TE el CUny art CTS eA EeL Ce
Pee Ee a ue ee ee rt
reece
md)
eee eee)
eee ese
Peer
eee eee
Each email sent over the intemet
See ae eg
systems on the way to its destination
errors etn
agencies take advantage ofthis to
ee eran
eer
rere ee
eee ey
Pet ee)
emails is being exposed as wel.
aT
Take back your privacy by using
Coroner eer’
Pees
Par)
‘GnuPG is platform independent. That
Peer rere
Pe ee rer
Cee Tes
ere)
co
See een)
renee ur
Peer eore eet
Cee ean rey
eee nes
BETA)
Whenever an email tha is encrypted
Crome nes
ner reer
Ce eee
cannot be read by anyone. But, forthe
ere eee aca en
eee aeanca
‘Sender and recipient are both safer
Pentre peace
Ceca
Ce ean)
Pee Mere ee
ee
Private email communication
Take back your privacy!
Use GnuPG!
ele ue fess
OAT URI antec VEL UT ll: es
OPEC ates orl Cette)
UEHow GnuPG works
Pag
encrypt
\When someone would tke to send you an enerypted email they
‘need to use your ‘publ key" So, he more you
spread/dstrioute your pul key, the better.
Dont worry: Your public key can only be used to encrypt emails
tayou.not to ceorypt them,
What makes GnuPG secure?
(GnuPG is Free Software and uses Open Standards, That is essential to be sure
‘that software can really protect us from surveillance. Becausein proprietary
software and formats, things m ght happen beyond your contro
FF no one's allowed to see the source code of program, nobody can be sure that
itooes not contin undesirable spy programsso-called"backctoors’. software
oes nat reveal how it works, we can merely ust itindy
In contrast fundamental condition af Free Software sto publsh its source
code: Free Software allows and supports independent checking ane public review
ofthe aopled source code by everyone, Gwen this transparency, backdoors can
be detected and removed
‘Most Free Software es inthe hands ofa community that works tagether to build
secure software for everyone. you want to protect yourself from suvellance
you can only trust Free Sofware.
Practical advice
‘The technology behind GnuPG provides first-class protection. The following
{uidelineswillhelp you to ensure that your encrypted communication isnot
compromised for other reasons
To decrypt your emails you need your prvate key and your passphrase. This
passphrase shouldbe at east 8 characters lang and contain digs, special
characters as wellas upper and lowercase leer. Furthermore, no one with
background knowledge about you should be able to quess your passphrase.
‘Backup your private key If your hardelsk breaks you dont need to create anew
‘one and you dont lose your data
Encrypt as much as you ean! By doing so, you prevent others fom realising
wien and with whom yau exchange sensitive information, Thus, the more often
you encrypt your messages, the ss suspicious encrypted messages willbe
‘2e aware that the subject is transmitted unencrypted!
About the FSFE
This leaflet was created by the Free Software Foundation Europe (FSFE), a nen:
prof organisation dedicate to promoting Fre Software and working to build a
‘ree digtal society
-Acoess to software determines how we can takepart in our society. Therefore,
FSFE strives foc far access and participation for everyone inthe information age
by fighting fr digital freedom,
"Nobody should ever be forced to use software that does nat grant the reedome
‘ouse, study, share and improve the software, We need the ight to shape
technology tft our needs,
‘The work of FSEE ie backed by a community of people committed to these goals
IF you would like to join us andor help us to reach aur goals, there are mary ways
to contrbute. No matter what your background is. You can lean moce sbout this,
‘anchow you can support our work under
Ceres
PL y
‘Your ‘private key’is ke the key othe front door of your hause;
you keep it sae (and private) on your personal computer Take
Care that you ate the only one who can access ft
‘You use GnuPG and your private key to decrypt and read all
‘encrypted emails hat have been sen 0 ou,
What is Free Software?
Free Software can be used by everyone for any purpose.
‘That includes free copying, reading the sourcecode and
the possibilty to improve or adapt t to your own needs
{the so-called “four freedoms).
Even f you ‘only want to use the program, you stillbenefit
{rom these freedoms. Because they qusrantee that Free
‘Software remains inthe hands of our society and that its
further development isnot controlled by the interests of
private comparies or governments,
Find out moce about tis and haw Free Software can lead
us into a Free Society
{ste orgtreesotware
Tutorial
You can finda simple tutorial fo email sal-defense with
‘GeuPG encryption here:
EmailSelfDefense.FSF.org
1 you wateh out for so-called “Cryptopartes”in your
area, These are events where you can meet people that
‘would be happy to help you in Setting up anc using GnuPG
‘as wellas other encryption tools at no charge.
nest en anongalgrshie of SF and Jourats (00849)
‘roller enateeisenee star
Become a sustaining member!
andio quran ot peace Yocan
Srportov wor er ybecornga a
Strong monber! eo Talo
bycongso oudrectyhebustoconie
tees Sottero oe
‘You can der this and ater leaflets at charge
Co
Free Software Foundation Europe eX.
chrinauser Ale 6/7
10119 Bern
Germany
htipsitsfeorg
“ste