intercept your email and read it.

-

All you need is a computer with an Internet connection, and email account and about half an hour. You can use your existing email account for this without affecting it.

+

All you need is a computer with an Internet connection, an email account and about half an hour. You can use your existing email account for this without affecting it.

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org.

@@ -147,16 +147,16 @@

Step 2.a Make a keypair

-

In your email program's menu, select OpenPGP -> Setup Wizard. You don't need to read the text in the window that pops up unless you'd like to, but it's good to read the text on the later screens of the wizard.

+

In your email program's menu, select OpenPGP → Setup Wizard. You don't need to read the text in the window that pops up unless you'd like to, but it's good to read the text on the later screens of the wizard.

On the second screen, titled "Signing," select "No, I want to create per-recipient rules for emails that need to be signed."

Use the default options until you reach the screen titled "Create Key".

On the screen titled "Create Key," pick a strong password! Your password should be at least 8 characters and include at least one lower case and upper case letter and at least one punctuation mark. Don't forget it, or all this work will be wasted!

The program will take a little while to finish the next step, the "Key Creation" screen. While you wait, do something else with your computer, like watching a movie or browsing the Web. The more you use the computer at this point, the faster the key creation will go.

-

When the OpenPGP Confirm screen pops up, select Generate Certificate and choose to save it in a safe place on your computer (we recommend making a folder called "Revocation Certificate" in your home folder and keeping it there. You'll learn more about the revocation certificate in Section 5. The setup wizard will ask you to move it onto an external device, but that isn't necessary at this moment.

+

When the OpenPGP Confirm screen pops up, select Generate Certificate and choose to save it in a safe place on your computer (we recommend making a folder called "Revocation Certificate" in your home folder and keeping it there. You'll learn more about the revocation certificate in Section 5. The setup wizard will ask you to move it onto an external device, but that isn't necessary at this moment.

After creating your key, the Enigmail set-up wizard automatically uploaded it to a keyserver, an online computer that makes everyone's keys available through the Internet.

@@ -279,10 +279,10 @@

Step 4.a Sign a key

-

In your email program's menu, go to OpenPGP -> Key Management.

+

In your email program's menu, go to OpenPGP → Key Management.

Right click on Adele's public key and select Sign Key from the context menu.

In the window that pops up, select "I will not answer" and click OK.

-

In your email program's menu, go to OpenPGP -> Key Management -> Keyserver -> Upload Public Keys and hit OK.

+

In your email program's menu, go to OpenPGP → Key Management → Keyserver → Upload Public Keys and hit OK.

You've just effectively said "I trust that Adele's public key actually belongs to Adele." This doesn't mean much because Adele isn't a real person. Before signing a real person's key, always make sure it actually belongs to them, and answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?".

It's important to take keysigning seriously because it will affect people beyond just you and the person who's key you are signing. If someone doubts that a key actually belongs to the person that is says it does, they can go on a keyserver and see the number of signatures that it has. The more it has, the more they are likely to trust it.

The Web of Trust takes this concept to the next level. It is a network of key signatures that is saved in keyservers on the Internet. It builds chains of trust between individuals that do not know each other by passing through others, a bit like the famous "six degrees of separation" game. You don't need to understand it in detail to use email encryption, but it will become a powerful tool if you become an advanced user.

diff --git a/static b/static index e595817..e115212 160000 --- a/static +++ b/static @@ -1 +1 @@ -Subproject commit e5958174f556a59788f8b848912afe516f3a47e3 +Subproject commit e115212ff168b1ef7faef3511055108f7e292952 -- 2.25.1