From 290788d5dc9a2ceedd7896042111715597118bdc Mon Sep 17 00:00:00 2001 From: =?utf8?q?Th=C3=A9r=C3=A8se=20Godefroy?= Date: Wed, 27 Sep 2017 12:08:13 +0200 Subject: [PATCH] ml: more typos. --- ml/windows.html | 44 ++++++++++++++++++++++---------------------- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/ml/windows.html b/ml/windows.html index f3340b4a..e9eb9208 100644 --- a/ml/windows.html +++ b/ml/windows.html @@ -8,8 +8,8 @@ - - + + @@ -54,13 +54,13 @@
  • Share  -   -   -   -
  • @@ -68,17 +68,17 @@
    -

    Free Software Foundation

    +

    Free Software Foundation

    We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.

    We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal?

    -

    Donate Join now

    +

    Donate Join now

    - View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

    Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

    @@ -103,7 +103,7 @@

    Step 1.a Set your email program up with your email account (if it isn't already)

    @@ -139,9 +139,9 @@
    @@ -180,7 +180,7 @@

    Step 2.a Make a keypair

    @@ -251,7 +251,7 @@

    Step 3.a Send Adele your public key

    @@ -343,7 +343,7 @@

    Step 4.a Sign a key

    @@ -389,7 +389,7 @@

    When should I encrypt?

    @@ -404,7 +404,7 @@

    Important: Be wary of invalid keys

    @@ -485,7 +485,7 @@ - - + +