From de0ab1427b7c1a506f30761ff60bdb07e968f947 Mon Sep 17 00:00:00 2001 From: David Thompson Date: Fri, 20 Jun 2014 12:09:47 -0400 Subject: [PATCH] Change english version image links to point to en/ directory. --- en/confirmation.html | 2 +- en/index.html | 22 +++++++++++----------- en/infographic.html | 6 +++--- en/mac.html | 22 +++++++++++----------- en/next_steps.html | 8 ++++---- en/windows.html | 22 +++++++++++----------- 6 files changed, 41 insertions(+), 41 deletions(-) diff --git a/en/confirmation.html b/en/confirmation.html index 9a4f7177..ac76b6e2 100644 --- a/en/confirmation.html +++ b/en/confirmation.html @@ -24,7 +24,7 @@

If you don't receive the confirmation link, send us an email at info@fsf.org to be added manually.

-

Try it out.


+

Try it out.


Join us on microblogging services for day-to-day updates:

GNU Social | Pump.io | Twitter

diff --git a/en/index.html b/en/index.html index 40d18c24..0e7587b9 100644 --- a/en/index.html +++ b/en/index.html @@ -71,14 +71,14 @@

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -105,7 +105,7 @@

Step 1.a Setup your email program with your email account (if it isn't already)

@@ -131,9 +131,9 @@
@@ -172,7 +172,7 @@

Step 2.a Make a keypair

@@ -247,7 +247,7 @@

Step 3.a Send Adele your public key

@@ -339,7 +339,7 @@

Step 4.a Sign a key

@@ -385,7 +385,7 @@

When should I encrypt?

@@ -400,7 +400,7 @@

Important: Be wary of invalid keys

diff --git a/en/infographic.html b/en/infographic.html index 934368be..73a7c605 100644 --- a/en/infographic.html +++ b/en/infographic.html @@ -2,7 +2,7 @@ - + Email Self-Defense - a guide to fighting surveillance with GnuPG encryption @@ -19,7 +19,7 @@

← Read the full guide

Share our infographic with the hashtag #EmailSelfDefense

-

View & share our infographic

+

View & share our infographic

Download the source files for the infographic

← Read the full guide

@@ -32,7 +32,7 @@

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -77,7 +77,7 @@

Step 1.a Setup your email program with your email account (if it isn't already)

@@ -114,9 +114,9 @@
@@ -155,7 +155,7 @@

Step 2.a Make a keypair

@@ -227,7 +227,7 @@

Step 3.a Send Adele your public key

@@ -319,7 +319,7 @@

Step 4.a Sign a key

@@ -365,7 +365,7 @@

When should I encrypt?

@@ -380,7 +380,7 @@

Important: Be wary of invalid keys

diff --git a/en/next_steps.html b/en/next_steps.html index 2042417e..0e684642 100644 --- a/en/next_steps.html +++ b/en/next_steps.html @@ -37,7 +37,7 @@

Join the movement

@@ -47,7 +47,7 @@
- + @@ -95,7 +95,7 @@

Make Email Self-Defense tools even better

@@ -103,7 +103,7 @@

If you like programming, you can contribute code to GnuPG or Enigmail.

-

To go the extra mile, support the Free Software Foundation so we can promote Email Self-Defense as heavily as possible, and make more tools like it.

Donate Join now

+

To go the extra mile, support the Free Software Foundation so we can promote Email Self-Defense as heavily as possible, and make more tools like it.

Donate Join now


diff --git a/en/windows.html b/en/windows.html index 0b2501c6..490f4757 100644 --- a/en/windows.html +++ b/en/windows.html @@ -45,14 +45,14 @@

Free Software Foundation

We fight for computer user's rights, and promote the development of free (as in freedom) software. Resisting bulk surveillance is very important to us.

We want to heavily promote tools like this in-person and online, to help as many people as possible take the first step towards using free software to protect their privacy. Can you make a donation or become a member to help us achieve this goal?

-

Donate Join now

+

Donate Join now

- View & share our infographic → + View & share our infographic → Bulk surveillance violates our fundamental rights and makes free speech risky. This guide will teach you a basic surveillance self-defense skill: email encryption. Once you've finished, you'll be able to send and receive emails that are coded to make sure a surveillance agent or thief intercepting your email can't read it. All you need is a computer with an Internet connection, an email account, and about half an hour.

Even if you have nothing to hide, using encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. If you do have something important to hide, you're in good company; these are the same tools that Edward Snowden used to share his famous secrets about the NSA.

@@ -77,7 +77,7 @@

Step 1.a Setup your email program with your email account (if it isn't already)

@@ -113,9 +113,9 @@
@@ -154,7 +154,7 @@

Step 2.a Make a keypair

@@ -225,7 +225,7 @@

Step 3.a Send Adele your public key

@@ -317,7 +317,7 @@

Step 4.a Sign a key

@@ -363,7 +363,7 @@

When should I encrypt?

@@ -378,7 +378,7 @@

Important: Be wary of invalid keys

-- 2.25.1