From dbd3bf12aeda15e105a402481a3055ced38cb571 Mon Sep 17 00:00:00 2001 From: Ana Isabel Carvalho Date: Sun, 1 Jun 2014 18:01:42 +0100 Subject: [PATCH] Removed in-between sections that didn't make sense (sematically) and created extra white space. --- index.html | 18 ++++-------------- 1 file changed, 4 insertions(+), 14 deletions(-) diff --git a/index.html b/index.html index b155d2df..c7edd331 100644 --- a/index.html +++ b/index.html @@ -57,8 +57,7 @@

An email program lets you read and write mail without using a Web browser, and provides special features that are hard to find in email systems you use in a Web browser. Using an email program doesn't mean that you have to make a new email account — most people just connect an existing email account from a Web email service (like GMail) or their workplace to their email program. You can think of it as another way to access the same email account.

- -
+
-
-
-
+ @@ -131,10 +127,7 @@

Now you'll try a test correspondence with a computer program named Adele, which knows how to use encryption. You'd follow the same steps if communicating with a real person. Then you'll send your first signed email to a real person!

-
-
-
-
+ @@ -172,10 +165,7 @@

Email encryption is a powerful technology, but it has a weakness; it requires a way to verify that a person's keypair is actually theirs. Otherwise, there would be no way to stop an attacker from making an email address with your friends name, creating a keypair to go with it and impersonating your friend. They would then be able to impersonate your friend by signing messages with the private key they'd created, and decrypt messages intended for your friend with the public key.

That's why the programmers that developed email encryption created keysigning and the Web of Trust. Keysigning allows a person to publicly state that they trust that a public key belongs to a specific person. To sign someone's public key, you need to use your private key, so the world will know that it was you.

- -
-
-
+ -- 2.25.1