Well, the mechanism is that it overwrites the key ever time, so each
message has its own unique key, also the receiver needs to verify the key
file with the built in tool to be able to use it. So an attacker does not
know this the only way to get this information is from the person that
created the
On Thu, Nov 12, 2020 at 11:19:44AM -0800, Keifer Bly wrote:
> Hi there,
Hello,
> So I have a new email encryption system which requires that the user has
> the specific key file generated for a message rather than the password,
> specifically this software generates a unique key file for a specif
Hi there,
So I have a new email encryption system which requires that the user has
the specific key file generated for a message rather than the password,
specifically this software generates a unique key file for a specific
message every time a message is created. The user then enters the date an