From 367b6cecca594ee19ed1d47655195c08dd9b9570 Mon Sep 17 00:00:00 2001 From: Adam Leibson Date: Tue, 18 Aug 2015 16:36:26 -0400 Subject: [PATCH] commit --- en/workshops.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/en/workshops.html b/en/workshops.html index 3dd7fb0..2b9c054 100644 --- a/en/workshops.html +++ b/en/workshops.html @@ -116,7 +116,7 @@ step towards protecting their privacy with free software.

Step 1.a Strength in numbers

-

Make sure all the participants have a conceptual understanding of the relationship between public and private keys in a keypair. It's normal for people to not understand public-key cryptography on the first try. Use analogies to help explain the concept.

+

Each person who chooses to resist mass surveillance with encryption makes it easier for others to resist as well. People normalizing the use of strong cryptography has multiple powerful effects: It means those that truly need it, like potential whistle-blowers and activists, are more likely to learn about it. More people using it for more things also makes it harder for surveillance systems to single out those that can't afford to be found, and shows solidarity with those people.

-- 2.25.1