Your browser is unable to display the menu. It has been converted to a table at the bottom of this page.

SecExMail Key Transparency
Previous  Top  Next

SecExMail is engineered with a focus on transparency to give you the assurance that no backdoor keys or key recovery is embedded in encrypted messages. This means you as the recipient or sender of an encrypted SecExMail message can verify what keys have been used in the encryption of that message.

The non-technical approach to this is to right-click an encrypted message listed on the in-tray tab or out-tray tab with your mouse and select "decode" from the pop-up menu. Click the watch tab to review the analysis of the offline decryptor. The watch tab will report both whom the message was addressed to and whom the message was encrypted to. See sample output below :

   Offline decryptor starting file analysis
   This email was sent to:
   dodo@offshoremailroom.com -> have key
   This message was encrypted to: 
   dodo@offshoremailroom.com ...session key ok
   Decrypted in 0.24 seconds

If the message was encrypted to multiple recipients, the log output will indicate this. Note that you will only be able to decrypt messages for which you hold private keys. This means that if you send email to people on your friends list, only your friends will be able to decrypt these messages. See SecExMail Keys.

The more technical approach to verifying keys used in encryption of a particular messages is to use base64 decoding software and examine the raw data. See SecExMail Message Format for details.

Bytefusion Software Prices Site Map Purchase This Product On-line
How to Order Secure File Encryption Time Client for Windows
Need an NTP4.0 Time Server for Windows? Secure Shell Client Secure Web Based Email
Secure Email with OpenPGP Support Email encryption for Corporations Need a Telnet Server for Windows?
Products
Download
Order
Support
GPS Sales
Contact
News
Home