From 4898ee76cbb661d9a9efad609d31abb8b33c658a Mon Sep 17 00:00:00 2001 From: =?utf8?q?Th=C3=A9r=C3=A8se=20Godefroy?= Date: Sat, 21 Jun 2014 16:13:08 +0200 Subject: [PATCH] Update English originals to Version 2 --- fr/confirmation.html | 7 ++++--- fr/index.html | 47 ++++++++++++++++++++++---------------------- fr/infographic.html | 9 ++++----- fr/mac.html | 2 +- fr/next_steps.html | 21 +++++++++++++------- fr/windows.html | 47 ++++++++++++++++++++++---------------------- static | 2 +- 7 files changed, 72 insertions(+), 63 deletions(-) diff --git a/fr/confirmation.html b/fr/confirmation.html index 81f4ff59..810487c7 100644 --- a/fr/confirmation.html +++ b/fr/confirmation.html @@ -24,7 +24,7 @@

If you don't receive the confirmation link, send us an email at info@fsf.org to be added manually.

-

Try it out.


+

Try it out.


Join us on microblogging services for day-to-day updates:

GNU Social | Pump.io | Twitter

@@ -40,9 +40,9 @@ -

Donate Join now

+

Donate Join now

- View & share our infographic → - Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

+ View & share our infographic → + Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -98,17 +98,17 @@

#1 Get the pieces

This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). Learn more about free software at fsf.org.

-

Most GNU/Linux operating systems come with GnuPG installed on them, so you don't have to download it. Before configuring GnuPG though, you'll need a desktop email program installed on your computer. Most GNU/Linux distributions have a free software version of the Thunderbird email program available to install. This guide will work with them, in addition to Thunderbird itself. Email programs are another way to access the same email accounts you can access in a browser (like GMail), but provide extra features.

+

Most GNU/Linux operating systems come with GnuPG installed on them, so you don't have to download it. Before configuring GnuPG though, you'll need a desktop email program installed on your computer. Most GNU/Linux distributions have a free software version of the Thunderbird email program available to install. This guide will work with them, in addition to Thunderbird itself. Email programs are another way to access the same email accounts you can access in a browser (like Gmail), but provide extra features.

If you are already have one of these, you can skip to Step 1.b.

-

Step 1.a Set your email program up with your email account (if it isn't already)

+

Step 1.a Setup your email program with your email account (if it isn't already)

Open your email program and follow the wizard that sets it up with your email account.

@@ -131,9 +131,9 @@
@@ -172,7 +172,7 @@

Step 2.a Make a keypair

@@ -212,7 +212,7 @@

Troubleshooting

The progress bar never finishes
-
Close the upload popup, make sure you are on the Internet and try again. If that doesn't work, try again, selecting a different keyserver.
+
Close the upload popup, make sure you are connected to the Internet, and try again. If that doesn't work, try again, selecting a different keyserver.
My key doesnt appear in the list
Try checking Show Default Keys.
@@ -247,7 +247,7 @@

Step 3.a Send Adele your public key

@@ -327,7 +327,7 @@

#4 Learn the Web of Trust

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friend's name, creating keys to go with it and impersonating your friend. That's why the free software programmers that developed email encryption created keysigning and the Web of Trust.

-

When you sign someone's key, you are publicly saying that you trust that it does belong to them and not an impostor. People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of all GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant network. The more signatures a key has, and the more signatures its signers' keys have, the more trustworthy that key is.

+

When you sign someone's key, you are publicly saying that you trust that it does belong to them and not an impostor. People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of all GnuPG users, connected to each other by chains of trust expressed through signatures, forming a giant network. The more signatures a key has, and the more signatures its signers' keys have, the more trustworthy that key is.

People's public keys are usually identified by their key fingerprint, which is a string of digits like DD878C06E8C2BEDDD4A440D3E573346992AB3FF7 (for Adele's key). You can see the fingerprint for your public key, and other public keys saved on your computer, by going to OpenPGP → Key Management in your email program's menu, then right clicking on the key and choosing Key Properties. It's good practice to share your fingerprint wherever you share your email address, so that so that people can double-check that they have the correct public key when they download yours from a keyserver.

@@ -339,14 +339,14 @@

Step 4.a Sign a key

In your email program's menu, go to OpenPGP → Key Management.

Right click on Adele's public key and select Sign Key from the context menu.

-

In the window that pops up, select "I will not answer" and click OK.

-

In your email program's menu, go to OpenPGP → Key Management → Keyserver → Upload Public Keys and hit OK.

+

In the window that pops up, select "I will not answer" and click ok.

+

In your email program's menu, go to OpenPGP → Key Management → Keyserver → Upload Public Keys and hit ok.

You've just effectively said "I trust that Adele's public key actually belongs to Adele." This doesn't mean much because Adele isn't a real person, but it's good practice.

@@ -385,12 +385,12 @@

When should I encrypt?

-

The more you can encrypt your messages, the better. This is because, if you only encrypt emails occasionally, each encrypted message could raise a red flag for surveillance systems. If all or most of your email is encrypted, people doing surveillance won't know where to start.

+

The more you can encrypt your messages, the better. If you only encrypt emails occasionally, each encrypted message could raise a red flag for surveillance systems. If all or most of your email is encrypted, people doing surveillance won't know where to start.

That's not to say that only encrypting some of your email isn't helpful -- it's a great start and it makes bulk surveillance more difficult.

@@ -400,7 +400,7 @@

Important: Be wary of invalid keys

@@ -414,8 +414,8 @@

Copy your revocation certificate to somewhere safe

-

Remember when you created your keys and saved the revocation certificate that GnuPG made? It's time to copy that certificate onto the safest digital storage that you have -- the ideal thing is a flash drive, disk or hard drive stored in a safe place in your home.

-

If your private key ever gets lost or stolen, you'll need this certificate file.

+

Remember when you created your keys and saved the revocation certificate that GnuPG made? It's time to copy that certificate onto the safest digital storage that you have -- the ideal thing is a flash drive, disk, or hard drive stored in a safe place in your home.

+

If your private key ever gets lost or stolen, you'll need this certificate file to let people know that you are no longer using that keypair.

@@ -485,9 +485,9 @@ @@ -32,7 +30,7 @@