From 86d380b3b6cbae390145974245c17b166c2e9fad Mon Sep 17 00:00:00 2001 From: =?utf8?q?Th=C3=A9r=C3=A8se=20Godefroy?= Date: Wed, 27 Sep 2017 09:45:07 +0200 Subject: [PATCH] ml: fix links to images. --- ml/confirmation.html | 2 +- ml/index.html | 22 +++++++++++----------- ml/infographic.html | 2 +- ml/mac.html | 22 +++++++++++----------- ml/next_steps.html | 6 +++--- ml/windows.html | 24 ++++++++++++------------ 6 files changed, 39 insertions(+), 39 deletions(-) diff --git a/ml/confirmation.html b/ml/confirmation.html index f95d6e15..67279f91 100644 --- a/ml/confirmation.html +++ b/ml/confirmation.html @@ -26,7 +26,7 @@

If you don't receive the confirmation link, send us an email at info@fsf.org to be added manually.

-

Try it out.


+

Try it out.


Join us on microblogging services for day-to-day updates:

diff --git a/ml/index.html b/ml/index.html index 88d53829..d39958c3 100644 --- a/ml/index.html +++ b/ml/index.html @@ -91,14 +91,14 @@

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → സമൂഹ നിരീക്ഷണം സഅഭിപ്രായ സ്വാതന്ത്ര്യത്തിന്റെ വിനിയോഗത്തെ അപകടകരമാക്കുന്നതിനോടൊപ്പം നമ്മുടെ മൗലിക അവകാശങ്ങൾക്ക് മേലുള്ള കടന്നു കയറ്റവും കൂടിയാണ്. . ഈ മാര്‍ഗ്ഗദര്‍ശി നിങ്ങളെ നിങ്ങളെ നിരീക്ഷണത്തെ നേരിടുന്നതിനുള്ള ഒരടിസ്ഥാന വിദ്യ പഠിപ്പിക്കും: ഇമെയിൽ എൻക്രിപ്ഷൻ. ഈ മാര്ഗ്ഗദർശി നിങ്ങളെ ഇമെയിൽ സന്ദേശങ്ങൾ ഒരു രഹസ്യഭാഷയിൽ അയക്കാനും സ്വീകരിക്കാനും പ്രാപ്തരാക്കും. അതിനാൽ നിങ്ങളുടെ സന്ദേശങ്ങൾ ഒരു നിരീക്ഷകന്റെയോ മോഷടാവിന്റെയോ കയ്യിലകപ്പെട്ടലും അവര്ക്ക് വായിച്ചു മനസ്സിലാക്കാൻ സാധിക്കില്ല. ഇതിനായി നിങ്ങള്ക്ക് ആകെ വേണ്ടത് ഇന്റർനെറ്റ്‌ സേവനം ഉള്ള ഒരു കമ്പ്യൂട്ടറും ഒരു ഇമെയിൽ അക്കൗണ്ടും പിന്നെ ഏകദേശം അര മണിക്കൂറും മാത്രമാണ്.

@@ -127,7 +127,7 @@

പടി 1.എ നിങ്ങളുടെ ഇമെയിൽ പ്രോഗ്രാം നിങ്ങളുടെ ഇമെയിൽ ഉപയോഗിക്കാൻ തയ്യാറാക്കുക (മുന്പേതന്നെ അങ്ങനെ ചെയ്തിട്ടില്ലെങ്കിൽ)

@@ -153,9 +153,9 @@
@@ -194,7 +194,7 @@

സ്ടെപ് 2.a കീപേര്‍ ഉണ്ടാക്കൂ

@@ -269,7 +269,7 @@

Step 3.a Send Adele your public key

@@ -361,7 +361,7 @@

Step 4.a Sign a key

@@ -407,7 +407,7 @@

When should I encrypt?

@@ -422,7 +422,7 @@

Important: Be wary of invalid keys

diff --git a/ml/infographic.html b/ml/infographic.html index 9e1111fc..b17b095e 100644 --- a/ml/infographic.html +++ b/ml/infographic.html @@ -22,7 +22,7 @@

← Read the full guide

Share our infographic with the hashtag #EmailSelfDefense

-

View & share our infographic

+

View & share our infographic

Download the source files for the infographic

← Read the full guide

diff --git a/ml/mac.html b/ml/mac.html index 65a79bae..e07491fe 100644 --- a/ml/mac.html +++ b/ml/mac.html @@ -70,14 +70,14 @@

Free Software Foundation

We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.

We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal?

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -103,7 +103,7 @@

Step 1.a Set your email program up with your email account (if it isn't already)

@@ -140,9 +140,9 @@
@@ -181,7 +181,7 @@

Step 2.a Make a keypair

@@ -253,7 +253,7 @@

Step 3.a Send Adele your public key

@@ -345,7 +345,7 @@

Step 4.a Sign a key

@@ -391,7 +391,7 @@

When should I encrypt?

@@ -406,7 +406,7 @@

Important: Be wary of invalid keys

diff --git a/ml/next_steps.html b/ml/next_steps.html index 5769a949..c2d9d6da 100644 --- a/ml/next_steps.html +++ b/ml/next_steps.html @@ -40,7 +40,7 @@

Join the movement

@@ -102,7 +102,7 @@

Make Email Self-Defense tools even better

@@ -110,7 +110,7 @@

If you like programming, you can contribute code to GnuPG or Enigmail.

-

To go the extra mile, support the Free Software Foundation so we can promote Email Self-Defense as heavily as possible, and make more tools like it.

Donate Join now

+

To go the extra mile, support the Free Software Foundation so we can promote Email Self-Defense as heavily as possible, and make more tools like it.

Donate Join now


diff --git a/ml/windows.html b/ml/windows.html index a081b2f4..47810dff 100644 --- a/ml/windows.html +++ b/ml/windows.html @@ -68,17 +68,17 @@
-

Free Software Foundation

+

Free Software Foundation

We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.

We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal?

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure that a surveillance agent or thief that intercepts your email can't read it. All you need is a computer with an Internet connection, an email account and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -103,7 +103,7 @@

Step 1.a Set your email program up with your email account (if it isn't already)

@@ -139,9 +139,9 @@
@@ -180,7 +180,7 @@

Step 2.a Make a keypair

@@ -251,7 +251,7 @@

Step 3.a Send Adele your public key

@@ -343,7 +343,7 @@

Step 4.a Sign a key

@@ -389,7 +389,7 @@

When should I encrypt?

@@ -404,7 +404,7 @@

Important: Be wary of invalid keys

-- 2.25.1