Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance
I recommend people use Tor to help protect their privacy. The easiest way to get started using Tor is TBB (Tor Browser Bundle).

Right to Internet access

The right to Internet access, also known as the right to broadband, is the view that all people must be able to access the Internet in order to exercise and enjoy their rights to Freedom of expression and opinion and other fundamental human rights, that states have a responsibility to ensure that Internet access is broadly available, and that states may not unreasonably restrict an individual's access to the Internet. Internet access is recognized as a right by the laws of several countries. [1]


The Value of Privacy, security expert Bruce Schneier says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance." [2,3]
How the NSA Threatens National Security
Why We Encrypt
Internet Subversion
Over 700 Million People Taking Steps to Avoid NSA Surveillance

You can send email to cp at the domain name.

If you have a signed pgp key in the strong set, you can check out the PGP path to key ef9d128d23e9eb24.

Many of the docs on creating GPG or PGP keys are out of date and will lead you to creating weak keys. You should also use subkeys and keep your certification key (the key used to sign other people's keys) secure and offline as much as possible. This way you can revoke subkeys and create a new one, or periodically expire subkeys, and not lose all your certificate key signings.
EMAIL SELF-DEFENSE covers the basics of using PGP/GPG but doesn't cover creating a secure key that avoids using a SHA1 hash.
Debian's Creating a new GPG key
Debian's Using OpenPGP subkeys
OpenPGP Best Practices

Chuck Peters, Linux Systems Administrator.