From a60a6e3601ca7ea6de5472ef7ff6760770ec5d95 Mon Sep 17 00:00:00 2001 From: Zak Rogoff Date: Wed, 4 Jun 2014 23:57:19 -0400 Subject: [PATCH] Fixing a broken troubleshooting, and other stuff I dont' remember because my brain is asleep. --- index.html | 15 +++++++-------- mac.html | 15 +++++++-------- windows.html | 15 +++++++-------- 3 files changed, 21 insertions(+), 24 deletions(-) diff --git a/index.html b/index.html index 2887bad..f1ad762 100644 --- a/index.html +++ b/index.html @@ -108,8 +108,8 @@
What's a wizard?
A wizard is a series of windows that pop up to make it easy to get something done on a computer, like installing a program. You click through it, selecting options as you go.
-
My email program can't find my account or isn't downloading my mail?
-
Before Googling, we recommend you start by asking other people who use your email system, to figure out the correct settings.
+
My email program can't find my account or isn't downloading my mail
+
Before searching the Web, we recommend you start by asking other people who use your email system, to figure out the correct settings.
@@ -205,8 +205,7 @@
The progress bar never finishes
Close the upload popup, make sure you are on the Internet and try again. If that doesn't work, try again, selecting a different keyserver.
-
Enigmail can't find Adele's key
-
Close the pop-ups that have appeared since you clicked. Make sure you are connected to the Internet and try again. If that doesn't work, repeat the process, choosing a different keyserver when it asks you to pick one.
+ @@ -227,7 +226,7 @@

#3 Try it out!

-

Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption. You'd follow the same steps if communicating with a real person. Then you'll send your first signed email to a real person!

+

Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption.

@@ -309,11 +308,11 @@

#4 Learn the Web of Trust

-

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friends name, creating keys to go with it and impersonating your friend.

+

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friend's name, creating keys to go with it and impersonating your friend.

That's why the programmers that developed email encryption created keysigning and the Web of Trust. When you sign someone's key, you are publicly saying that you trust that it does belong to them and not an impostor.

-

People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant Web. The more signatures a key has, and the more signatures it's signers' keys have, the more trustworthy that key is.

+

People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant Web. The more signatures a key has, and the more signatures its signers' keys have, the more trustworthy that key is.

People's public keys are usually identified by their key ID, which is a short string of digits like 9G6E29F7. You may also see them referred to by their key fingerprint, which is a slightly longer string of digits often prefaced with 0x, like 0x2C1008316F3E89B7.

@@ -347,7 +346,7 @@

Important: check people's identification before signing their keys

-

Before signing a real person's key, always make sure it actually belongs to them, and answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?". The only way to truly make sure it belongs to them is to talk to them in person or on the phone, and have them give you identifying information (like a government ID), along with their key ID.

+

Before signing a real person's key, always make sure it actually belongs to them, and they are who they say they are. Answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?".

diff --git a/mac.html b/mac.html index 522681e..471b90f 100644 --- a/mac.html +++ b/mac.html @@ -106,8 +106,8 @@
What's a wizard?
A wizard is a series of windows that pop up to make it easy to get something done on a computer, like installing a program. You click through it, selecting options as you go.
-
My email program can't find my account or isn't downloading my mail?
-
Before Googling, we recommend you start by asking other people who use your email system, to figure out the correct settings.
+
My email program can't find my account or isn't downloading my mail
+
Before searching the Web, we recommend you start by asking other people who use your email system, to figure out the correct settings.
@@ -203,8 +203,7 @@
The progress bar never finishes
Close the upload popup, make sure you are on the Internet and try again. If that doesn't work, try again, selecting a different keyserver.
-
Enigmail can't find Adele's key
-
Close the pop-ups that have appeared since you clicked. Make sure you are connected to the Internet and try again. If that doesn't work, repeat the process, choosing a different keyserver when it asks you to pick one.
+ @@ -225,7 +224,7 @@

#3 Try it out!

-

Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption. You'd follow the same steps if communicating with a real person. Then you'll send your first signed email to a real person!

+

Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption.

@@ -307,11 +306,11 @@

#4 Learn the Web of Trust

-

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friends name, creating keys to go with it and impersonating your friend.

+

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friend's name, creating keys to go with it and impersonating your friend.

That's why the programmers that developed email encryption created keysigning and the Web of Trust. When you sign someone's key, you are publicly saying that you trust that it does belong to them and not an impostor.

-

People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant Web. The more signatures a key has, and the more signatures it's signers' keys have, the more trustworthy that key is.

+

People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant Web. The more signatures a key has, and the more signatures its signers' keys have, the more trustworthy that key is.

People's public keys are usually identified by their key ID, which is a short string of digits like 9G6E29F7. You may also see them referred to by their key fingerprint, which is a slightly longer string of digits often prefaced with 0x, like 0x2C1008316F3E89B7.

@@ -345,7 +344,7 @@

Important: check people's identification before signing their keys

-

Before signing a real person's key, always make sure it actually belongs to them, and answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?". The only way to truly make sure it belongs to them is to talk to them in person or on the phone, and have them give you identifying information (like a government ID), along with their key ID.

+

Before signing a real person's key, always make sure it actually belongs to them, and they are who they say they are. Answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?".

diff --git a/windows.html b/windows.html index bf5aeb2..1e392e1 100644 --- a/windows.html +++ b/windows.html @@ -105,8 +105,8 @@
What's a wizard?
A wizard is a series of windows that pop up to make it easy to get something done on a computer, like installing a program. You click through it, selecting options as you go.
-
My email program can't find my account or isn't downloading my mail?
-
Before Googling, we recommend you start by asking other people who use your email system, to figure out the correct settings.
+
My email program can't find my account or isn't downloading my mail
+
Before searching the Web, we recommend you start by asking other people who use your email system, to figure out the correct settings.
@@ -202,8 +202,7 @@
The progress bar never finishes
Close the upload popup, make sure you are on the Internet and try again. If that doesn't work, try again, selecting a different keyserver.
-
Enigmail can't find Adele's key
-
Close the pop-ups that have appeared since you clicked. Make sure you are connected to the Internet and try again. If that doesn't work, repeat the process, choosing a different keyserver when it asks you to pick one.
+ @@ -224,7 +223,7 @@

#3 Try it out!

-

Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption. You'd follow the same steps if communicating with a real person. Then you'll send your first signed email to a real person!

+

Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption.

@@ -306,11 +305,11 @@

#4 Learn the Web of Trust

-

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friends name, creating keys to go with it and impersonating your friend.

+

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's public key is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friend's name, creating keys to go with it and impersonating your friend.

That's why the programmers that developed email encryption created keysigning and the Web of Trust. When you sign someone's key, you are publicly saying that you trust that it does belong to them and not an impostor.

-

People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant Web. The more signatures a key has, and the more signatures it's signers' keys have, the more trustworthy that key is.

+

People who use your public key can see the number of signatures it has. Once you've used GnuPG for a long time, you may have hundreds of signatures. The Web of Trust is the constellation of GnuPG users, connected to each other by chains of trust expressed through signatures, into a giant Web. The more signatures a key has, and the more signatures its signers' keys have, the more trustworthy that key is.

People's public keys are usually identified by their key ID, which is a short string of digits like 9G6E29F7. You may also see them referred to by their key fingerprint, which is a slightly longer string of digits often prefaced with 0x, like 0x2C1008316F3E89B7.

@@ -344,7 +343,7 @@

Important: check people's identification before signing their keys

-

Before signing a real person's key, always make sure it actually belongs to them, and answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?". The only way to truly make sure it belongs to them is to talk to them in person or on the phone, and have them give you identifying information (like a government ID), along with their key ID.

+

Before signing a real person's key, always make sure it actually belongs to them, and they are who they say they are. Answer honestly in the window that pops up and asks "How carefully have you verified that the key you are about to sign actually belongs to the person(s) named above?".

-- 2.25.1