Client app public key retrieval and managementįlowCrypt client apps lookup public keys always by the user’s email address not by fingerprint. When you choose a specific contact you’ll see a button that lets you modify it, removing or adding public keys manually. Importing can also be done from the FlowCrypt Settings Additional Settings Contacts section. Importing another public key for that correspondent by clicking Update Key when you receive an encrypted email will import the new public key side by side with the already imported key, and both will be used. Managing other user’s public keysįrom the moment you load (set) your recipient’s public key for the first time, either manually or automatically, it won’t be removed or replaced until you manually remove it from FlowCrypt Settings Additional Settings Contacts. See the Sending to Other OpenPGP Software guide in this matter. You might need to import other user’s public key if your recipient uses other OpenPGP software. After that, they’ll be able to send you encrypted messages. You only have to do this once for each recipient that uses non-FlowCrypt OpenPGP software. Go to FlowCrypt Settings Additional Settings Public Key Save public key to a file and share the file with your recipient.Īttach your public key when sending an encrypted message by clicking the button on the bottom right corner of the Secure Compose window. Take the address, replace the email address with yours and senders can download your public key themselves. You have several options to share your public key: If all of your encrypted contacts use FlowCrypt, you’ll not have to worry about public key management. If email senders are using FlowCrypt, your public key will be loaded automatically when they compose a message to you. It also stores personal information about the user, such as a name and email address, which can be used to authenticate the user.įlowCrypt is designed to make most public key operations automatic so that a wider, non-technical audience can benefit from encryption. A public key contains information about how to encrypt messages for you: a unique combination of numbers, letters, and symbols that will be used in the encryption process.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |