Invite contacts, with whom you want to share encrypted data, to join CloudMask.
Contacts who join CloudMask create their own secret key, exclusive to their device. Keys can then exchanged and data is encrypted accordingly so that only communicating parties can decrypt shared data.
Inviting contacts can be done in 2 different ways:
Access Contacts Page, as described in Managing Contacts, to ADD CONTACT.
- Contacts with CloudMask will be added to your list of Trusted Contacts, with whom you can share encrypted data with seamlessly.
- Contacts without CloudMask will be sent an invitation email and you will be notified once they join to conclude key exchange, as described in Trusting Contacts.
Recipients with CloudMask will be added to your list of Trusted Contacts and can seamlessly access shared data. Recipients without CloudMask will be invited to join CloudMask in order to access shared data; go to Trusting Contacts to see what follows.
Share encrypted data with a new contact as described per application: