From 307aced3ce346405137f2f6f730bf25c7a873649 Mon Sep 17 00:00:00 2001 From: Zak Rogoff Date: Wed, 19 Aug 2015 15:44:41 -0400 Subject: [PATCH] Zak's final tweaks to the next steps page. --- en/next_steps.html | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/en/next_steps.html b/en/next_steps.html index c58b1bdf..724c87f3 100644 --- a/en/next_steps.html +++ b/en/next_steps.html @@ -83,9 +83,8 @@
-

Teach your friends

-

This is the single biggest thing you can do to promote email encryption.

-

Learn how to make GnuPG a breeze for your friends to set up, and help spread GnuPG.

+

Teach your friends with our workshop guide

+

Understanding and setting up email encryption sounds like a daunting task to many people. That's why helping your friends with GnuPG plays such an important role in helping spread encryption. Read Email Self-Defense's guide to leading workshops and put it to use!

@@ -123,8 +122,9 @@
-

Optional: Protect Your Privacy with Tor

-

The Onion Router (Tor) network wraps Internet communication in multiple layers of encryption and bounces it around the world several times. When used properly, Tor confuses surveillance field agents and the global surveillance apparatus alike. To have your email program send and receive email over Tor, install the Torbirdy plugin the same way you installed Enigmail, by searching for it through Add-ons.

+

Optional: Add more email protection with Tor

+

The Onion Router (Tor) network wraps Internet communication in multiple layers of encryption and bounces it around the world several times. When used properly, Tor confuses surveillance field agents and the global surveillance apparatus alike. Using it simultaneously with GnuPG's encryption will give you the best results.

+

To have your email program send and receive email over Tor, install the Torbirdy plugin the same way you installed Enigmail, by searching for it through Add-ons.

Before beginning to check your email over Tor, make sure you understand the security tradeoffs involved. This infographic demonstrates how Tor keeps you secure.

-- 2.25.1