From 915b8aa07761f4829cba12f07931a3401d2a95cb Mon Sep 17 00:00:00 2001 From: Adam Leibson Date: Mon, 17 Aug 2015 16:26:14 -0400 Subject: [PATCH] commit --- en/index.html | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/en/index.html b/en/index.html index 60adc62..509da9f 100644 --- a/en/index.html +++ b/en/index.html @@ -203,7 +203,8 @@
  • On the screen titled "Encryption," select "Encrypt all of my messages by default, because privacy is critical to me."
  • On the screen titled "Signing," select "Don't sign my messages by default."
  • On the screen titled "Key Selection," select "I want to create a new key pair for signing and encrypting my email."
  • -
  • On the screen titled "Create Key," pick a strong password! We recommend the Diceware method, which creates passwords which are both strong and memorable. To use the Diceware method, you will need the dice and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
  • +
  • On the screen titled "Create Key," pick a strong password! We recommend the Diceware method, which creates passwords which are both strong and memorable. To use the Diceware method, you will need the dice and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password. Diceware passwords are hard to remember until you've typed it in a handful of times. Write down down your password and keep it with you at all times until you've got it memorized. Then, destroy the piece of paper. If you lose the piece of paper, you will still be able to revoke your key with your revocation certificate (which we'll talk about in just a minute).
  • +
  • If you don't have dice, pick a password which is at least 12 characters long, and includes at least one lower case and upper case letter and at least one number or punctuation symbol. Don't forget your password, or all of this work will be wasted!

    The program will take a little while to finish the next step, the "Key Creation" screen. While you wait, do something else with your computer, like watching a movie or browsing the Web. The more you use the computer at this point, the faster the key creation will go.

    When the "Key Generation Completed" screen pops up, select Generate Certificate and choose to save it in a safe place on your computer (we recommend making a folder called "Revocation Certificate" in your home folder and keeping it there). This step is essential for your email self-defense, as you'll learn more about in Section 5.

    @@ -232,10 +233,7 @@

    Advanced

    -
    Strong Passphrases with Diceware
    -
    Human-made passwords tend to either be very easy to guess, or difficult to memorise and easy to forget. Fortunately, if your privacy is more important to you than an extra 10 to 15 minutes of your time, you can use dice to come up with a password which is both strong and memorable using the 'Diceware' method.
    -
    To use the Diceware method, you will need dice (preferably 5, but 1 will do) and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
    Command line key generation
    If you prefer using the command line for a higher degree of control, you can follow the documentation from the GnuPG Mini Howto or The GNU Privacy Handbook. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than the algorithms recommended in the old previously mentioned documentation.
    -- 2.25.1