From 9dc524dcefcde2f1cdb61433ff1262edc466366d Mon Sep 17 00:00:00 2001 From: Zak Rogoff Date: Wed, 9 Dec 2015 16:42:30 -0500 Subject: [PATCH] Fixing broken links in index.html. --- en/index.html | 102 +++++++++++++++++++++++++------------------------- 1 file changed, 51 insertions(+), 51 deletions(-) diff --git a/en/index.html b/en/index.html index 88b04d9..07ecb16 100644 --- a/en/index.html +++ b/en/index.html @@ -8,8 +8,8 @@ - - + + @@ -18,7 +18,7 @@ @@ -32,19 +32,19 @@ @@ -59,15 +59,15 @@ Windows
  • - + Share  -   -   -   -
  • @@ -75,22 +75,22 @@
    -

    Free Software Foundation

    +

    Free Software Foundation

    We fight for computer users' rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.

    We want to translate this guide into more languages, and make a version for encryption on mobile devices. Please donate, and help people around the world take the first step towards protecting their privacy with free software.

    -

    Donate

    +

    Donate

    - View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, and about half an hour.

    Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

    -

    In addition to using encryption, standing up to surveillance requires fighting politically for a reduction in the amount of data collected on us, but the essential first step is to protect yourself and make surveillance of your communication as difficult as possible. Let's get started!

    +

    In addition to using encryption, standing up to surveillance requires fighting politically for a reduction in the amount of data collected on us, but the essential first step is to protect yourself and make surveillance of your communication as difficult as possible. Let's get started!

    @@ -103,7 +103,7 @@

    #1 Get the pieces

    -

    This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). To defend your freedom as well as protect yourself from surveillance, we recommend you switch to a free software operating system like GNU/Linux. Learn more about free software at fsf.org.

    +

    This guide relies on software which is freely licensed; it's completely transparent and anyone can copy it or make their own version. This makes it safer from surveillance than proprietary software (like Windows). To defend your freedom as well as protect yourself from surveillance, we recommend you switch to a free software operating system like GNU/Linux. Learn more about free software at fsf.org.

    To get started, you'll need the IceDove desktop email program installed on your computer. For your system, IceDove may be known by the alternate name "Thunderbird." Email programs are another way to access the same email accounts you can access in a browser (like Gmail), but provide extra features.

    If you already have an email program, you can skip to Step 1.b.

    @@ -111,7 +111,7 @@

    Step 1.a Setup your email program with your email account

    @@ -126,7 +126,7 @@
    The wizard can't find my account or isn't downloading my mail
    Before searching the Web, we recommend you start by asking other people who use your email system, to figure out the correct settings.
    - +
    @@ -138,7 +138,7 @@

    Step 1.b Get GnuPG by downloading GPG4Win

    -

    GPG4Win is a software package that includes GnuPG. Download and install it, choosing default options whenever asked. After it's installed, you can close any windows that it creates.

    +

    GPG4Win is a software package that includes GnuPG. Download and install it, choosing default options whenever asked. After it's installed, you can close any windows that it creates.

    @@ -147,9 +147,9 @@
    @@ -164,7 +164,7 @@
    In many new email programs, the main menu is represented by an image of three stacked horizontal bars.
    - +
    @@ -188,7 +188,7 @@

    Step 2.a Make a keypair

    @@ -210,7 +210,7 @@
    In many new email programs, the main menu is represented by an image of three stacked horizontal bars. Enigmail may be inside a section called Tools.
    - +
    @@ -233,7 +233,7 @@
    Try checking "Display All Keys by Default."
    Don't see a solution to your problem?
    -
    Please let us know on the feedback page.
    +
    Please let us know on the feedback page.
    @@ -266,7 +266,7 @@

    Step 3.a Send Edward your public key

    @@ -303,7 +303,7 @@
    Enigmail can't find Edward's key
    Close the pop-ups that have appeared since you clicked Send. Make sure you are connected to the Internet and try again. If that doesn't work, repeat the process, choosing a different keyserver when it asks you to pick one.
    - +
    @@ -364,7 +364,7 @@

    Step 4.a Sign a key

    @@ -411,7 +411,7 @@

    When should I encrypt?

    @@ -426,7 +426,7 @@

    Important: Be wary of invalid keys

    @@ -449,7 +449,7 @@

    Important: act swiftly if someone gets your private key

    -

    If you lose your private key or someone else gets ahold of it (say, by stealing or cracking your computer), it's important to revoke it immediately before someone else uses it to read your encrypted email. This guide doesn't cover how to revoke a key, but you can follow the instructions on the GnuPG site. After you're done revoking, send an email to everyone with whom you usually use your key to make sure they know.

    +

    If you lose your private key or someone else gets ahold of it (say, by stealing or cracking your computer), it's important to revoke it immediately before someone else uses it to read your encrypted email. This guide doesn't cover how to revoke a key, but you can follow the instructions on the GnuPG site. After you're done revoking, send an email to everyone with whom you usually use your key to make sure they know.

    @@ -459,7 +459,7 @@

    Make your public key part of your online identity

    First add your public key fingerprint to your email signature, then compose an email to at least five of your friends, telling them you just set up GnuPG and mentioning your public key fingerprint. Link to this guide and ask them to join you. Don't forget that there's also an awesome infographic to share.

    -

    Start writing your public key fingerprint anywhere someone would see your email address: your social media profiles, blog, Website, or business card. (At the Free Software Foundation, we put ours on our staff page.) We need to get our culture to the point that we feel like something is missing when we see an email address without a public key fingerprint.

    +

    Start writing your public key fingerprint anywhere someone would see your email address: your social media profiles, blog, Website, or business card. (At the Free Software Foundation, we put ours on our staff page.) We need to get our culture to the point that we feel like something is missing when we see an email address without a public key fingerprint.

    @@ -509,26 +509,26 @@ - - + +