Step 1.a Setup your email program with your email account (if it isn't already)
@@ -131,9 +131,9 @@Step 2.a Make a keypair
@@ -247,7 +247,7 @@Step 3.a Send Adele your public key
@@ -339,7 +339,7 @@Step 4.a Sign a key
@@ -385,7 +385,7 @@When should I encrypt?
@@ -400,7 +400,7 @@Important: Be wary of invalid keys
diff --git a/en/infographic.html b/en/infographic.html index 934368b..73a7c60 100644 --- a/en/infographic.html +++ b/en/infographic.html @@ -2,7 +2,7 @@ - +← Read the full guide
Share our infographic with the hashtag #EmailSelfDefense
- +Download the source files for the infographic
← Read the full guide
@@ -32,7 +32,7 @@Copyright © 2014 Free Software Foundation, Inc. Privacy Policy. Join.
-Version 2.0, launched 6/18/2014.
+Version 2.0, launched 6/18/2014.
The images on this page are under a Creative Commons Attribution 4.0 license (or later version), and the rest of it is under a Creative Commons Attribution-ShareAlike 4.0 license (or later version). — Why these licenses?
Download the source packages for this guide and for the infographic. Fonts used in the guide & infographic: Dosis by Pablo Impallari, Signika by Anna Giedryś Archivo Narrow by Omnibus-Type, PXL-2000 by Florian Cramer.
diff --git a/en/mac.html b/en/mac.html index d193448..fc6609b 100644 --- a/en/mac.html +++ b/en/mac.html @@ -44,14 +44,14 @@
We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.
We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal?
- +- + Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, and about half an hour.
Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.
@@ -77,7 +77,7 @@