From 1aa64d21409a724841ef689a893822ba1cdefa17 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Th=C3=A9r=C3=A8se=20Godefroy?= Date: Wed, 4 Aug 2021 14:52:43 +0200 Subject: [PATCH] en/index: add a left margin to right-floating images. --- en/index.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/en/index.html b/en/index.html index 0d8f59a9..5c5a9171 100644 --- a/en/index.html +++ b/en/index.html @@ -256,7 +256,7 @@ is the program that implements the standard. Most email programs provide an inte

#2 Make your keys

-

A robot with a head shaped like a key holding a private and a public key

+

A robot with a head shaped like a key holding a private and a public key

To use the GnuPG system, you'll need a public key and a private key (known together as a keypair). Each is a long string of randomly generated numbers @@ -560,7 +560,7 @@ page.

#4 Try it out!

-

Illustration of a person in a house with a cat connected to a server

+

Illustration of a person in a house with a cat connected to a server

Now you'll try a test correspondence with an FSF computer program named Edward, who knows how to use encryption. Except where noted, these are the same steps you'd follow when corresponding with a real, live person.

@@ -809,7 +809,7 @@ then it will use your private key to decrypt it.

#5 Learn about the Web of Trust

-

Illustration of keys all interconnected with a web of lines

+

Illustration of keys all interconnected with a web of lines

Email encryption is a powerful technology, but it has a weakness: it requires a way to verify that a person's public key is actually -- 2.25.1