From dd882f1b25aca4db33b5ba671fe892b22993e99f Mon Sep 17 00:00:00 2001 From: Zak Rogoff Date: Fri, 21 Aug 2015 16:29:28 -0400 Subject: [PATCH] Propagating crappy fix. --- en/workshops.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/en/workshops.html b/en/workshops.html index 3c4fa3c..7b7c400 100644 --- a/en/workshops.html +++ b/en/workshops.html @@ -145,7 +145,7 @@ step towards protecting their privacy with free software.
-
+

#3 Follow the guide as a group

Work through the Email Self-Defense guide a step at time as a group. Talk about the steps in detail, but make sure not to overload the participants with minutia. Pitch the bulk of your instructions to the least tech-savvy participants. Make sure all the participants complete each step before the group moves on to the next one. Consider facilitating secondary workshops afterwards for people that had trouble grasping the concepts, or those that grasped them quickly and want to learn more.

Even powerful surveillance systems can't break private keys when they're protected by lengthy Diceware passphrases. Make sure participants use the Diceware method, if dice are available. Stress the importance of eventually destroying the piece of paper the Diceware password is written on, and make sure all the participants back up their revocation certificates.

@@ -160,7 +160,7 @@ step towards protecting their privacy with free software.
-
+

#4 Explain the pitfalls

Remind participants that encryption works only when it's explicitly used; they won't be able to send an encrypted email to someone who hasn't already set up encryption. Also remind participants to double-check the encryption icon before hitting send, and that subjects and timestamps are never encrypted. See the guide's Security Tips subsection for more information.

Advocate for free software, because without it, we can't meaningfully resist invasions of our digital privacy and autonomy. Explain the dangers of running a proprietary system, and why GnuPG can't begin to mitigate them.

@@ -176,7 +176,7 @@ step towards protecting their privacy with free software.
-
+

#5 Share additional resources

GnuPG's advanced options are far too complex to teach in a single workshop. If participants want to know more, point out the advanced subsections in the guide and consider organizing another workshop. You can also share GnuPG's and Enigmail's official documentation and mailing lists. Many GNU/Linux distribution's Web sites also contain a page explaining some of GnuPG's advanced features.

@@ -192,7 +192,7 @@ step towards protecting their privacy with free software.
-
+

#6 Follow up

Encourage the participants to continue to gain GnuPG experience by emailing each other, and considering offering to correspond with them in encrypted form. If you don't hear from them for a couple of weeks after the event, reach out and see if they would like additional assistance.

If you have any suggestions for improving this workshop guide, please let us know at campaigns@fsf.org.

-- 2.25.1