aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/content/docs/appendix/code-binary-verify.md12
-rw-r--r--src/content/docs/guides/file-operations.md15
-rw-r--r--src/content/docs/guides/generate-key.md8
-rw-r--r--src/content/docs/guides/key-server-operations.md68
-rw-r--r--src/content/docs/guides/openpgp-trust-manage.md35
-rw-r--r--src/content/docs/guides/text-opetations.md59
-rw-r--r--src/content/docs/overview/glance.md4
7 files changed, 104 insertions, 97 deletions
diff --git a/src/content/docs/appendix/code-binary-verify.md b/src/content/docs/appendix/code-binary-verify.md
index 9a739c0..005215f 100644
--- a/src/content/docs/appendix/code-binary-verify.md
+++ b/src/content/docs/appendix/code-binary-verify.md
@@ -10,7 +10,7 @@ secure, automated build processes.
## Automated Build Process
-Our software leverages **GitHub Actions** for automated compilations, ensuring
+GpgFrontend leverages **GitHub Actions** for automated compilations, ensuring
that every binary file version released is directly compiled from the source
code stored in the GitHub repository's main branch. This approach guarantees
that the compilation process is transparent, replicable, and free from manual
@@ -32,10 +32,12 @@ verification mechanisms, as outlined below:
### Windows
-All executable files (.exe, .dll) and installer packages are signed using a
-[Certum](https://www.certum.eu/en/certum-by-asseco/) code signing certificate.
-The signature is trusted by Windows and can be verified through standard Windows
-mechanisms (e.g., file properties or signtool).
+All executable files (.exe, .dll) and installer packages (.msi, .msix) are
+signed using a [Certum](https://www.certum.eu/en/certum-by-asseco/) code signing
+certificate. The signature is trusted by Windows and can be verified through
+standard Windows mechanisms (e.g., file properties or signtool).
+
+![](https://image.cdn.bktus.com/i/2025/06/25/2eb0e5a1ff970b6d97ed38f18b45476c9aad6ee7.webp)
### macOS
diff --git a/src/content/docs/guides/file-operations.md b/src/content/docs/guides/file-operations.md
index 6b25cce..7ff5bff 100644
--- a/src/content/docs/guides/file-operations.md
+++ b/src/content/docs/guides/file-operations.md
@@ -28,7 +28,7 @@ the main interface, streamlining your workflow for secure file handling.
Sign, or Verify—to perform the desired cryptographic operation on the
selected file(s).
-![](https://image.cdn.bktus.com/i/2025/06/24/51136aa32550eeeaecdb8dff32d62526280919ab.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/2365c709356b1339898043390a1ff7ac232e05f4.webp)
## Using File Panel Directly
@@ -61,6 +61,10 @@ and using the appropriate key from the Key Toolbox:
public key is available in your keyring and click the Verify button in the
toolbar.
+![](https://image.cdn.bktus.com/i/2025/06/24/5ed085a7ac16c34a1e6ba46707597e91a93b6ecc.gif)
+
+![](https://image.cdn.bktus.com/i/2025/06/24/3dceea13ad31f488a347f3b0d4b1fb998487f223.gif)
+
## File Extension Requirements
Understanding the appropriate file extensions helps in managing encrypted and
@@ -88,8 +92,9 @@ settings.
To change the output mode between ASCII and binary formats:
-1. Open Settings: Navigate to the GnuPG Controller settings within GpgFrontend by accessing
- the settings menu.
+1. Open Settings: Navigate to the [GnuPG
+ Controller](/advanced/gnupg-controller/) settings within GpgFrontend by
+ accessing the settings menu.
2. Locate Binary Mode Option: In the settings interface, under the "General"
section, find the option labeled "Use Binary Mode for File Operations".
3. Toggle Binary Mode: Check or uncheck this option to switch between binary
@@ -98,6 +103,8 @@ To change the output mode between ASCII and binary formats:
This streamlined process allows you to manage file encryption, decryption,
signing, and verification efficiently with GpgFrontend.
+![](https://image.cdn.bktus.com/i/2025/06/24/40365f1a7b1ac8d24ac8c11c45e77476a465eab7.webp)
+
### Quick Toggle via File Panel Menu
In addition to the settings menu, GpgFrontend also provides a quick toggle
@@ -141,6 +148,8 @@ volumes of data.
![](https://image.cdn.bktus.com/i/2025/04/09/24a8b950-ff08-2133-0ee2-5003095f1ff7.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/41efb25fd3a691a57c04a0a2ec4b0e651ceb556c.gif)
+
## Folder Encryption and Decryption
GpgFrontend supports seamless encryption and decryption of entire folders
diff --git a/src/content/docs/guides/generate-key.md b/src/content/docs/guides/generate-key.md
index a43c38f..55a7699 100644
--- a/src/content/docs/guides/generate-key.md
+++ b/src/content/docs/guides/generate-key.md
@@ -15,10 +15,12 @@ In the **Key Management** interface, click on the **“New Keypair”** button.
opens the **Generate Key** window, where you can define your identity and
configure key parameters.
+![](https://image.cdn.bktus.com/i/2025/06/24/79fe9ef30cbc5e10e7eda6aca7ee22616e874267.webp)
+
## Enter User Information
-- **Name**: Required. Enter your full name (minimum 5 characters).
-- **Email**: Required. Must be in a valid email format.
+- **Name**: Required. Enter your full name (minimum 5 characters).
+- **Email**: Required. Must be in a valid email format.
- **Comment**: Optional. Helps distinguish this key from others.
## Choose Key Database
@@ -36,7 +38,7 @@ Easy Mode simplifies key generation using common templates. You can configure:
- **Algorithm**: RSA, DSA, ECC (Curve25519), or other supported types.
- **Validity Period**: Choose from preset options (e.g., 3 months, 2 years, 10
- years, or *Non Expired*).
+ years, or _Non Expired_).
- **Combination**:
- **Primary Key Only**
- **Primary Key with Subkey** — useful when separating signing and encryption
diff --git a/src/content/docs/guides/key-server-operations.md b/src/content/docs/guides/key-server-operations.md
index 86ed472..6a7a7c9 100644
--- a/src/content/docs/guides/key-server-operations.md
+++ b/src/content/docs/guides/key-server-operations.md
@@ -8,6 +8,7 @@ They allow users to **share, retrieve, and update** public keys, making secure
communication possible even when direct key exchange is not feasible.
Key servers are especially helpful when:
+
- You need to encrypt a message but don't have the recipient’s public key.
- You want to make your public key available for others to use.
- You need to **update or revoke** your public key in case of a compromise.
@@ -18,20 +19,25 @@ straightforward for all users.
## 📥 Import Public Key From Key Server
-To import a public key, go to the **Import Key** section in the main page or Key
-Manager, and select the **Key Server** option.
+1. Open the Import Key Menu: In the Operations Bar at the top of the main
+ window, click the Import Key button (with a downward arrow).
+2. Select "Keyserver" Source: In the drop-down menu, choose Keyserver as the
+ import source.
-![Import Key Server
-UI](https://image.cdn.bktus.com/i/2023/11/16/d75cb252-9a65-5b73-01cd-a45b5ff501ef.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/3660f65893c4e79954486f1b3cfb5cb6b09a13d0.webp)
### How to Import:
-1. Choose a key server from the drop-down list.
+
+1. Choose a key server from the drop-down list.
2. Enter a **Key ID**, **Fingerprint**, or **Email Address** into the search
field.
3. Click **Search**.
4. If results are found, double-click a record to import the public key.
+![](https://image.cdn.bktus.com/i/2025/06/24/0dc8821cc3c83c7bb3266f3a1059ce59fabc4a8f.webp)
+
> 💡 By default, the key server list includes recommended options such as:
+>
> - `https://keys.openpgp.org`
> - `https://keyserver.ubuntu.com`
>
@@ -42,31 +48,17 @@ UI](https://image.cdn.bktus.com/i/2023/11/16/d75cb252-9a65-5b73-01cd-a45b5ff501e
### After Importing
Once a key is imported:
+
- GpgFrontend will display a confirmation message.
- If a newer version of the key already exists locally, the import is skipped.
You can then verify:
+
- Key creation date
- UID and key ID
- Whether the key is expired or revoked (using Key Manager filters)
-## 📤 Export My Public Key to Key Server
-
-To publish your public key:
-
-1. Open the **Key Details** interface for your key pair.
-2. Go to the **Operations** tab.
-3. Click **“Upload key pair to key server”**.
-
-![Upload
-Key](https://image.cdn.bktus.com/i/2023/11/16/87b435b1-3eb2-421d-c8cb-f6d926b6a1c7.webp)
-
-> ⚠️ GpgFrontend only allows uploading if a **master key** is present to prevent
-> accidental publishing of incomplete keys.
-
-Note:
-- Only **public key** data is uploaded.
-- Private keys are **never** uploaded.
+![](https://image.cdn.bktus.com/i/2025/06/24/4efe7862bc47b95387a8ee247d4b767dbbfa36b6.webp)
## 📤 Export My Public Key to Key Server
@@ -79,6 +71,7 @@ by default. This server uses the **Verifying Keyserver (VKS) Interface**, which
provides extra protection against spam and key poisoning.
### Key Points:
+
- 🔐 **Only public keys are uploaded**, never private keys.
- ✅ **Master key is required** to export.
- ✉️ `keys.openpgp.org` requires email verification before your key becomes
@@ -87,11 +80,12 @@ provides extra protection against spam and key poisoning.
deleted.
To export:
+
1. Open the **Key Details** interface.
2. Go to the **Operations** tab.
3. Click **“Upload key pair to key server”**.
-![](https://image.cdn.bktus.com/i/2023/11/16/87b435b1-3eb2-421d-c8cb-f6d926b6a1c7.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/34505c6435d485dc2f8ce680a8c8f630fbb18b2a.webp)
## 🔄 Synchronize Public Key Information
@@ -102,6 +96,7 @@ Like exporting, after v2.1.6, this operation also uses
**https://keys.openpgp.org** and its **VKS API**.
GpgFrontend will:
+
- Query the key server using your key’s fingerprint.
- Compare the server copy with your local one.
- Indicate if any update is applied.
@@ -115,9 +110,10 @@ You can configure your key server preferences in:
> **Settings → Key Servers**
-![](https://image.cdn.bktus.com/i/2023/11/16/afe69b9b-0576-d275-91df-79585c245b22.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/9092488afe3b899f89dc51b1789ec6dbe0249e79.webp)
### Features:
+
- **Add a Server**: Enter the `https://` or `http://` address and click **Add**.
- **Edit a Server**: Double-click an address to edit it.
- **Delete a Server**: Right-click a row and select **Delete**.
@@ -147,10 +143,10 @@ operations:
## Tips about Key Servers
-| Key Server | Fuzzy Search | VKS Interface | Notes |
-|-------------------------|--------------|---------------|-------------------------------------------|
-| `keys.openpgp.org` | ❌ No | ✅ Yes | Requires exact match (email, fingerprint) |
-| `keyserver.ubuntu.com` | ✅ Yes | ❌ No | Traditional HKP server, less strict |
+| Key Server | Fuzzy Search | VKS Interface | Notes |
+| ---------------------- | ------------ | ------------- | ----------------------------------------- |
+| `keys.openpgp.org` | ❌ No | ✅ Yes | Requires exact match (email, fingerprint) |
+| `keyserver.ubuntu.com` | ✅ Yes | ❌ No | Traditional HKP server, less strict |
> 🔎 `keys.openpgp.org` does **not** support fuzzy search — you must use the
> **exact email**, **full fingerprint**, or **full key ID**.
@@ -171,31 +167,31 @@ GpgFrontend v2.1.6 introduces a feature that automatically checks whether your
public key has been published on [keys.openpgp.org](https://keys.openpgp.org),
helping users keep track of their key visibility on the VKS-based keyserver.
-### ✅ Feature Overview
+### Feature Overview
- When enabled, GpgFrontend will fetch the **publish status** of a key from the
key server.
- If the key is found to be published on `keys.openpgp.org`, a message like the
following will be shown in the **Key Details** tab:
-![](https://image.cdn.bktus.com/i/2025/04/09/40653adf-bf71-4038-77d3-3860f4fef106.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/e52d18a85267987f8202ba6ede39068b3c6e140b.webp)
-### ⚙️ How to Enable
+### How to Enable
To activate this:
1. Go to `Settings → Network` tab.
-2. Under **Network Ability**, check the box:
- - ✅ **Automatically fetch key publish status from key server**
+2. Under **Network Ability**, check the box: `Automatically fetch key publish
+status from key server`
3. Restart GpgFrontend to apply the change.
-![](https://image.cdn.bktus.com/i/2025/04/09/6c6d4f27-ff0e-176a-305b-d4bbbaaa7d75.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/b2daf0876b29278e703f4721f7f68c22ffa1752b.webp)
### ⚠️ Important Notes
- This feature **only works with `keys.openpgp.org`**, which supports the
**Verifying Keyserver (VKS) API**.
-- If the `KeyServerSync` plugin is **disabled**, the publish status will **not
+- If the `KeyServerSync` module is **disabled**, the publish status will **not
be fetched**, and no notice will appear in the UI.
- It is purely a **read-only status check**, and does not modify or upload
anything to the server.
@@ -206,4 +202,4 @@ To activate this:
be deleted**.
- Always verify imported keys before using them.
- Maintain proper key hygiene: revoke and update keys when compromised.
-- Never upload private key material to any server. \ No newline at end of file
+- Never upload private key material to any server.
diff --git a/src/content/docs/guides/openpgp-trust-manage.md b/src/content/docs/guides/openpgp-trust-manage.md
index 74989ed..d7749d6 100644
--- a/src/content/docs/guides/openpgp-trust-manage.md
+++ b/src/content/docs/guides/openpgp-trust-manage.md
@@ -29,7 +29,10 @@ user's confidence in the key owner's ability to vouch for others. This
distinction allows users to build personalized and scalable Web of Trust models
without relying heavily on external signatures or centralized authorities.
+![](https://image.cdn.bktus.com/i/2025/06/24/38399d86fb330ca20eab85c33c03331797d32679.webp)
+
Typical trust levels include:
+
- **Unknown**: No trust decision has been made.
- **None**: The key owner is not trusted to certify other keys.
- **Marginal**: The key owner is partially trusted.
@@ -41,6 +44,24 @@ By using Owner Trust, users can securely manage communication without requiring
constant updates from key servers, maintaining both simplicity and control over
their trust network.
+### Setting Owner Trust
+
+GpgFrontend makes it easy to manage Owner Trust levels for any key in your
+collection directly from the Key Toolbox.
+
+To change the Owner Trust level:
+
+1. Locate the Key: Find the desired public key (or key group) in the Key Toolbox
+ table.
+2. Open the Context Menu: Right-click on the key entry to display the context
+ menu.
+3. Set Owner Trust Level: Select the “Set Owner Trust Level” option.
+
+A dialog will appear allowing you to choose the appropriate trust level
+(Unknown, None, Marginal, Full, Ultimate).
+
+![](https://image.cdn.bktus.com/i/2025/06/24/4b7624b599a5f310d059843c872cf81e6b089ba4.webp)
+
## Signing UIDs and Current Limitations
In GpgFrontend, users can sign the UID (User ID) of another user’s OpenPGP
@@ -48,7 +69,10 @@ public key to confirm its authenticity. However, during the initial design
phase, the potential need to synchronize these signatures with key servers was
not fully considered.
+![](https://image.cdn.bktus.com/i/2025/06/24/d974152f4b2b850d228408b99d37ea487a3cf914.webp)
+
Currently:
+
- GpgFrontend does not automatically upload signed UIDs to OpenPGP key servers.
- Whether a signature update is accepted depends entirely on the specific key
server’s policy.
@@ -56,22 +80,26 @@ Currently:
Reasons for not enforcing automatic synchronization:
Uncontrollable Behavior of Key Servers
+
- Different servers (e.g., keys.openpgp.org, SKS servers) have varied policies
regarding third-party signatures.
- Some servers accept them; others require UID validation or reject them
- altogether.
+ altogether.
Potential Key Size Inflation
+
- Each additional signature increases the public key’s size.
- Frequent uploads of third-party signatures would cause key bloat, impacting
- synchronization and performance.
+ synchronization and performance.
+
+Practical User Behavior
-3. Practical User Behavior
- Most users verify fingerprints manually and rely on Owner Trust.
- Synchronizing all third-party signatures to public servers is often
unnecessary for typical use cases.
## Special Considerations for Organizational Users
+
In organizational environments (e.g., large enterprises), simple Owner Trust is
often inadequate. In these cases, a Certificate Authority (CA)-based trust model
is used:
@@ -93,4 +121,3 @@ future development may consider it based on user demand.
third-party signatures.
- Explore the implementation of organizational trust models such as CA-based
signature management and certificate presentation.
-
diff --git a/src/content/docs/guides/text-opetations.md b/src/content/docs/guides/text-opetations.md
index e753fa6..9018b5b 100644
--- a/src/content/docs/guides/text-opetations.md
+++ b/src/content/docs/guides/text-opetations.md
@@ -10,9 +10,12 @@ core cryptographic operations: **encryption**, **decryption**, **signing**, and
cryptography and provides intuitive workflows for both beginners and advanced
users.
+![](https://image.cdn.bktus.com/i/2025/06/24/a08c744eff9339df43a39a22d948c806e473a6c8.webp)
+
## Understanding the Basics
Public key cryptography relies on key pairs:
+
- **Public Key**: Used to encrypt or verify.
- **Private Key**: Used to decrypt or sign.
@@ -21,8 +24,8 @@ own key pair and exchange public keys with their communication partners.
## Encrypting Text
-### Only Encrypt
Use the recipient's **public key** to encrypt plaintext. This method:
+
- Produces a shorter ciphertext.
- Does **not** reveal the sender's identity.
- Is ideal when anonymity is preferred.
@@ -30,82 +33,46 @@ Use the recipient's **public key** to encrypt plaintext. This method:
> 🔐 Tip: Don’t use your own public key to encrypt unless you're sending a
> message to yourself.
-![](https://image.cdn.bktus.com/i/2023/11/16/07c99019-318a-3b85-ea63-0d473ebcd7ec.gif)
-
-### Encrypt & Sign
-This method encrypts the message with the recipient's public key and signs it
-with **your own private key**, ensuring:
-- Confidentiality
-- Message authenticity
-- Proof of origin
-
-To use this method:
-- Choose the recipient’s public key.
-- Select **your private key** with signing capability (`Usage = S`).
-
-> 📄 The resulting ciphertext is longer due to the signature. The Info Board
-> will display signature details after encryption.
-
-![](https://image.cdn.bktus.com/i/2023/11/16/cb4ac40a-9830-7429-8447-7ada6bc6571b.gif)
+![](https://image.cdn.bktus.com/i/2025/06/24/19483c04524fd94afff85cac502a1030bdb4c477.gif)
## Signing Text
-### Signature Only
Use your **private key** to sign text without encrypting it:
+
- This confirms authorship.
- Anyone with your public key can verify it.
Check the key’s `Usage` column for `S` to confirm it's suitable for signing.
-![Signature
-Only](https://image.cdn.bktus.com/i/2023/11/16/9c95a381-52b9-4d2b-c21d-38fdc6cbc76d.gif)
-
-### Sign with Encryption
-Sign and encrypt together by selecting the recipient's public key and your own
-private signing key:
-- Ensures both confidentiality and authenticity.
-- Common in secure messaging or business communication.
-
-![](https://image.cdn.bktus.com/i/2023/11/16/fd98e968-5e59-7bee-abea-99ab234be7a6.gif)
-
----
+![](https://image.cdn.bktus.com/i/2025/06/24/8c6db160d26f94e75138134d319c29bd2c3736b7.gif)
## Decrypting Text
-### Decrypt Only
Paste or load the ciphertext into GpgFrontend. The tool will:
+
- Automatically use the correct **private key**.
- Notify you if no valid key is available.
> ✅ No need to check `Usage` manually; the tool handles key matching.
-![](https://image.cdn.bktus.com/i/2023/11/16/a4ded61d-fb5b-cbf2-f0ec-e3b26e79f172.gif)
-
-### Decrypt & Verify
-If the message was signed, GpgFrontend will:
-- Verify the signature using the **sender’s public key**.
-- Display whether the signature is valid.
-
-Use this for added assurance of sender authenticity and message integrity.
-
-![](https://image.cdn.bktus.com/i/2023/11/16/9e06ce22-f98d-47f1-ea76-e4e23b6dd32d.gif)
-
----
+![](https://image.cdn.bktus.com/i/2025/06/24/5e16d1a75fb7e7bfb4d14f7fadd57144494b131c.gif)
## Verifying Signatures
To verify a detached or embedded signature:
+
- Use the sender’s **public key**.
- Paste or load the signed message.
GpgFrontend will:
+
- Check the integrity.
- Report any mismatch or missing public keys.
> 📥 If the required public key is missing, GpgFrontend prompts you to import
> it.
-![](https://image.cdn.bktus.com/i/2023/11/16/fbde7130-72c3-1fce-8366-47643fc0e804.gif)
+![](https://image.cdn.bktus.com/i/2025/06/24/6ccba3133341e6e6ea095a2dc00bf23c63ed8f56.gif)
## Best Practices
@@ -113,4 +80,4 @@ GpgFrontend will:
- Share only your **public key**, and **never** your private key.
- Use **Encrypt & Sign** for secure and authenticated communication.
- Use **Sign Only** for publishing documents or messages that require integrity
- but not secrecy. \ No newline at end of file
+ but not secrecy.
diff --git a/src/content/docs/overview/glance.md b/src/content/docs/overview/glance.md
index 864564c..44fb0af 100644
--- a/src/content/docs/overview/glance.md
+++ b/src/content/docs/overview/glance.md
@@ -40,6 +40,10 @@ throughout the manual.
![](https://image.cdn.bktus.com/i/2025/06/24/8725f93f511017055e6df799dac5262a5e9c3254.webp)
+![](https://image.cdn.bktus.com/i/2025/06/25/82aae58a6e35a26aec366cea65178057a8817f12.webp)
+
+![](https://image.cdn.bktus.com/i/2025/06/25/126a292375472a3c559a0a0de775283e4ea05875.webp)
+
:::tip[Note]
The core features and workflow of GpgFrontend are consistent across all