aboutsummaryrefslogtreecommitdiffstats
path: root/src/content/docs/guides/understand-interface.md
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/content/docs/guides/understand-interface.md131
1 files changed, 95 insertions, 36 deletions
diff --git a/src/content/docs/guides/understand-interface.md b/src/content/docs/guides/understand-interface.md
index 91b66fb..6a94564 100644
--- a/src/content/docs/guides/understand-interface.md
+++ b/src/content/docs/guides/understand-interface.md
@@ -4,19 +4,46 @@ sidebar:
order: 2
---
-This documentation explains the interface and functionality of GpgFrontend,
-based on the latest UI design. It is intended to guide users through its
-features effectively.
+This documentation explains the layout and features of the latest GpgFrontend
+interface, helping users to efficiently utilize all cryptographic operations in
+different workspaces.
-![Interface](https://image.cdn.bktus.com/i/2024/11/29/0b427894-0706-70fd-cd68-634d57655df4.webp)
+![](https://image.cdn.bktus.com/i/2025/06/24/1661f0ae38ec3a91c26c3bc495bbd68baf5cdd18.webp)
-## Text Editing Zone
+## Workspace Overview
-The **Text Editing Zone** allows users to input any desired text or work on
-existing files. You can open a new tab using the **"New"** or **"New E-Mail"**
-button or load an existing file with **"Open"** from the menu bar.
+GpgFrontend organizes your cryptographic workflow into multiple workspaces
+(tabs), making it easy to work with files, plain text, and email data
+simultaneously.
-### Key Features:
+There are three main workspace types, each represented by a tab:
+
+- File Panel: For batch file and folder operations.
+- Text Editor: For editing and encrypting/decrypting plain text.
+- Mail Editor: For handling email messages in a dedicated editor.
+
+You can open multiple tabs of each type and switch between them as needed.
+
+### File Panel
+
+The File Panel is dedicated to cryptographic operations on files and folders. It
+allows you to:
+
+- Browse and select files or folders from your system.
+- Encrypt, decrypt, sign, or verify one or multiple files.
+- Switch between ASCII and binary output modes.
+- Activate Batch Mode for multi-file operations.
+- Automatically handle folder archiving/encryption (see the File Operations
+ section for details).
+
+Files and folders selected via Open are always opened in a File Panel tab.
+
+### Text Editor
+
+The Text Editor allows users to input any desired text or work on existing
+files.
+
+#### Key Features
- **Operations Bar**: Located at the top, it provides options to encrypt,
decrypt, sign, and verify text directly.
@@ -24,14 +51,28 @@ button or load an existing file with **"Open"** from the menu bar.
and **Ctrl+S** for copying, pasting, and saving text.
- **Plain Text Format**: Text is encoded in UTF-8 without formatting to ensure
clarity and compatibility. Future plans may include rich text editing.
-
-#### Large Text File Support
-
- Files up to **1MB** are supported. Larger files may cause performance issues
and are not recommended.
- While loading large files, editing will be temporarily disabled until the
entire file is processed.
+### Mail Editor
+
+The Mail Editor is specifically designed for working with EML-format email
+messages.
+
+- Open and Edit EML Files: Load .eml files (standard email format) directly for
+ viewing and editing their content.
+- Compose, Encrypt, Sign, and Verify Emails: Easily write or modify email
+ content and apply encryption, digital signatures, or verify received
+ signatures—all in one place.
+
+:::caution[Note]
+
+The Mail Editor is optimized for .eml files, ensuring compatibility with standard email clients and maintaining proper formatting and metadata during cryptographic operations.
+
+:::
+
## Information Panel
The **Information Panel** displays the results of current operations (e.g.,
@@ -55,24 +96,38 @@ and algorithms used.
## Key Toolbox
-The **Key Toolbox**, located on the right side of the interface, lists all
-available keys. It provides details such as key type, name, email address, and
-usage. Users can select keys for specific operations by ticking the boxes in the
-first column.
+Located on the right side, the Key Toolbox lists all your available keys,
+including public, private, and key groups.
+
+Key features:
+
+- Selection: Tick boxes to choose keys for current operations.
+- Type/Usage/Email: Quickly review each key’s function.
+- Tab Filtering: Tabs let you quickly filter keys by type or status.
+
+Keys that are expired, revoked, or unavailable are hidden by default, but can be
+managed in the Manage Keys interface.
+
+### Understanding the Key Toolbox Table
-### Key Details
+The Key Toolbox contains detailed information about each key. Some of the
+columns and codes—especially in the Type and Usage columns—may not be
+immediately obvious. The section below explains the meaning of these less
+obvious—but essential—fields and codes, so you can confidently interpret key
+types, usage, and status in your daily cryptographic operations.
- **Type**:
- `pub`: Public key (for encryption or verification).
- `pub/sec`: Key pair with both public and private keys.
- `pub/sec#`: Key pair with missing primary key.
- `pub/sec^`: Key pair with components stored on a smart card.
-- **Email Address**: Shows the email associated with each key.
+ - `group`: Key Group (a collection of public keys used as one recipient for
+ encryption).
- **Usage**: Indicates key functionality with codes:
- - `C`: Certification.
- - `E`: Encryption.
- - `S`: Signing.
- - `A`: Authentication.
+ - `C`: Certification – can certify (sign) other keys (typically primary keys only)
+ - `E`: Encryption – can encrypt data to this key
+ - `S`: Signing – can create digital signatures
+ - `A`: Authentication – can be used for authentication (e.g. SSH)
### Categories
@@ -82,20 +137,24 @@ Expired or revoked keys are not displayed by default and can be viewed in
## Operations Bar
-The **Operations Bar**, at the top of the interface, provides quick access to
-all core functionalities:
-
-1. **New E-Mail**: Create a new email or text file.
-2. **Open**: Open an existing text file.
-3. **File Panel**: Browse and select files from your system.
-4. **Encrypt**: Encrypt text or files using selected keys.
-5. **Encrypt Sign**: Encrypt and sign text or files simultaneously.
-6. **Decrypt**: Decrypt text or files.
-7. **Decrypt Verify**: Decrypt and verify signed files.
-8. **Sign**: Digitally sign text or files.
-9. **Verify**: Verify the signature of text or files.
-10. **Manage Keys**: Access the key management interface.
-11. **Import Key**: Import keys into your keyring.
+The Operations Bar at the top provides one-click access to all core
+cryptographic and workspace features. Here are the main buttons, from left to
+right:
+
+1. **Open**: Open a file or directory, launching the File Panel for file-based
+ operations.
+2. **Workspace**: Manage and switch between different workspaces or tabs, such
+ as File Panel, Text Editor, and Mail Editor.
+3. **Encrypt**: Encrypt the currently selected file(s) or text using the
+ selected recipient keys.
+4. **Decrypt**: Decrypt the currently selected encrypted file(s) or text. No key
+ selection is required—gpg automatically detects and uses the
+ appropriate private key(s) from your keyring.
+5. **Sign**: Digitally sign the selected file(s) or text with your private key.
+6. **Verify**: Verify the signature of the selected file(s) or text.
+7. **New Keypair**: Generate a new key pair.
+8. **Import Key...**: Import existing public or private keys into your keyring.
+9. **Manage Keys**: Access the key management interface.
### Customization