× BETA *
  About   F A Q   Tips & Tutorials   Language Support
 Buy me a coffee
  L A N G U A G E S
  English   Español
              
Terms of Use Privacy Statement Beta Disclaimer
© 2023, Amaca Tech, LLC
All rights reserved.
Own your privacy
  Home  |  Tips & Tutorials  |  Sharing a...Protocol

Sharing a Keyphrase Protocol

Here's a safe strategy to follow when sharing your keyphrase protocol with the intended recipients.

3 Ways to Share Your Keyphrase Protocol

They don't require technical skills or special tools, and are listed from safest to least safe. Always use the safest method possible.

Before we begin:

It goes without saying that the best way to securily share any written content, including a keyphrase protocol, is by first encrypting it with Amaca®. But, obviously, this doesn't solve the problem of how to share a new keyphrase or protocol for the first time. So here we go...

NOTE: If you are not yet familiar with keyphrase protocols, read this first: Creating a Keyphrase Protocol

In person

Safety rating:   

Share it in person, giving—if needed—a written (paper) copy to each intended recipient for safekeeping.

In writing, split in parts | voice confirmation

Safety rating:   

1.
Write each part (protocol component) separately.
2.
Digitally send each part via separate messages and channels.
3.
Confirm receipt by phone, for voice validation, without mentioning the actual contents of the protocol.

For example

Text part 1 (Core), email part 2 (Generator), Text part 3 (Pivot).

Then call recipient and ask: “Did you get what I sent you? How many did you get?”

In writing, split in parts | written confirmation

Safety rating:   

1.
Write each part (protocol component) separately.
2.
Digitally send each part via separate messages and channels.
3.
Confirm receipt by text, for written validation, without mentioning the actual contents of the protocol.

For example

Text part 1 (the Core), email part 2 (the Generator), text part 3 (the Pivot).

Then text recipient and ask: “Did you get what I sent you? How many did you get?”

Why is it important to share they keyphrase protocol this way?

Amaca's encryption algorithm is very powerful, and — when using a secure keyphrase — virtually impossible to decrypt without having the keyphrase. So, protecting your keyphrases is the most crucial step you can take to ensure that your encrypted messages won't be decrypted by unwanted 3rd parties. The best way to achieve this is by...

  1. Using a good keyphrase protocol that generates multiple and strong keyphrases, and
  2. Sharing the protocol in a way that minimizes the possibility of it being intercepted by an unwanted person.

Sharing the protocol in person is the safest option...

because you avoid any further exposure on the internet. But, of course, this may not always be possible.

The second best option...

is sending the protocol digitally in writing, split, with voice confirmation. Why?

  1. By splitting the protocol in several parts and sending the parts via different channels, even if a snoop intercepts one of the parts they won't be able to figure out a specific keyphrase or the protocol itself.
  2. As a final step, having voice confirmation (without revealing the contents of the parts sent) will let you confirm that your protocol is reaching the right person, and not an impersonator with ill intentions.

Finally, the third option...

Send in writing, split in parts, with written confirmation

while being the least safe of the three, sometimes is your only option. This might be the case when you don't know the person you're trying to communicate your protocol to, and thus voice confirmation is either not available, or useless.

Still this option is definitely more secure than just sending your protocol without splitting it in parts and sending the whole thing via email or text. Or worse, not having a keyphrase protocol at all.

Final Note:
There are other strategies, methods, and tools available for the exchange or transmission of encryption keys. However, they require a high level of technical proficiency, and are beyond the scope of this tutorial.

Go back to Tips & Tutorials