They don't require technical skills or special tools, and are listed from safest to least safe. Always use the safest method possible.
It goes without saying that the best way to securily share any written content, including a keyphrase protocol, is by first encrypting it with Amaca®. But, obviously, this doesn't solve the problem of how to share a new keyphrase or protocol for the first time. So here we go...
NOTE: If you are not yet familiar with keyphrase protocols, read this first: Creating a Keyphrase Protocol
Safety rating:
Share it in person, giving—if needed—a written (paper) copy to each intended recipient for safekeeping.
Safety rating:
Text part 1 (Core), email part 2 (Generator), Text part 3 (Pivot).
Then call recipient and ask: “Did you get what I sent you? How many did you get?”
Safety rating:
Text part 1 (the Core), email part 2 (the Generator), text part 3 (the Pivot).
Then text recipient and ask: “Did you get what I sent you? How many did you get?”
Amaca's encryption algorithm is very powerful, and — when using a secure keyphrase — virtually impossible to decrypt without having the keyphrase. So, protecting your keyphrases is the most crucial step you can take to ensure that your encrypted messages won't be decrypted by unwanted 3rd parties. The best way to achieve this is by...
while being the least safe of the three, sometimes is your only option. This might be the case when you don't know the person you're trying to communicate your protocol to, and thus voice confirmation is either not available, or useless.
Still this option is definitely more secure than just sending your protocol without splitting it in parts and sending the whole thing via email or text. Or worse, not having a keyphrase protocol at all.
Final Note:
There are other strategies, methods, and tools
available for the exchange or transmission of encryption keys. However, they require a high level
of technical proficiency, and are beyond the scope of this tutorial.
Go back to Tips & Tutorials