From 9197724d355e90e0a019bd4101b5cecc11975fee Mon Sep 17 00:00:00 2001 From: Molly de Blanc Date: Wed, 19 Jul 2017 12:20:52 -0400 Subject: [PATCH] modified en/index.html for test. --- en/index.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/en/index.html b/en/index.html index ab1dbfc..223ee9d 100644 --- a/en/index.html +++ b/en/index.html @@ -37,7 +37,7 @@
  • português do Brasil - v3.0
  • română - v3.0
  • русский - v4.0
  • -
  • Shqip - v3.0
  • +
  • Shqip - v4.0
  • svenska - v4.0
  • Türkçe - v4.0
  • Translate!
  • @@ -95,7 +95,7 @@

    - View & share our infographic →Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure a surveillance agent or thief intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.

    + View & share our infographic →Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambled to make sure anyone, including a surveillance agent or thief, intercepting your email can't read them. All you need is a computer with an Internet connection, an email account, and about forty minutes.

    Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that whistleblowers use to protect their identities while shining light on human rights abuses, corruption and other crimes.

    @@ -187,7 +187,7 @@

    Your public key isn't like a physical key, because it's stored in the open in an online directory called a keyserver. People download it and use it, along with GnuPG, to encrypt emails they send to you. You can think of the keyserver as a phonebook; people who want to send you encrypted email can look up your public key.

    -

    Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share your private key with anyone, under any circumstances.

    +

    Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any circumstances.

    In addition to encryption and decryption, you can also use these keys to sign messages and check the authenticity of other people's signatures. We'll discuss this more in the next section.

    @@ -668,6 +668,6 @@ try { - + -- 2.25.1