Attachment 'gnupg-leaflet.en.txt'
Download
Toggle line numbers
1 # Version 1.0
2
3 ------------------------------------------------------------------------
4
5 # Email self-defense against surveillance
6
7 Mass surveillance violates our fundamental rights and is a menace to the freedom of speech!
8
9 But: we can defend ourselves.
10
11 # The Problem
12
13 The password that protects your email is not sufficient to protect your mails against the mass surveillance technologies used by secret services.
14
15 Each email sent over the internet passes through many computer systems on the way to its destination. Secret services and surveillance agencies take advantage of this to read millions and millions of emails each day.
16
17 Even if you think you have nothing to hide: Everyone else that you communicate with via unprotected emails is being exposed as well.
18
19 # Encryption
20
21 Take back your privacy by using GnuPG! It encrypts your emails before they are sent, so only the recipients of your choice can read them.
22
23 GnuPG is platform independent. That means it works with every email address and runs on pretty much any computer or recent mobile phone. GnuPG is free and available at no charge.
24
25 Thousands of people already use GnuPG, for professional and private use. Come and join us! Each person makes our community stronger and proves that we are ready to fight back.
26
27 # The Solution
28
29 Whenever an email that is encrypted with GnuPG is intercepted or ends up in the wrong hands, it is useless: Without the appropriate private key it cannot be read by anyone. But, for the intended recipient - and only for her - it opens like a totally normal email.
30
31 Sender and recipient are both safer now. Even if some of your emails contain no private information, consistent use of encryption protects us all from unjustified mass surveillance.
32
33 # Private email communication
34
35 # Take back your privacy! Use GnuPG!
36
37 - Free Software
38 - for all email addresses
39 - for GNU/Linux, Windows, Mac, Android, ...
40 - no account or registration needed
41 - free of charge
42
43 ------------------------------------------------------------------------
44
45 # How GnuPG works
46
47 To use GnuPG encryption you create a unique pair of a public and a private "key". These keys are used as follows
48
49 # public key - encrypt
50
51 When someone would like to send you an encrypted email, they need to use your "public key". So, the more you spread/distribute your public key, the better.
52
53 Don't worry: Your public key can only be used to encrypt emails to you, not to decrypt them.
54
55 # private key - decrypt
56
57 Your "private key" is like the key to the front door of your house; you keep it safe (and private) on your personal computer. Take care that you are the only one who can access it!
58
59 You use GnuPG and your private key to decrypt and read all encrypted emails that have been sent to you.
60
61 # What makes GnuPG secure?
62
63 GnuPG is **Free Software** and uses **Open Standards**. That is essential to be sure that software can really protect us from surveillance. Because in proprietary software and formats, things might happen beyond your control.
64
65 If no one is allowed to see the source code of a program, nobody can be sure that it does not contain undesirable spy programs - so-called "backdoors". If software does not reveal how it works, we can merely trust it blindly.
66
67 In contrast, a fundamental condition of Free Software is to publish its source code: Free Software allows and supports independent checking and public review of the applied source code by everyone. Given this transparency, backdoors can be detected and removed.
68
69 Most Free Software lies in the hands of a community that works together to build secure software for everyone. If you want to protect yourself from surveillance you can only trust Free Software.
70
71 # What is Free Software
72
73 Free Software can be used by everyone for any purpose. That includes free copying, reading the source code and the possibility to improve or adapt it to your own needs (the so-called "four freedoms").
74
75 Even if you "only want to use" the program, you still benefit from these freedoms. Because they guarantee that Free Software remains in the hands of our society and that its further development is not controlled by the interests of private companies or governments.
76
77 Find out more about this and how Free Software can lead us into a Free Society:
78
79 fsfe.org/freesoftware
80
81 # Practical advice
82
83 The technology behind GnuPG provides first-class protection. The following guidelines will help you to ensure that your encrypted communication is not compromised for other reasons:
84
85 To decrypt your emails you need your private key and your **passphrase**. This passphrase should be at least 8 characters long and contain digits, special characters as well as upper and lower case letters. Furthermore, no one with background knowledge about you should be able to guess your passphrase.
86
87 **Backup your private key!** If your harddisk breaks you don't need to create a new one and you don't lose your data.
88
89 **Encrypt as much as you can!** By doing so, you prevent others from realising when and with whom you exchange sensitive information. Thus, the more often you encrypt your messages, the less suspicious encrypted messages will be.
90
91 Be aware that the **subject is transmitted unencrypted!**
92
93 [This text is only used in languages that leave enough space to integrate it:] Although the content of your email gets encrypted, all correspondig metadata (sender, recipient, date and file size) still can be captured.
94
95 # Tutorial
96
97 You can find a simple tutorial for email self-defense with GnuPG encryption here:
98
99 EmailSelfDefense.FSF.org
100
101 Or you watch out for so-called **"Cryptoparties"** in your area. These are events where you can meet people that would be happy to help you in setting up and using GnuPG as well as other encryption tools at no charge.
102
103 This leaflet is a remix by FSFE based on an original graphic of FSF and Journalism++ (CC BY 4.0) available at: emailselfdefense.fsf.org
104
105 # About the FSFE
106
107 This leaflet was created by the Free Software Foundation Europe (FSFE), a non-profit organisation dedicated to promoting Free Software and working to build a free digital society.
108
109 Access to software determines how we can take part in our society. Therefore, FSFE strives for fair access and participation for everyone in the information age by fighting for digital freedom.
110
111 Nobody should ever be forced to use software that does not grant the freedoms to **use, study, share and improve the software**. We need the right to shape technology to fit our needs.
112
113 The work of FSFE is backed by a community of people committed to these goals. If you would like to join us and/or help us to reach our goals, there are many ways to contribute. No matter what your background is. You can learn more about this and how you can support our work under:
114
115 fsfe.org/contribute
116
117 # Become a sustaining member!
118
119 Donations are critical for us to continue our work and to guarantee our independence. You can support our work best by becoming a sustaining member of the FSFE, a "Fellow".
120 By doing so, you directly help us to continue the fight for Free Software wherever needed.
121
122 fsfe.org/join
123
124 You can order this and other leaflets at no charge:
125
126 fsfe.org/promo
127
128 Free Software Foundation Europe e.V.
129 Schönhauser Allee 6/7
130 10119 Berlin
131 Germany
132 https://fsfe.org
Attached Files
To refer to attachments on a page, use attachment:filename, as shown below in the list of files. Do NOT use the URL of the [get] link, since this is subject to change and can break easily.You are not allowed to attach a file to this page.