You are on page 1of 2
TE el CUny art CTS eA EeL Ce Pee Ee a ue ee ee rt reece md) eee eee) eee ese Peer eee eee Each email sent over the intemet See ae eg systems on the way to its destination errors etn agencies take advantage ofthis to ee eran eer rere ee eee ey Pet ee) emails is being exposed as wel. aT Take back your privacy by using Coroner eer’ Pees Par) ‘GnuPG is platform independent. That Peer rere Pe ee rer Cee Tes ere) co See een) renee ur Peer eore eet Cee ean rey eee nes BETA) Whenever an email tha is encrypted Crome nes ner reer Ce eee cannot be read by anyone. But, forthe ere eee aca en eee aeanca ‘Sender and recipient are both safer Pentre peace Ceca Ce ean) Pee Mere ee ee Private email communication Take back your privacy! Use GnuPG! ele ue fess OAT URI antec VEL UT ll: es OPEC ates orl Cette) UE How GnuPG works Pag encrypt \When someone would tke to send you an enerypted email they ‘need to use your ‘publ key" So, he more you spread/dstrioute your pul key, the better. Dont worry: Your public key can only be used to encrypt emails tayou.not to ceorypt them, What makes GnuPG secure? (GnuPG is Free Software and uses Open Standards, That is essential to be sure ‘that software can really protect us from surveillance. Becausein proprietary software and formats, things m ght happen beyond your contro FF no one's allowed to see the source code of program, nobody can be sure that itooes not contin undesirable spy programsso-called"backctoors’. software oes nat reveal how it works, we can merely ust itindy In contrast fundamental condition af Free Software sto publsh its source code: Free Software allows and supports independent checking ane public review ofthe aopled source code by everyone, Gwen this transparency, backdoors can be detected and removed ‘Most Free Software es inthe hands ofa community that works tagether to build secure software for everyone. you want to protect yourself from suvellance you can only trust Free Sofware. Practical advice ‘The technology behind GnuPG provides first-class protection. The following {uidelineswillhelp you to ensure that your encrypted communication isnot compromised for other reasons To decrypt your emails you need your prvate key and your passphrase. This passphrase shouldbe at east 8 characters lang and contain digs, special characters as wellas upper and lowercase leer. Furthermore, no one with background knowledge about you should be able to quess your passphrase. ‘Backup your private key If your hardelsk breaks you dont need to create anew ‘one and you dont lose your data Encrypt as much as you ean! By doing so, you prevent others fom realising wien and with whom yau exchange sensitive information, Thus, the more often you encrypt your messages, the ss suspicious encrypted messages willbe ‘2e aware that the subject is transmitted unencrypted! About the FSFE This leaflet was created by the Free Software Foundation Europe (FSFE), a nen: prof organisation dedicate to promoting Fre Software and working to build a ‘ree digtal society -Acoess to software determines how we can takepart in our society. Therefore, FSFE strives foc far access and participation for everyone inthe information age by fighting fr digital freedom, "Nobody should ever be forced to use software that does nat grant the reedome ‘ouse, study, share and improve the software, We need the ight to shape technology tft our needs, ‘The work of FSEE ie backed by a community of people committed to these goals IF you would like to join us andor help us to reach aur goals, there are mary ways to contrbute. No matter what your background is. You can lean moce sbout this, ‘anchow you can support our work under Ceres PL y ‘Your ‘private key’is ke the key othe front door of your hause; you keep it sae (and private) on your personal computer Take Care that you ate the only one who can access ft ‘You use GnuPG and your private key to decrypt and read all ‘encrypted emails hat have been sen 0 ou, What is Free Software? Free Software can be used by everyone for any purpose. ‘That includes free copying, reading the sourcecode and the possibilty to improve or adapt t to your own needs {the so-called “four freedoms). Even f you ‘only want to use the program, you stillbenefit {rom these freedoms. Because they qusrantee that Free ‘Software remains inthe hands of our society and that its further development isnot controlled by the interests of private comparies or governments, Find out moce about tis and haw Free Software can lead us into a Free Society {ste orgtreesotware Tutorial You can finda simple tutorial fo email sal-defense with ‘GeuPG encryption here: EmailSelfDefense.FSF.org 1 you wateh out for so-called “Cryptopartes”in your area, These are events where you can meet people that ‘would be happy to help you in Setting up anc using GnuPG ‘as wellas other encryption tools at no charge. nest en anongalgrshie of SF and Jourats (00849) ‘roller enateeisenee star Become a sustaining member! andio quran ot peace Yocan Srportov wor er ybecornga a Strong monber! eo Talo bycongso oudrectyhebustoconie tees Sottero oe ‘You can der this and ater leaflets at charge Co Free Software Foundation Europe eX. chrinauser Ale 6/7 10119 Bern Germany htipsitsfeorg “ste

You might also like