From bb90b12aad6908c769cf961f93c813765fe18dce Mon Sep 17 00:00:00 2001 From: Zak Rogoff Date: Thu, 27 Aug 2015 17:24:48 -0400 Subject: [PATCH] Tweaking intro to remove Snowden reference. --- en/index.html | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/en/index.html b/en/index.html index 436550f..79e5a22 100644 --- a/en/index.html +++ b/en/index.html @@ -91,12 +91,11 @@

- View & share our infographic → - Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambed to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, about forty minutes and five dice (optional, but recommended).

+ View & share our infographic →Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are scrambed to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, about forty minutes and five dice (optional, but recommended).

-

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

+

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that whistleblowers use to protect their identities while shining light on human rights abuses and government corruption.

-

In addition to using encryption, standing up to surveillance requires fighting politically for a reduction in the amount of data collected on us, but the essential first step is to protect yourself and make surveillance of your communication as difficult as possible. This guide helps you do that. If you're just starting out, don't worry about reading the "advanced" tips; they're completely non-essential to getting you up and running. Let's get started!

+

In addition to using encryption, standing up to surveillance requires fighting politically for a reduction in the amount of data collected on us, but the essential first step is to protect yourself and make surveillance of your communication as difficult as possible. This guide helps you do that. It is designed for beginners, but if you already know the basics of GnuPG or are an experienced free software user, you'll enjoy the advanced tips.

-- 2.25.1